10 results (0.005 seconds)

CVSS: 7.8EPSS: 0%CPEs: 658EXPL: 0

14 Jun 2023 — Potential vulnerabilities have been identified in the system BIOS of certain HP PC products, which might allow arbitrary code execution, escalation of privilege, denial of service, and information disclosure. • https://support.hp.com/us-en/document/ish_6664419-6664458-16/hpsbhf03806 • CWE-863: Incorrect Authorization •

CVSS: 7.8EPSS: 0%CPEs: 658EXPL: 0

14 Jun 2023 — Potential vulnerabilities have been identified in the system BIOS of certain HP PC products, which might allow arbitrary code execution, escalation of privilege, denial of service, and information disclosure. • https://support.hp.com/us-en/document/ish_6664419-6664458-16/hpsbhf03806 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 7.8EPSS: 0%CPEs: 658EXPL: 0

14 Jun 2023 — Potential vulnerabilities have been identified in the system BIOS of certain HP PC products, which might allow arbitrary code execution, escalation of privilege, denial of service, and information disclosure. • https://support.hp.com/us-en/document/ish_6664419-6664458-16/hpsbhf03806 • CWE-863: Incorrect Authorization •

CVSS: 7.8EPSS: 0%CPEs: 658EXPL: 0

30 Jan 2023 — Potential vulnerabilities have been identified in the system BIOS of certain HP PC products, which might allow arbitrary code execution, escalation of privilege, denial of service, and information disclosure. HP is releasing BIOS updates to mitigate these potential vulnerabilities. • https://support.hp.com/us-en/document/ish_6664419-6664458-16/hpsbhf03806 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.0EPSS: 0%CPEs: 634EXPL: 0

30 Jan 2023 — A potential Time-of-Check to Time-of-Use (TOCTOU) vulnerability has been identified in the BIOS for certain HP PC products which may allow arbitrary code execution, denial of service, and information disclosure. HP is releasing BIOS updates to mitigate the potential vulnerability. • https://support.hp.com/us-en/document/ish_7387020-7387107-16/hpsbhf03827 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVSS: 8.8EPSS: 0%CPEs: 384EXPL: 0

16 Feb 2022 — Potential vulnerabilities have been identified in UEFI firmware (BIOS) for some PC products which may allow escalation of privilege and arbitrary code execution. han sido identificadas posibles vulnerabilidades en el firmware UEFI (BIOS) de algunos productos de PC que pueden permitir una escalada de privilegios y una ejecución de código arbitrario • https://support.hp.com/us-en/document/ish_5661066-5661090-16 •

CVSS: 8.8EPSS: 0%CPEs: 384EXPL: 0

16 Feb 2022 — Potential vulnerabilities have been identified in UEFI firmware (BIOS) for some PC products which may allow escalation of privilege and arbitrary code execution. Se han identificado vulnerabilidades potenciales en el firmware UEFI (BIOS) de algunos productos de PC que pueden permitir una escalada de privilegios y una ejecución de código arbitrario • https://support.hp.com/us-en/document/ish_5661066-5661090-16 •

CVSS: 8.8EPSS: 0%CPEs: 384EXPL: 0

16 Feb 2022 — Potential vulnerabilities have been identified in UEFI firmware (BIOS) for some PC products which may allow escalation of privilege and arbitrary code execution. Se han identificado vulnerabilidades potenciales en el firmware UEFI (BIOS) de algunos productos de PC que pueden permitir una escalada de privilegios y una ejecución de código arbitrario • https://support.hp.com/us-en/document/ish_5661066-5661090-16 •

CVSS: 8.8EPSS: 0%CPEs: 384EXPL: 0

16 Feb 2022 — Potential vulnerabilities have been identified in UEFI firmware (BIOS) for some PC products which may allow escalation of privilege and arbitrary code execution. han sido identificadas posibles vulnerabilidades en el firmware UEFI (BIOS) de algunos productos de PC que pueden permitir una escalada de privilegios y una ejecución de código arbitrario • https://support.hp.com/us-en/document/ish_5661066-5661090-16 •

CVSS: 8.8EPSS: 0%CPEs: 384EXPL: 0

16 Feb 2022 — A potential vulnerability in AMD System Management Mode (SMM) interrupt handler may allow an attacker with high privileges to access the SMM resulting in arbitrary code execution which could be used by malicious actors to bypass security mechanisms provided in the UEFI firmware. Una potencial vulnerabilidad en el manejador de interrupciones del Modo de Gestión del Sistema (SMM) de AMD puede permitir a un atacante con altos privilegios acceder al SMM resultando en la ejecución de código arbitrario que podría... • https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1027 •