{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-28T15:00:08.004","vulnerabilities":[{"cve":{"id":"CVE-2024-53877","sourceIdentifier":"psirt@nvidia.com","published":"2025-02-25T21:15:16.980","lastModified":"2025-09-18T17:54:19.910","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"NVIDIA CUDA toolkit for all platforms contains a vulnerability in the nvdisasm binary, where a user could cause a NULL pointer exception by passing a malformed ELF file to nvdisasm. A successful exploit of this vulnerability might lead to a partial denial of service."},{"lang":"es","value":"El kit de herramientas NVIDIA CUDA para todas las plataformas contiene una vulnerabilidad en el binario nvdisasm, donde un usuario podría provocar una excepción de puntero NULL al pasar un archivo ELF mal formado a nvdisasm. Una explotación exitosa de esta vulnerabilidad podría provocar una denegación parcial del servicio."}],"metrics":{"cvssMetricV31":[{"source":"psirt@nvidia.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L","baseScore":3.3,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":1.8,"impactScore":1.4}]},"weaknesses":[{"source":"psirt@nvidia.com","type":"Secondary","description":[{"lang":"en","value":"CWE-476"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:nvidia:cuda_toolkit:*:*:*:*:*:*:*:*","versionEndExcluding":"12.8.0","matchCriteriaId":"5A19B5E5-CA6E-4744-B72F-E805816FED75"}]}]}],"references":[{"url":"https://nvidia.custhelp.com/app/answers/detail/a_id/5594","source":"psirt@nvidia.com","tags":["Vendor Advisory"]}]}}]}