HP 250 G8
CPU: Intel Core i3-1115G4
(3.0GHz, up to 4.1GHz, 6MB)
SSD: SSD 256GB PCIe NVM
Memory: 8GB DDR4 2666
Display: 15.6″ FHD (1920 x 1080), anti-glare
Graphics: Intel UHD Graphics
Lan,HDMI,Camera
USB x 2, USB type C
Related products
-
Notebooks
Lenovo IdeaPad 3 15ITL6 Arctic Grey
Read moreCPU: Intel Core i7-1165G7 (4C / 8T, 2.8 / 4.7GHz, 12MB) SSD: 512GB SSD M.2 2242 PCIe NVMe Memory: 16GB (8GB Soldered DDR4-3200 + 8GB SO-DIMM DDR4-3200) Display: 15.6″ FHD (1920×1080) IPS 300nits AG + 720p with Privacy Shutter Graphics: Integrated Card reader, USBx2, HDMI, USB Type-C WIFI 11ax, BT5.1, Speakers 1.5W x2, Dolby Audio …
-
Notebooks
Lenovo IdeaPad 3 15IML05
Read moreCPU: Intel Core i3-1115G4 (2C / 4T, 3.0 / 4.1GHz, 6MB) SSD: 256GB SSD M.2 2242 PCIe NVMe Memory: 8GB (4GB Soldered DDR4 + 4GB SO-DIMM DDR4) Display: 15.6″ FHD (1920×1080) IPS 300nits AG + 720p with Privacy Shutter Graphics: Integrated Card reader, USBx2 HDMI, USB Type-C WIFI 11ac, BT5.1 Stereo speakers, 1.5W x2, Dolby
NEWS
-
ZDI-23-1494: Apple Safari TypedArray copyWithin Integer Underflow Remote Code Execution Vulnerability
September 30, 2023This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. -
ZDI-23-1493: G Data Total Security GDBackupSvc Service Link Following Local Privilege Escalation Vulnerability
September 30, 2023This vulnerability allows local attackers to escalate privileges on affected installations of G Data Total Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. -
ZDI-23-1492: Linux Kernel XFRM Out-Of-Bounds Read Information Disclosure Vulnerability
September 30, 2023This vulnerability allows local attackers to disclose sensitive information on affected installations of the Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.