![]() ![]() ![]() Such an attack may lead to code execution, escalation of privileges, denial of service, and information disclosure. This attack requires a user with system administration rights to execute the installer and requires the attacker to replace the files in a very short time window between file integrity validation and execution. NVIDIA Windows GPU Display Driver installer contains a vulnerability where an attacker with local unprivileged system access may be able to replace an application resource with malicious files. ![]() Descriptions use CWE™, and base scores and vectors use CVSS v3.1 standards. This section provides a summary of potential vulnerabilities that this security update addresses and their impact. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |