cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-0116,https://securityvulnerability.io/vulnerability/CVE-2024-0116,NVIDIA Triton Inference Server Out-of-Bounds Read Vulnerability,NVIDIA Triton Inference Server contains a vulnerability where a user may cause an out-of-bounds read issue by releasing a shared memory region while it is in use. A successful exploit of this vulnerability may lead to denial of service.,Nvidia,Triton Inference Server,4.9,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-10-01T04:46:22.405Z,0 CVE-2024-0095,https://securityvulnerability.io/vulnerability/CVE-2024-0095,Triton Inference Server Vulnerability Allows for Log Injection and Code Execution,"NVIDIA Triton Inference Server for Linux and Windows contains a vulnerability where a user can inject forged logs and executable commands by injecting arbitrary data as a new log entry. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.",Nvidia,Nvidia Triton Inference Server,4.3,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-06-13T21:16:51.975Z,0 CVE-2024-0103,https://securityvulnerability.io/vulnerability/CVE-2024-0103,NVIDIA Triton Inference Server Vulnerability Could Lead to Information Disclosure,NVIDIA Triton Inference Server for Linux contains a vulnerability where a user may cause an incorrect Initialization of resource by network issue. A successful exploit of this vulnerability may lead to information disclosure.,Nvidia,Nvidia Triton Inference Server,5.4,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-06-13T21:16:51.611Z,0 CVE-2024-0087,https://securityvulnerability.io/vulnerability/CVE-2024-0087,"Arbitrary File Write Vulnerability in NVIDIA Triton Inference Server for Linux Could Lead to Code Execution, Denial of Service, and More","The NVIDIA Triton Inference Server for Linux has a vulnerability that permits a user to direct log output to an arbitrary file location. This capability can lead to the unintentional overwriting of existing log files if they are present, which can result in various security risks. Subsequent exploitation may allow for unauthorized code execution, denial of service, and unauthorized access to sensitive information, increasing the opportunity for data tampering and privilege escalation. This vulnerability emphasizes the importance of careful log file management and security configurations to mitigate potential threats.",Nvidia,Nvidia Triton Inference Server,9,CRITICAL,0.0004299999854993075,false,false,false,false,,false,false,2024-05-14T14:39:00.000Z,0 CVE-2024-0100,https://securityvulnerability.io/vulnerability/CVE-2024-0100,Triton Inference Server Vulnerability Could Lead to Denial of Service and Data Tampering,"NVIDIA Triton Inference Server for Linux contains a vulnerability in the tracing API, where a user can corrupt system files. A successful exploit of this vulnerability might lead to denial of service and data tampering.",Nvidia,Nvidia Triton Inference Server,6.5,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-05-14T14:39:00.000Z,0 CVE-2024-0088,https://securityvulnerability.io/vulnerability/CVE-2024-0088,NVIDIA Triton Inference Server Vulnerability Could Lead to Denial of Service and Data Tampering,"NVIDIA Triton Inference Server for Linux contains a vulnerability in shared memory APIs, where a user can cause an improper memory access issue by a network API. A successful exploit of this vulnerability might lead to denial of service and data tampering.",Nvidia,Nvidia Triton Inference Server,5.5,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-05-14T14:39:00.000Z,0 CVE-2023-31036,https://securityvulnerability.io/vulnerability/CVE-2023-31036,CVE,"A vulnerability exists in NVIDIA Triton Inference Server for both Linux and Windows platforms, triggered when the server is started with the non-default command line parameter --model-control explicit. This condition enables an attacker to exploit the model load API, potentially allowing them to perform a relative path traversal. Exploitation of this issue may result in unauthorized code execution, denial of service, privilege escalation, and the possibility of unauthorized access to sensitive information or manipulation of data.",nvidia,Triton Inference Server,8.8,HIGH,0.0008200000156648457,false,false,false,false,,false,false,2024-01-12T17:11:38.579Z,0