{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T13:03:26.929","vulnerabilities":[{"cve":{"id":"CVE-2025-23277","sourceIdentifier":"psirt@nvidia.com","published":"2025-08-02T22:15:44.487","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"NVIDIA Display Driver for Linux and Windows contains a vulnerability in the kernel mode driver, where an attacker could access memory outside bounds permitted under normal use cases. A successful exploit of this vulnerability might lead to denial of service, data tampering, or information disclosure."},{"lang":"es","value":"El controlador de pantalla NVIDIA para Linux y Windows contiene una vulnerabilidad en el controlador de modo kernel, que permite a un atacante acceder a la memoria fuera de los límites permitidos en condiciones normales de uso. Una explotación exitosa de esta vulnerabilidad podría provocar denegación de servicio, manipulación de datos o divulgación de información."}],"metrics":{"cvssMetricV31":[{"source":"psirt@nvidia.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","baseScore":7.3,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.3,"impactScore":5.9}]},"weaknesses":[{"source":"psirt@nvidia.com","type":"Secondary","description":[{"lang":"en","value":"CWE-284"}]}],"references":[{"url":"https://https://nvidia.custhelp.com/app/answers/detail/a_id/5670","source":"psirt@nvidia.com"}]}}]}