NVIDIA GPU Display Driver 418 for Windows

CPE Details

NVIDIA GPU Display Driver 418 for Windows
418
2021-04-29
15h12 +00:00
2021-06-02
16h20 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:nvidia:gpu_display_driver:418:*:*:*:*:windows:*:*

Informations

Vendor

nvidia

Product

gpu_display_driver

Version

418

Target Software

windows

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2021-1078 2021-04-21 20h30 +00:00 NVIDIA Windows GPU Display Driver for Windows, all versions, contains a vulnerability in the kernel driver (nvlddmkm.sys) where a NULL pointer dereference may lead to system crash.
5.5
Moyen
CVE-2021-1075 2021-04-21 20h30 +00:00 NVIDIA Windows GPU Display Driver for Windows, all versions, contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape where the program dereferences a pointer that contains a location for memory that is no longer valid, which may lead to code execution, denial of service, or escalation of privileges. Attacker does not have any control over the information and may conduct limited data modification.
7.3
Haute
CVE-2021-1076 2021-04-20 22h00 +00:00 NVIDIA GPU Display Driver for Windows and Linux, all versions, contains a vulnerability in the kernel mode layer (nvlddmkm.sys or nvidia.ko) where improper access control may lead to denial of service, information disclosure, or data corruption.
7.8
Haute
CVE-2020-5966 2020-06-25 19h55 +00:00 NVIDIA Windows GPU Display Driver, all versions, contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, in which a NULL pointer is dereferenced, leading to denial of service or potential escalation of privileges.
7.8
Haute
CVE-2019-5676 2019-05-10 18h21 +00:00 NVIDIA Windows GPU Display driver software for Windows (all versions) contains a vulnerability in which it incorrectly loads Windows system DLLs without validating the path or signature (also known as a binary planting or DLL preloading attack), leading to escalation of privileges through code execution.
6.7
Moyen