{"vulnerability": "CVE-2024-0136", "sightings": [{"uuid": "b0a9c223-2636-473f-b294-8564531e2c86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0136", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgrvbtx5a32i", "content": "", "creation_timestamp": "2025-01-28T07:05:03.730767Z"}, {"uuid": "879f2216-a55f-4988-a5b4-c35785aa886a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0136", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113903796421420940", "content": "", "creation_timestamp": "2025-01-28T03:13:23.503176Z"}, {"uuid": "6df6304d-7f63-45bd-84df-8b13356fd7de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0136", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgrihpdzfx2r", "content": "", "creation_timestamp": "2025-01-28T03:15:37.545731Z"}, {"uuid": "865a3a79-3436-4bcf-b806-0f3c0732c01e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0136", "type": "seen", "source": "MISP/d0bda5d9-8cbc-4c6c-8803-a5e3150f9ec2", "content": "", "creation_timestamp": "2025-09-01T19:03:02.000000Z"}, {"uuid": "3a08d860-53b5-42cb-a0b2-98efc0d41a91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0136", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3213", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-0136\n\ud83d\udd25 CVSS Score: 8.0 (CVSS_V3)\n\ud83d\udd39 Description: NVIDIA Container Toolkit contains an improper isolation vulnerability where a specially crafted container image could lead to untrusted code obtaining read and write access to host devices. This vulnerability is present only when the NVIDIA Container Toolkit is configured in a nondefault way. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.\n\ud83d\udccf Published: 2025-01-28T03:31:14Z\n\ud83d\udccf Modified: 2025-01-28T03:31:14Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-0136\n2. https://nvidia.custhelp.com/app/answers/detail/a_id/5599", "creation_timestamp": "2025-01-28T04:09:11.000000Z"}, {"uuid": "2787bd02-a3c4-439d-b584-6a36cce9c30e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0136", "type": "seen", "source": "https://t.me/cvedetector/16578", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-0136 - NVIDIA Container Toolkit Improper Isolation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-0136 \nPublished : Jan. 28, 2025, 3:15 a.m. | 1\u00a0hour, 54\u00a0minutes ago \nDescription : NVIDIA Container Toolkit contains an improper isolation vulnerability where a specially crafted container image could lead to untrusted code obtaining read and write access to host devices. This vulnerability is present only when the NVIDIA Container Toolkit is configured in a nondefault way. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. \nSeverity: 7.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-28T06:15:14.000000Z"}]}