Show filters
627 Total Results
Displaying 1-10 of 627
Sort by:
Attacker Value
Unknown
CVE-2024-0132
Disclosure Date: September 26, 2024 (last updated October 03, 2024)
NVIDIA Container Toolkit 1.16.1 or earlier contains a Time-of-check Time-of-Use (TOCTOU) vulnerability when used with default configuration where a specifically crafted container image may gain access to the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
1
Attacker Value
Very Low
NVIDIA binary graphics driver: Privilege escalation vulnerability
Disclosure Date: October 18, 2006 (last updated October 04, 2023)
The accelerated rendering functionality of NVIDIA Binary Graphics Driver (binary blob driver) For Linux v8774 and v8762, and probably on other operating systems, allows local and remote attackers to execute arbitrary code via a large width value in a font glyph, which can be used to overwrite arbitrary memory locations.
0
Attacker Value
Unknown
CVE-2025-23359
Disclosure Date: February 12, 2025 (last updated February 12, 2025)
NVIDIA Container Toolkit for Linux contains a Time-of-Check Time-of-Use (TOCTOU) vulnerability when used with default configuration, where a crafted container image could gain access to the host file system. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
0
Attacker Value
Unknown
CVE-2024-53880
Disclosure Date: February 12, 2025 (last updated February 12, 2025)
NVIDIA Triton Inference Server contains a vulnerability in the model loading API, where a user could cause an integer overflow or wraparound error by loading a model with an extra-large file size that overflows an internal variable. A successful exploit of this vulnerability might lead to denial of service.
0
Attacker Value
Unknown
CVE-2024-0145
Disclosure Date: February 12, 2025 (last updated February 12, 2025)
NVIDIA nvJPEG2000 library contains a vulnerability where an attacker can cause a heap-based buffer overflow issue by means of a specially crafted JPEG2000 file. A successful exploit of this vulnerability might lead to code execution and data tampering.
0
Attacker Value
Unknown
CVE-2024-0144
Disclosure Date: February 12, 2025 (last updated February 12, 2025)
NVIDIA nvJPEG2000 library contains a vulnerability where an attacker can cause a buffer overflow issue by means of a specially crafted JPEG2000 file. A successful exploit of this vulnerability might lead to data tampering.
0
Attacker Value
Unknown
CVE-2024-0143
Disclosure Date: February 12, 2025 (last updated February 12, 2025)
NVIDIA nvJPEG2000 library contains a vulnerability where an attacker can cause an out-of-bounds write issue by means of a specially crafted JPEG2000 file. A successful exploit of this vulnerability might lead to code execution and data tampering.
0
Attacker Value
Unknown
CVE-2024-0142
Disclosure Date: February 12, 2025 (last updated February 12, 2025)
NVIDIA nvJPEG2000 library contains a vulnerability where an attacker can cause an out-of-bounds write issue by means of a specially crafted JPEG2000 file. A successful exploit of this vulnerability might lead to code execution and data tampering.
0
Attacker Value
Unknown
CVE-2024-0112
Disclosure Date: February 12, 2025 (last updated February 12, 2025)
NVIDIA Jetson AGX Orin™ and NVIDIA IGX Orin software contain a vulnerability where an attacker can cause an improper input validation issue by escalating certain permissions to a limited degree. A successful exploit of this vulnerability might lead to code execution, denial of service, data corruption, information disclosure, or escalation of privilege.
0
Attacker Value
Unknown
CVE-2024-0131
Disclosure Date: February 02, 2025 (last updated February 02, 2025)
NVIDIA GPU kernel driver for Windows and Linux contains a vulnerability where a potential user-mode attacker could read a buffer with an incorrect length. A successful exploit of this vulnerability might lead to denial of service.
0