Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-34683 PoC — NVIDIA GPU Display Driver 代码问题漏洞

Source
Associated Vulnerability
Title:NVIDIA GPU Display Driver 代码问题漏洞 (CVE-2022-34683)
Description:NVIDIA GPU Display Driver是美国英伟达(NVIDIA)公司的一个用于操作系统中对显卡显示模块进行交互支持的驱动软件。 NVIDIA GPU Display Driver 存在安全漏洞,该漏洞源于在 DxgkDdiEscape 的内核模式层 (nvlddmkm.sys) 处理程序中,出现空指针取消引用,这可能导致拒绝服务。
Description
NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where a null-pointer dereference occurs, which may lead to denial of service. CVE project by @Sn0wAlice
Readme
# CVE-2022-34683

NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where a null-pointer dereference occurs, which may lead to denial of service.

| authentication | complexity | vector |
| --- | --- | --- |
| not available | not available | not available |

| confidentiality | integrity | availability |
| --- | --- | --- |
| not available | not available | not available |

## CVSS Score: **not available**

## References

* https://nvidia.custhelp.com/app/answers/detail/a_id/5415

## Brut File

* [CVE-2022-34683.json](./data_brut.json)



## About this repository
This repository is part of the project [Live Hack CVE](https://github.com/Live-Hack-CVE). Made by [Sn0wAlice](https://github.com/Sn0wAlice) for the people that care about security and need to have a feed of the latest CVEs. Hope you enjoy it, don't forget to star the repo and follow me on [Twitter](https://twitter.com/Sn0wAlice) and [Github](https://github.com/Sn0wAlice)
File Snapshot

[4.0K] /data/pocs/5b481b00cecf566067c3caa589b6ca4ef89c04fe ├── [3.8K] data_brut.json └── [1023] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.