Page 4 of 20 results (0.006 seconds)

CVSS: 7.0EPSS: 0%CPEs: 634EXPL: 0

A potential Time-of-Check to Time-of-Use (TOCTOU) vulnerability has been identified in the BIOS for certain HP PC products which may allow arbitrary code execution, denial of service, and information disclosure. HP is releasing BIOS updates to mitigate the potential vulnerability. • https://support.hp.com/us-en/document/ish_7387020-7387107-16/hpsbhf03827 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVSS: 8.4EPSS: 0%CPEs: 150EXPL: 0

A potential vulnerability has been identified in the system BIOS for certain HP PC products which may allow escalation of privileges and code execution. HP is releasing firmware updates to mitigate the potential vulnerability. Se ha identificado una vulnerabilidad potencial en el BIOS del sistema para ciertos productos de PC HP que puede permitir la escalada de privilegios y la ejecución de código. HP está lanzando actualizaciones de firmware para mitigar la vulnerabilidad potencial. • https://support.hp.com/us-en/document/ish_7191946-7191970-16/hpsbhf03820 •

CVSS: 6.7EPSS: 0%CPEs: 28EXPL: 0

The ALPS ALPINE touchpad driver before 8.2206.1717.634, as used on various Dell, HP, and Lenovo laptops, allows attackers to conduct Path Disclosure attacks via a "fake" DLL file. El controlador de la pantalla táctil ALPS ALPINE versiones anteriores a 8.2206.1717.634, como es usada en varias computadoras portátiles Dell, HP y Lenovo, permite a atacantes conducir ataques de Divulgación de Ruta por medio de un archivo DLL "fake" • https://seclists.org/fulldisclosure/2020/Jul/30 https://support.hp.com/document/c06706305 • CWE-427: Uncontrolled Search Path Element •

CVSS: 9.0EPSS: 0%CPEs: 206EXPL: 0

A potential security vulnerability has been identified in multiple HP products and versions which involves possible execution of arbitrary code during boot services that can result in elevation of privilege. The EFI_BOOT_SERVICES structure might be overwritten by an attacker to execute arbitrary SMM (System Management Mode) code. A list of affected products and versions are available in https://support.hp.com/rs-en/document/c06456250. Ha sido identificada una potencial vulnerabilidad de seguridad en múltiples productos y versiones de HP que implica la posible ejecución de código arbitrario durante los servicios de arranque que puede resultar en una elevación de privilegios. La estructura de EFI_BOOT_SERVICES podría ser sobrescrita por parte de un atacante para ejecutar código SMM (System Management Mode) arbitrario. • https://support.hp.com/rs-en/document/c06456250 •

CVSS: 7.9EPSS: 0%CPEs: 38EXPL: 0

Sure Start on HP Commercial PCs 2015 allows local users to cause a denial of service (BIOS recovery failure) by leveraging administrative access. Sure Start en HP Commercial PCs 2015 permite a usuarios locales causar una denegación de servicio (fallo de recuperación de la BIOS) aprovechándose del acceso administrativo. • http://www.securitytracker.com/id/1035193 https://h20565.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c05012469 • CWE-284: Improper Access Control •