
CVE-2022-1038
https://notcve.org/view.php?id=CVE-2022-1038
21 Nov 2022 — A potential security vulnerability has been identified in the HP Jumpstart software, which might allow escalation of privilege. HP is recommending that customers uninstall HP Jumpstart and use myHP software. Se ha identificado una posible vulnerabilidad de seguridad en el software HP Jumpstart, que podría permitir una escalada de privilegios. HP recomienda que los clientes desinstalen HP Jumpstart y utilicen el software myHP. • https://support.hp.com/us-en/document/ish_6189329-6189528-16/hpsbhf03791 •

CVE-2019-18618
https://notcve.org/view.php?id=CVE-2019-18618
22 Jul 2020 — Incorrect access control in the firmware of Synaptics VFS75xx family fingerprint sensors that include external flash (all versions prior to 2019-11-15) allows a local administrator or physical attacker to compromise the confidentiality of sensor data via injection of an unverified partition table. Un control de acceso incorrecto en el firmware de los sensores de huellas dactilares de la familia Synaptics VFS75xx que incluye flash externo (todas las versiones anteriores al 15/11/2019) permite a un administra... • https://support.hp.com/us-en/document/c06696474 •

CVE-2020-15596 – ALPS ALPINE Touchpad DLL Hijacking
https://notcve.org/view.php?id=CVE-2020-15596
21 Jul 2020 — The ALPS ALPINE touchpad driver before 8.2206.1717.634, as used on various Dell, HP, and Lenovo laptops, allows attackers to conduct Path Disclosure attacks via a "fake" DLL file. El controlador de la pantalla táctil ALPS ALPINE versiones anteriores a 8.2206.1717.634, como es usada en varias computadoras portátiles Dell, HP y Lenovo, permite a atacantes conducir ataques de Divulgación de Ruta por medio de un archivo DLL "fake" A DLL hijacking vulnerability was found in the ALPS ALPINE Touchpad driver, which... • https://seclists.org/fulldisclosure/2020/Jul/30 • CWE-427: Uncontrolled Search Path Element •

CVE-2019-16284
https://notcve.org/view.php?id=CVE-2019-16284
05 Nov 2019 — A potential security vulnerability has been identified in multiple HP products and versions which involves possible execution of arbitrary code during boot services that can result in elevation of privilege. The EFI_BOOT_SERVICES structure might be overwritten by an attacker to execute arbitrary SMM (System Management Mode) code. A list of affected products and versions are available in https://support.hp.com/rs-en/document/c06456250. Ha sido identificada una potencial vulnerabilidad de seguridad en múltipl... • https://support.hp.com/rs-en/document/c06456250 •

CVE-2017-8360
https://notcve.org/view.php?id=CVE-2017-8360
12 May 2017 — Conexant Systems mictray64 task, as used on HP Elite, EliteBook, ProBook, and ZBook systems, leaks sensitive data (keystrokes) to any process. In mictray64.exe (mic tray icon) 1.0.0.46, a LowLevelKeyboardProc Windows hook is used to capture keystrokes. This data is leaked via unintended channels: debug messages accessible to any process that is running in the current user session, and filesystem access to C:\Users\Public\MicTray.log by any process. La tarea mictray64 de Conexant Systems, tal como es usada e... • http://www.securitytracker.com/id/1038527 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •