{"vulnerability": "CVE-2024-53880", "sightings": [{"uuid": "45a308ec-fbbb-4cd9-a4d5-37996dfe0905", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53880", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113988200044702459", "content": "", "creation_timestamp": "2025-02-12T00:58:20.612062Z"}, {"uuid": "ff2e7bae-4fc7-4e44-8d05-a64d7d34c981", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53880", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwyrgkjux2x", "content": "", "creation_timestamp": "2025-02-12T01:15:53.967693Z"}, {"uuid": "3a2a5dc9-5a8a-4378-ac8a-82f48b4a934c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53880", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhxddbd7l52t", "content": "", "creation_timestamp": "2025-02-12T04:24:51.802316Z"}, {"uuid": "c62c5ae4-421f-42a6-b769-6417e5c553fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53880", "type": "seen", "source": "https://t.me/cvedetector/17799", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53880 - NVIDIA Triton Inference Server Integer Overflow Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2024-53880 \nPublished : Feb. 12, 2025, 1:15 a.m. | 1\u00a0hour, 16\u00a0minutes ago \nDescription : NVIDIA Triton Inference Server contains a vulnerability in the model loading API, where a user could cause an integer overflow or wraparound error by loading a model with an extra-large file size that overflows an internal variable. A successful exploit of this vulnerability might lead to denial of service. \nSeverity: 4.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T04:19:23.000000Z"}, {"uuid": "fd89840d-7d44-41db-8af5-b97f663272a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53880", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3997", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-53880\n\ud83d\udd25 CVSS Score: 4.8 (CVSS_V3)\n\ud83d\udd39 Description: NVIDIA Triton Inference Server contains a vulnerability in the model loading API, where a user could cause an integer overflow or wraparound error by loading a model with an extra-large file size that overflows an internal variable. A successful exploit of this vulnerability might lead to denial of service.\n\ud83d\udccf Published: 2025-02-12T03:31:14Z\n\ud83d\udccf Modified: 2025-02-12T03:31:14Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-53880\n2. https://nvidia.custhelp.com/app/answers/detail/a_id/5612", "creation_timestamp": "2025-02-12T04:08:31.000000Z"}, {"uuid": "e9bf1e5d-b87e-42ca-b543-e791bf40ffb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53880", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3992", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-53880\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-12T01:15:08.940\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://nvidia.custhelp.com/app/answers/detail/a_id/5612", "creation_timestamp": "2025-02-12T03:09:22.000000Z"}]}