Vulnerabilities (CVE)

Filtered by vendor Nvidia Subscribe
Filtered by product Geforce Experience
Total 37 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-31611 2 Microsoft, Nvidia 2 Windows, Geforce Experience 2023-12-10 N/A 7.3 HIGH
NVIDIA GeForce Experience contains an uncontrolled search path vulnerability in all its client installers, where an attacker with user level privileges may cause the installer to load an arbitrary DLL when the installer is launched. A successful exploit of this vulnerability could lead to escalation of privileges and code execution.
CVE-2022-42292 2 Microsoft, Nvidia 2 Windows, Geforce Experience 2023-12-10 N/A 7.8 HIGH
NVIDIA GeForce Experience contains a vulnerability in the NVContainer component, where a user without administrator privileges can create a symbolic link to a file that requires elevated privileges to write to or modify, which may lead to denial of service, escalation of privilege or limited data tampering.
CVE-2022-42291 2 Microsoft, Nvidia 2 Windows, Geforce Experience 2023-12-10 N/A 5.5 MEDIUM
NVIDIA GeForce Experience contains a vulnerability in the installer, where a user installing the NVIDIA GeForce Experience software may inadvertently delete data from a linked location, which may lead to data tampering. An attacker does not have explicit control over the exploitation of this vulnerability, which requires the user to explicitly launch the installer from the compromised directory.
CVE-2021-23175 2 Microsoft, Nvidia 2 Windows, Geforce Experience 2023-12-10 4.4 MEDIUM 8.2 HIGH
NVIDIA GeForce Experience contains a vulnerability in user authorization, where GameStream does not correctly apply individual user access controls for users on the same device, which, with user intervention, may lead to escalation of privileges, information disclosure, data tampering, and denial of service, affecting other resources beyond the intended security authority of GameStream.
CVE-2021-1073 2 Microsoft, Nvidia 2 Windows, Geforce Experience 2023-12-10 5.1 MEDIUM 8.3 HIGH
NVIDIA GeForce Experience, all versions prior to 3.23, contains a vulnerability in the login flow when a user tries to log in by using a browser, while, at the same time, any other web page is loaded in other tabs of the same browser. In this situation, the web page can get access to the token of the user login session, leading to the possibility that the user’s account is compromised. This may lead to the targeted user’s data being accessed, altered, or lost.
CVE-2021-1079 2 Microsoft, Nvidia 2 Windows, Geforce Experience 2023-12-10 3.6 LOW 6.1 MEDIUM
NVIDIA GeForce Experience, all versions prior to 3.22, contains a vulnerability in GameStream plugins where log files are created using NT/System level permissions, which may lead to code execution, denial of service, or local privilege escalation. The attacker does not have control over the consequence of a modification nor would they be able to leak information as a direct result of the overwrite.
CVE-2020-5977 1 Nvidia 1 Geforce Experience 2023-12-10 4.4 MEDIUM 7.8 HIGH
NVIDIA GeForce Experience, all versions prior to 3.20.5.70, contains a vulnerability in NVIDIA Web Helper NodeJS Web Server in which an uncontrolled search path is used to load a node module, which may lead to code execution, denial of service, escalation of privileges, and information disclosure.
CVE-2020-5990 1 Nvidia 1 Geforce Experience 2023-12-10 4.6 MEDIUM 7.8 HIGH
NVIDIA GeForce Experience, all versions prior to 3.20.5.70, contains a vulnerability in the ShadowPlay component which may lead to local privilege escalation, code execution, denial of service or information disclosure.
CVE-2020-5978 1 Nvidia 1 Geforce Experience 2023-12-10 4.6 MEDIUM 7.8 HIGH
NVIDIA GeForce Experience, all versions prior to 3.20.5.70, contains a vulnerability in its services in which a folder is created by nvcontainer.exe under normal user login with LOCAL_SYSTEM privileges which may lead to a denial of service or escalation of privileges.
CVE-2021-1072 2 Microsoft, Nvidia 2 Windows, Geforce Experience 2023-12-10 3.6 LOW 7.1 HIGH
NVIDIA GeForce Experience, all versions prior to 3.21, contains a vulnerability in GameStream (rxdiag.dll) where an arbitrary file deletion due to improper handling of log files may lead to denial of service.
CVE-2020-5964 2 Microsoft, Nvidia 10 Windows, Geforce, Geforce Experience and 7 more 2023-12-10 4.6 MEDIUM 7.8 HIGH
NVIDIA Windows GPU Display Driver, all versions, contains a vulnerability in the service host component, in which the application resources integrity check may be missed. Such an attack may lead to code execution, denial of service or information disclosure.
CVE-2019-5689 1 Nvidia 1 Geforce Experience 2023-12-10 4.6 MEDIUM 7.8 HIGH
NVIDIA GeForce Experience, all versions prior to 3.20.1, contains a vulnerability in the Downloader component in which a user with local system access can craft input that may allow malicious files to be downloaded and saved. This behavior may lead to code execution, denial of service, or information disclosure.
CVE-2019-5695 2 Microsoft, Nvidia 3 Windows, Geforce Experience, Gpu Driver 2023-12-10 6.9 MEDIUM 6.5 MEDIUM
NVIDIA GeForce Experience (prior to 3.20.1) and Windows GPU Display Driver (all versions) contains a vulnerability in the local service provider component in which an attacker with local system and privileged access can incorrectly load Windows system DLLs without validating the path or signature (also known as a binary planting or DLL preloading attack), which may lead to denial of service or information disclosure through code execution.
CVE-2019-5702 2 Microsoft, Nvidia 2 Windows, Geforce Experience 2023-12-10 4.4 MEDIUM 7.8 HIGH
NVIDIA GeForce Experience, all versions prior to 3.20.2, contains a vulnerability when GameStream is enabled in which an attacker with local system access can corrupt a system file, which may lead to denial of service or escalation of privileges.
CVE-2020-5958 2 Microsoft, Nvidia 6 Windows, Geforce Experience, Quadro and 3 more 2023-12-10 4.4 MEDIUM 7.8 HIGH
NVIDIA Windows GPU Display Driver, all versions, contains a vulnerability in the NVIDIA Control Panel component in which an attacker with local system access can plant a malicious DLL file, which may lead to code execution, denial of service, or information disclosure.
CVE-2020-5957 2 Microsoft, Nvidia 6 Windows, Geforce Experience, Quadro and 3 more 2023-12-10 4.6 MEDIUM 7.8 HIGH
NVIDIA Windows GPU Display Driver, all versions, contains a vulnerability in the NVIDIA Control Panel component in which an attacker with local system access can corrupt a system file, which may lead to denial of service or escalation of privileges.
CVE-2019-5701 1 Nvidia 1 Geforce Experience 2023-12-10 6.2 MEDIUM 7.8 HIGH
NVIDIA GeForce Experience, all versions prior to 3.20.0.118, contains a vulnerability when GameStream is enabled in which an attacker with local system access can load the Intel graphics driver DLLs without validating the path or signature (also known as a binary planting or DLL preloading attack), which may lead to denial of service, information disclosure, or escalation of privileges through code execution.
CVE-2019-5678 2 Microsoft, Nvidia 2 Windows, Geforce Experience 2023-12-10 4.6 MEDIUM 7.8 HIGH
NVIDIA GeForce Experience versions prior to 3.19 contains a vulnerability in the Web Helper component, in which an attacker with local system access can craft input that may not be properly validated. Such an attack may lead to code execution, denial of service or information disclosure.
CVE-2019-5676 2 Microsoft, Nvidia 3 Windows, Geforce Experience, Gpu Display Driver 2023-12-10 7.2 HIGH 6.7 MEDIUM
NVIDIA Windows GPU Display driver software for Windows (all versions) contains a vulnerability in which it incorrectly loads Windows system DLLs without validating the path or signature (also known as a binary planting or DLL preloading attack), leading to escalation of privileges through code execution.
CVE-2019-5674 1 Nvidia 1 Geforce Experience 2023-12-10 6.9 MEDIUM 7.0 HIGH
NVIDIA GeForce Experience before 3.18 contains a vulnerability when ShadowPlay or GameStream is enabled. When an attacker has access to the system and creates a hard link, the software does not check for hard link attacks. This behavior may lead to code execution, denial of service, or escalation of privileges.