Skip to content

Script in PowerShell to detect vulnerable versions of NVIDIA Graphics Driver and GeForce Experience in a Windows Local Machine.

License

Notifications You must be signed in to change notification settings

v3nt4n1t0/DetectNVIDIAVulnLocal

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

29 Commits
 
 
 
 
 
 

Repository files navigation

NVIDIA Vulnerability Scanner for Local Machine

Description:

Script in PowerShell to detect vulnerable versions of NVIDIA Graphics Driver and GeForce Experience in a Windows Local Machine.

CVEs: CVE‑2019‑5702 and previous.

Considerations:

  • Run the script with the Unrestricted or Bypass execution policies.

Usage:

PS E:\Pruebas C# PowerShell> .\DetectNVIDIAVulnLocal.ps1

or

PS C:\prueba> powershell.exe -ExecutionPolicy Bypass -File 'E:\Pruebas C# PowerShell\DetectNVIDIAVulnLocal.ps1'

or (Recommended: Save the following command and execute it whenever you want. You do not need to download the script. You will always run the most updated version of the script)

PS C:\prueba> iex(New-Object Net.WebClient).DownloadString("https://raw.githubusercontent.com/v3nt4n1t0/DetectNVIDIAVulnLocal/master/DetectNVIDIAVulnLocal.ps1")

You can try differents methods.

About

Script in PowerShell to detect vulnerable versions of NVIDIA Graphics Driver and GeForce Experience in a Windows Local Machine.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published