{"uuid": "822a3f4a-906b-4448-8f57-f40ae0fb4055", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-23359", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11427", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23359\n\ud83d\udd25 CVSS Score: 8.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: NVIDIA Container Toolkit for Linux contains a Time-of-Check Time-of-Use (TOCTOU) vulnerability when used with default configuration, where a crafted container image could gain access to the host file system. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.\n\ud83d\udccf Published: 2025-02-12T00:52:43.646Z\n\ud83d\udccf Modified: 2025-04-11T13:24:14.643Z\n\ud83d\udd17 References:\n1. https://nvidia.custhelp.com/app/answers/detail/a_id/5616", "creation_timestamp": "2025-04-11T13:51:22.000000Z"}