Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2006-5379

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-18 Oct, 2006 | 10:00
Updated At-07 Aug, 2024 | 19:48
Rejected At-
Credits

The accelerated rendering functionality of NVIDIA Binary Graphics Driver (binary blob driver) For Linux v8774 and v8762, and probably on other operating systems, allows local and remote attackers to execute arbitrary code via a large width value in a font glyph, which can be used to overwrite arbitrary memory locations.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:18 Oct, 2006 | 10:00
Updated At:07 Aug, 2024 | 19:48
Rejected At:
▼CVE Numbering Authority (CNA)

The accelerated rendering functionality of NVIDIA Binary Graphics Driver (binary blob driver) For Linux v8774 and v8762, and probably on other operating systems, allows local and remote attackers to execute arbitrary code via a large width value in a font glyph, which can be used to overwrite arbitrary memory locations.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.vupen.com/english/advisories/2006/4053
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/22730
third-party-advisory
x_refsource_SECUNIA
http://download2.rapid7.com/r7-0025/nv_exploit.c
x_refsource_MISC
http://security.gentoo.org/glsa/glsa-200611-03.xml
vendor-advisory
x_refsource_GENTOO
http://www.securityfocus.com/bid/20559
vdb-entry
x_refsource_BID
http://securityreason.com/securityalert/1742
third-party-advisory
x_refsource_SREASON
http://www.ubuntu.com/usn/usn-377-1
vendor-advisory
x_refsource_UBUNTU
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102693-1
vendor-advisory
x_refsource_SUNALERT
http://www.rapid7.com/advisories/R7-0025.jsp
x_refsource_MISC
http://secunia.com/advisories/22419
third-party-advisory
x_refsource_SECUNIA
http://securitytracker.com/id?1017072
vdb-entry
x_refsource_SECTRACK
http://www.kb.cert.org/vuls/id/147252
third-party-advisory
x_refsource_CERT-VN
https://exchange.xforce.ibmcloud.com/vulnerabilities/29622
vdb-entry
x_refsource_XF
http://www.vupen.com/english/advisories/2006/4328
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/22676
third-party-advisory
x_refsource_SECUNIA
http://nvidia.custhelp.com/cgi-bin/nvidia.cfg/php/enduser/std_adp.php?p_faqid=1971
x_refsource_CONFIRM
http://www.securityfocus.com/archive/1/451329/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://www.mandriva.com/security/advisories?name=MDKSA-2007:007
vendor-advisory
x_refsource_MANDRIVA
http://secunia.com/advisories/23678
third-party-advisory
x_refsource_SECUNIA
http://download2.rapid7.com/r7-0025/
x_refsource_MISC
http://www.securityfocus.com/archive/1/448860/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://secunia.com/advisories/22764
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2006/4053
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/22730
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://download2.rapid7.com/r7-0025/nv_exploit.c
Resource:
x_refsource_MISC
Hyperlink: http://security.gentoo.org/glsa/glsa-200611-03.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://www.securityfocus.com/bid/20559
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://securityreason.com/securityalert/1742
Resource:
third-party-advisory
x_refsource_SREASON
Hyperlink: http://www.ubuntu.com/usn/usn-377-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102693-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: http://www.rapid7.com/advisories/R7-0025.jsp
Resource:
x_refsource_MISC
Hyperlink: http://secunia.com/advisories/22419
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://securitytracker.com/id?1017072
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.kb.cert.org/vuls/id/147252
Resource:
third-party-advisory
x_refsource_CERT-VN
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/29622
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://www.vupen.com/english/advisories/2006/4328
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/22676
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://nvidia.custhelp.com/cgi-bin/nvidia.cfg/php/enduser/std_adp.php?p_faqid=1971
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/archive/1/451329/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2007:007
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://secunia.com/advisories/23678
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://download2.rapid7.com/r7-0025/
Resource:
x_refsource_MISC
Hyperlink: http://www.securityfocus.com/archive/1/448860/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://secunia.com/advisories/22764
Resource:
third-party-advisory
x_refsource_SECUNIA
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.vupen.com/english/advisories/2006/4053
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/22730
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://download2.rapid7.com/r7-0025/nv_exploit.c
x_refsource_MISC
x_transferred
http://security.gentoo.org/glsa/glsa-200611-03.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://www.securityfocus.com/bid/20559
vdb-entry
x_refsource_BID
x_transferred
http://securityreason.com/securityalert/1742
third-party-advisory
x_refsource_SREASON
x_transferred
http://www.ubuntu.com/usn/usn-377-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102693-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
http://www.rapid7.com/advisories/R7-0025.jsp
x_refsource_MISC
x_transferred
http://secunia.com/advisories/22419
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://securitytracker.com/id?1017072
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.kb.cert.org/vuls/id/147252
third-party-advisory
x_refsource_CERT-VN
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/29622
vdb-entry
x_refsource_XF
x_transferred
http://www.vupen.com/english/advisories/2006/4328
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/22676
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://nvidia.custhelp.com/cgi-bin/nvidia.cfg/php/enduser/std_adp.php?p_faqid=1971
x_refsource_CONFIRM
x_transferred
http://www.securityfocus.com/archive/1/451329/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://www.mandriva.com/security/advisories?name=MDKSA-2007:007
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://secunia.com/advisories/23678
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://download2.rapid7.com/r7-0025/
x_refsource_MISC
x_transferred
http://www.securityfocus.com/archive/1/448860/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://secunia.com/advisories/22764
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/4053
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/22730
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://download2.rapid7.com/r7-0025/nv_exploit.c
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-200611-03.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://www.securityfocus.com/bid/20559
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://securityreason.com/securityalert/1742
Resource:
third-party-advisory
x_refsource_SREASON
x_transferred
Hyperlink: http://www.ubuntu.com/usn/usn-377-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102693-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: http://www.rapid7.com/advisories/R7-0025.jsp
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://secunia.com/advisories/22419
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://securitytracker.com/id?1017072
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.kb.cert.org/vuls/id/147252
Resource:
third-party-advisory
x_refsource_CERT-VN
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/29622
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/4328
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/22676
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://nvidia.custhelp.com/cgi-bin/nvidia.cfg/php/enduser/std_adp.php?p_faqid=1971
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/451329/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2007:007
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://secunia.com/advisories/23678
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://download2.rapid7.com/r7-0025/
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/448860/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://secunia.com/advisories/22764
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:18 Oct, 2006 | 04:06
Updated At:17 Oct, 2018 | 21:42

The accelerated rendering functionality of NVIDIA Binary Graphics Driver (binary blob driver) For Linux v8774 and v8762, and probably on other operating systems, allows local and remote attackers to execute arbitrary code via a large width value in a font glyph, which can be used to overwrite arbitrary memory locations.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.07.5HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
Type: Primary
Version: 2.0
Base score: 7.5
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

NVIDIA Corporation
nvidia
>>binary_graphics_driver>>v8762
cpe:2.3:a:nvidia:binary_graphics_driver:v8762:*:linux:*:*:*:*:*
NVIDIA Corporation
nvidia
>>binary_graphics_driver>>v8774
cpe:2.3:a:nvidia:binary_graphics_driver:v8774:*:linux:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
CWE ID: NVD-CWE-Other
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://download2.rapid7.com/r7-0025/cve@mitre.org
N/A
http://download2.rapid7.com/r7-0025/nv_exploit.ccve@mitre.org
Exploit
http://nvidia.custhelp.com/cgi-bin/nvidia.cfg/php/enduser/std_adp.php?p_faqid=1971cve@mitre.org
N/A
http://secunia.com/advisories/22419cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/22676cve@mitre.org
N/A
http://secunia.com/advisories/22730cve@mitre.org
N/A
http://secunia.com/advisories/22764cve@mitre.org
N/A
http://secunia.com/advisories/23678cve@mitre.org
N/A
http://security.gentoo.org/glsa/glsa-200611-03.xmlcve@mitre.org
N/A
http://securityreason.com/securityalert/1742cve@mitre.org
N/A
http://securitytracker.com/id?1017072cve@mitre.org
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102693-1cve@mitre.org
N/A
http://www.kb.cert.org/vuls/id/147252cve@mitre.org
US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2007:007cve@mitre.org
N/A
http://www.rapid7.com/advisories/R7-0025.jspcve@mitre.org
Vendor Advisory
http://www.securityfocus.com/archive/1/448860/100/0/threadedcve@mitre.org
N/A
http://www.securityfocus.com/archive/1/451329/100/0/threadedcve@mitre.org
N/A
http://www.securityfocus.com/bid/20559cve@mitre.org
N/A
http://www.ubuntu.com/usn/usn-377-1cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2006/4053cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2006/4328cve@mitre.org
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/29622cve@mitre.org
N/A
Hyperlink: http://download2.rapid7.com/r7-0025/
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://download2.rapid7.com/r7-0025/nv_exploit.c
Source: cve@mitre.org
Resource:
Exploit
Hyperlink: http://nvidia.custhelp.com/cgi-bin/nvidia.cfg/php/enduser/std_adp.php?p_faqid=1971
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/22419
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22676
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/22730
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/22764
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/23678
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://security.gentoo.org/glsa/glsa-200611-03.xml
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://securityreason.com/securityalert/1742
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://securitytracker.com/id?1017072
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102693-1
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.kb.cert.org/vuls/id/147252
Source: cve@mitre.org
Resource:
US Government Resource
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2007:007
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.rapid7.com/advisories/R7-0025.jsp
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://www.securityfocus.com/archive/1/448860/100/0/threaded
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/451329/100/0/threaded
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/20559
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/usn-377-1
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4053
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4328
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/29622
Source: cve@mitre.org
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

7Records found

CVE-2017-14491
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-52.38% / 97.83%
||
7 Day CHG~0.00%
Published-02 Oct, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response.

Action-Not Available
Vendor-thekelleysn/aHuawei Technologies Co., Ltd.Debian GNU/LinuxSUSERed Hat, Inc.Aruba NetworksSynology, Inc.NVIDIA CorporationArista Networks, Inc.Canonical Ltd.openSUSEMicrosoft CorporationSiemens AG
Product-enterprise_linux_desktopruggedcom_rm1224_firmwarescalance_w1750d_firmwarescalance_s615enterprise_linux_workstationlinux_for_tegradnsmasqlinux_enterprise_serverleaprouter_managerlinux_enterprise_point_of_salearubaosenterprise_linux_serverdebian_linuxjetson_tk1scalance_s615_firmwaregeforce_experiencelinux_enterprise_debuginfoeosscalance_m-800diskstation_managerhonor_v9_play_firmwarejetson_tx1scalance_w1750druggedcom_rm1224ubuntu_linuxhonor_v9_playscalance_m-800_firmwarewindowsn/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-31605
Matching Score-8
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-8
Assigner-NVIDIA Corporation
CVSS Score-9.8||CRITICAL
EPSS-2.44% / 84.55%
||
7 Day CHG~0.00%
Published-01 Jul, 2022 | 17:15
Updated-03 Aug, 2024 | 07:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVFLARE, versions prior to 2.1.2, contains a vulnerability in its utils module, where YAML files are loaded via yaml.load() instead of yaml.safe_load(). The deserialization of Untrusted Data, may allow an unprivileged network attacker to cause Remote Code Execution, Denial Of Service, and Impact to both Confidentiality and Integrity.

Action-Not Available
Vendor-NVIDIA Corporation
Product-nvflareNVIDIA FLARE
CWE ID-CWE-502
Deserialization of Untrusted Data
CVE-2019-15788
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.43% / 61.93%
||
7 Day CHG~0.00%
Published-29 Aug, 2019 | 12:04
Updated-05 Aug, 2024 | 00:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Clara Genomics Analysis before 0.2.0 has an integer overflow for cudapoa memory management in allocate_block.cpp.

Action-Not Available
Vendor-n/aNVIDIA Corporation
Product-clara_genomics_analysisn/a
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2022-31604
Matching Score-8
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-8
Assigner-NVIDIA Corporation
CVSS Score-9.8||CRITICAL
EPSS-2.44% / 84.55%
||
7 Day CHG~0.00%
Published-01 Jul, 2022 | 17:15
Updated-03 Aug, 2024 | 07:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVFLARE, versions prior to 2.1.2, contains a vulnerability in its PKI implementation module, where The CA credentials are transported via pickle and no safe deserialization. The deserialization of Untrusted Data may allow an unprivileged network attacker to cause Remote Code Execution, Denial Of Service, and Impact to both Confidentiality and Integrity.

Action-Not Available
Vendor-NVIDIA Corporation
Product-nvflareNVIDIA FLARE
CWE ID-CWE-502
Deserialization of Untrusted Data
CVE-2020-11486
Matching Score-8
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-8
Assigner-NVIDIA Corporation
CVSS Score-9.8||CRITICAL
EPSS-2.13% / 83.45%
||
7 Day CHG~0.00%
Published-29 Oct, 2020 | 03:35
Updated-04 Aug, 2024 | 11:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA DGX servers, all DGX-1 with BMC firmware versions prior to 3.38.30, contain a vulnerability in the AMI BMC firmware in which software allows an attacker to upload or transfer files that can be automatically processed within the product's environment, which may lead to remote code execution.

Action-Not Available
Vendor-NVIDIA CorporationIntel Corporation
Product-bmc_firmwaredgx-1NVIDIA DGX Servers
CWE ID-CWE-434
Unrestricted Upload of File with Dangerous Type
CVE-2020-11483
Matching Score-8
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-8
Assigner-NVIDIA Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.41% / 60.36%
||
7 Day CHG~0.00%
Published-29 Oct, 2020 | 03:35
Updated-04 Aug, 2024 | 11:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA DGX servers, all DGX-1 with BMC firmware versions prior to 3.38.30 and all DGX-2 with BMC firmware versions prior to 1.06.06, contains a vulnerability in the AMI BMC firmware in which the firmware includes hard-coded credentials, which may lead to elevation of privileges or information disclosure.

Action-Not Available
Vendor-NVIDIA CorporationIntel Corporation
Product-bmc_firmwaredgx-1dgx-2NVIDIA DGX Servers
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2014-8298
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.50% / 80.38%
||
7 Day CHG~0.00%
Published-10 Dec, 2014 | 15:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The NVIDIA Linux Discrete GPU drivers before R304.125, R331.x before R331.113, R340.x before R340.65, R343.x before R343.36, and R346.x before R346.22, Linux for Tegra (L4T) driver before R21.2, and Chrome OS driver before R40 allows remote attackers to cause a denial of service (segmentation fault and X server crash) or possibly execute arbitrary code via a crafted GLX indirect rendering protocol request.

Action-Not Available
Vendor-n/aNVIDIA Corporation
Product-gpu_drivern/a
Details not found