Vulnerabilities (CVE)

Filtered by vendor Nvidia Subscribe
Total 690 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-33201 2 Linux, Nvidia 2 Linux Kernel, Triton Inference Server 2025-12-05 N/A 7.5 HIGH
NVIDIA Triton Inference Server contains a vulnerability where an attacker may cause an improper check for unusual or exceptional conditions issue by sending extra large payloads. A successful exploit of this vulnerability may lead to denial of service.
CVE-2025-33211 2 Linux, Nvidia 2 Linux Kernel, Triton Inference Server 2025-12-05 N/A 7.5 HIGH
NVIDIA Triton Server for Linux contains a vulnerability where an attacker may cause an improper validation of specified quantity in input. A successful exploit of this vulnerability may lead to denial of service.
CVE-2025-33194 1 Nvidia 2 Dgx Os, Dgx Spark 2025-12-02 N/A 5.7 MEDIUM
NVIDIA DGX Spark GB10 contains a vulnerability in SROOT firmware, where an attacker could cause improper processing of input data. A successful exploit of this vulnerability might lead to information disclosure or denial of service.
CVE-2025-33188 1 Nvidia 2 Dgx Os, Dgx Spark 2025-12-02 N/A 8.0 HIGH
NVIDIA DGX Spark GB10 contains a vulnerability in hardware resources where an attacker could tamper with hardware controls. A successful exploit of this vulnerability might lead to information disclosure, data tampering, or denial of service.
CVE-2025-33187 1 Nvidia 2 Dgx Os, Dgx Spark 2025-12-02 N/A 9.3 CRITICAL
NVIDIA DGX Spark GB10 contains a vulnerability in SROOT, where an attacker could use privileged access to gain access to SoC protected areas. A successful exploit of this vulnerability might lead to code execution, information disclosure, data tampering, denial of service, or escalation of privileges.
CVE-2025-33189 1 Nvidia 2 Dgx Os, Dgx Spark 2025-12-02 N/A 7.8 HIGH
NVIDIA DGX Spark GB10 contains a vulnerability in SROOT firmware, where an attacker could cause an out-of-bound write. A successful exploit of this vulnerability might lead to code execution, data tampering, denial of service, information disclosure, or escalation of privileges.
CVE-2025-33190 1 Nvidia 2 Dgx Os, Dgx Spark 2025-12-02 N/A 6.7 MEDIUM
NVIDIA DGX Spark GB10 contains a vulnerability in SROOT firmware where an attacker could cause an out-of-bound write. A successful exploit of this vulnerability might lead to code execution, data tampering, denial of service, or escalation of privileges.
CVE-2025-33191 1 Nvidia 2 Dgx Os, Dgx Spark 2025-12-02 N/A 5.7 MEDIUM
NVIDIA DGX Spark GB10 contains a vulnerability in OSROOT firmware, where an attacker could cause an invalid memory read. A successful exploit of this vulnerability might lead to denial of service.
CVE-2025-33192 1 Nvidia 2 Dgx Os, Dgx Spark 2025-12-02 N/A 5.7 MEDIUM
NVIDIA DGX Spark GB10 contains a vulnerability in SROOT firmware, where an attacker could cause an arbitrary memory read. A successful exploit of this vulnerability might lead to denial of service.
CVE-2025-33193 1 Nvidia 2 Dgx Os, Dgx Spark 2025-12-02 N/A 5.7 MEDIUM
NVIDIA DGX Spark GB10 contains a vulnerability in SROOT firmware, where an attacker could cause improper validation of integrity. A successful exploit of this vulnerability might lead to information disclosure.
CVE-2025-33205 1 Nvidia 1 Nemo 2025-12-02 N/A 7.3 HIGH
NVIDIA NeMo framework contains a vulnerability in a predefined variable, where an attacker could cause inclusion of functionality from an untrusted control sphere by use of a predefined variable. A successful exploit of this vulnerability may lead to code execution.
CVE-2025-33204 1 Nvidia 1 Nemo 2025-12-02 N/A 7.8 HIGH
NVIDIA NeMo Framework for all platforms contains a vulnerability in the NLP and LLM components, where malicious data created by an attacker could cause code injection. A successful exploit of this vulnerability may lead to code execution, escalation of privileges, information disclosure, and data tampering.
CVE-2025-33195 1 Nvidia 2 Dgx Os, Dgx Spark 2025-12-02 N/A 4.4 MEDIUM
NVIDIA DGX Spark GB10 contains a vulnerability in SROOT firmware, where an attacker could cause unexpected memory buffer operations. A successful exploit of this vulnerability might lead to data tampering, denial of service, or escalation of privileges.
CVE-2025-33196 1 Nvidia 2 Dgx Os, Dgx Spark 2025-12-02 N/A 4.4 MEDIUM
NVIDIA DGX Spark GB10 contains a vulnerability in SROOT firmware, where an attacker could cause a resource to be reused. A successful exploit of this vulnerability might lead to information disclosure.
CVE-2025-33197 1 Nvidia 2 Dgx Os, Dgx Spark 2025-12-02 N/A 4.3 MEDIUM
NVIDIA DGX Spark GB10 contains a vulnerability in SROOT firmware, where an attacker could cause a NULL pointer dereference. A successful exploit of this vulnerability might lead to denial of service.
CVE-2025-33198 1 Nvidia 2 Dgx Os, Dgx Spark 2025-12-02 N/A 3.3 LOW
NVIDIA DGX Spark GB10 contains a vulnerability in SROOT firmware, where an attacker could cause a resource to be reused. A successful exploit of this vulnerability might lead to information disclosure.
CVE-2025-33199 1 Nvidia 2 Dgx Os, Dgx Spark 2025-12-02 N/A 3.2 LOW
NVIDIA DGX Spark GB10 contains a vulnerability in SROOT firmware, where an attacker could cause incorrect control flow behavior. A successful exploit of this vulnerability might lead to data tampering.
CVE-2025-33200 1 Nvidia 2 Dgx Os, Dgx Spark 2025-12-02 N/A 2.3 LOW
NVIDIA DGX Spark GB10 contains a vulnerability in SROOT firmware, where an attacker could cause a resource to be reused. A successful exploit of this vulnerability might lead to information disclosure.
CVE-2025-33178 1 Nvidia 1 Nemo 2025-11-19 N/A 7.8 HIGH
NVIDIA NeMo Framework for all platforms contains a vulnerability in the bert services component where malicious data created by an attacker may cause a code injection. A successful exploit of this vulnerability may lead to Code execution, Escalation of privileges, Information disclosure, and Data tampering.
CVE-2025-23361 1 Nvidia 1 Nemo 2025-11-19 N/A 7.8 HIGH
NVIDIA NeMo Framework for all platforms contains a vulnerability in a script, where malicious input created by an attacker may cause improper control of code generation. A successful exploit of this vulnerability may lead to code execution, escalation of privileges, information disclosure, and data tampering.