Show filters
7 Total Results
Displaying 1-7 of 7
Sort by:
Attacker Value
Unknown

CVE-2022-47071

Disclosure Date: February 06, 2023 (last updated October 08, 2023)
In NVS365 V01, the background network test function can trigger command execution.
Attacker Value
Unknown

CVE-2022-47070

Disclosure Date: February 03, 2023 (last updated October 08, 2023)
NVS365 V01 is vulnerable to Incorrect Access Control. After entering a wrong password, the url will be sent to the server twice. In the second package, the server will return the correct password information.
Attacker Value
Unknown

CVE-2020-5967

Disclosure Date: June 25, 2020 (last updated February 21, 2025)
NVIDIA Linux GPU Display Driver, all versions, contains a vulnerability in the UVM driver, in which a race condition may lead to a denial of service.
Attacker Value
Unknown

CVE-2020-5965

Disclosure Date: June 25, 2020 (last updated February 21, 2025)
NVIDIA Windows GPU Display Driver, all versions, contains a vulnerability in the DirectX 11 user mode driver (nvwgf2um/x.dll), in which a specially crafted shader can cause an out of bounds access, leading to denial of service.
Attacker Value
Unknown

CVE-2020-5964

Disclosure Date: June 25, 2020 (last updated February 21, 2025)
NVIDIA Windows GPU Display Driver, all versions, contains a vulnerability in the service host component, in which the application resources integrity check may be missed. Such an attack may lead to code execution, denial of service or information disclosure.
Attacker Value
Unknown

CVE-2020-5963

Disclosure Date: June 25, 2020 (last updated November 28, 2024)
NVIDIA Windows GPU Display Driver, all versions, contains a vulnerability in the Inter Process Communication APIs, in which improper access control may lead to code execution, denial of service, or information disclosure.
Attacker Value
Unknown

CVE-2020-5962

Disclosure Date: June 24, 2020 (last updated November 28, 2024)
NVIDIA Windows GPU Display Driver, all versions, contains a vulnerability in the NVIDIA Control Panel component, in which an attacker with local system access can corrupt a system file, which may lead to denial of service or escalation of privileges.