Page 4 of 34 results (0.004 seconds)

CVSS: 6.7EPSS: 0%CPEs: 28EXPL: 0

21 Jul 2020 — The ALPS ALPINE touchpad driver before 8.2206.1717.634, as used on various Dell, HP, and Lenovo laptops, allows attackers to conduct Path Disclosure attacks via a "fake" DLL file. El controlador de la pantalla táctil ALPS ALPINE versiones anteriores a 8.2206.1717.634, como es usada en varias computadoras portátiles Dell, HP y Lenovo, permite a atacantes conducir ataques de Divulgación de Ruta por medio de un archivo DLL "fake" A DLL hijacking vulnerability was found in the ALPS ALPINE Touchpad driver, which... • https://seclists.org/fulldisclosure/2020/Jul/30 • CWE-427: Uncontrolled Search Path Element •

CVSS: 9.0EPSS: 0%CPEs: 206EXPL: 0

05 Nov 2019 — A potential security vulnerability has been identified in multiple HP products and versions which involves possible execution of arbitrary code during boot services that can result in elevation of privilege. The EFI_BOOT_SERVICES structure might be overwritten by an attacker to execute arbitrary SMM (System Management Mode) code. A list of affected products and versions are available in https://support.hp.com/rs-en/document/c06456250. Ha sido identificada una potencial vulnerabilidad de seguridad en múltipl... • https://support.hp.com/rs-en/document/c06456250 •

CVSS: 5.5EPSS: 0%CPEs: 29EXPL: 2

12 May 2017 — Conexant Systems mictray64 task, as used on HP Elite, EliteBook, ProBook, and ZBook systems, leaks sensitive data (keystrokes) to any process. In mictray64.exe (mic tray icon) 1.0.0.46, a LowLevelKeyboardProc Windows hook is used to capture keystrokes. This data is leaked via unintended channels: debug messages accessible to any process that is running in the current user session, and filesystem access to C:\Users\Public\MicTray.log by any process. La tarea mictray64 de Conexant Systems, tal como es usada e... • http://www.securitytracker.com/id/1038527 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.9EPSS: 0%CPEs: 38EXPL: 0

04 Mar 2016 — Sure Start on HP Commercial PCs 2015 allows local users to cause a denial of service (BIOS recovery failure) by leveraging administrative access. Sure Start en HP Commercial PCs 2015 permite a usuarios locales causar una denegación de servicio (fallo de recuperación de la BIOS) aprovechándose del acceso administrativo. HP has identified a potential security vulnerability with the Sure Start implementation on certain 2015 commercial platforms. This vulnerability could be exploited locally by administrator or... • http://www.securitytracker.com/id/1035193 • CWE-284: Improper Access Control •