{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-12T23:22:33.619","vulnerabilities":[{"cve":{"id":"CVE-2025-23283","sourceIdentifier":"psirt@nvidia.com","published":"2025-08-02T22:15:45.160","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"NVIDIA vGPU software for Linux-style hypervisors contains a vulnerability in the Virtual GPU Manager, where a malicious guest could cause stack buffer overflow. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering."},{"lang":"es","value":"El software NVIDIA vGPU para hipervisores tipo Linux contiene una vulnerabilidad en el Administrador de GPU Virtual (VAM), donde un invitado malicioso podría causar un desbordamiento del búfer de pila. Una explotación exitosa de esta vulnerabilidad podría provocar ejecución de código, denegación de servicio, escalada de privilegios, divulgación de información o manipulación de datos."}],"metrics":{"cvssMetricV31":[{"source":"psirt@nvidia.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"psirt@nvidia.com","type":"Secondary","description":[{"lang":"en","value":"CWE-121"}]}],"references":[{"url":"https://nvidia.custhelp.com/app/answers/detail/a_id/5670","source":"psirt@nvidia.com"}]}}]}