diff --git a/2023/52xxx/CVE-2023-52076.json b/2023/52xxx/CVE-2023-52076.json index 6bf851622dc..335f92f833f 100644 --- a/2023/52xxx/CVE-2023-52076.json +++ b/2023/52xxx/CVE-2023-52076.json @@ -95,6 +95,11 @@ "url": "https://github.com/mate-desktop/atril/releases/tag/v1.26.2", "refsource": "MISC", "name": "https://github.com/mate-desktop/atril/releases/tag/v1.26.2" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00003.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-lts-announce/2024/06/msg00003.html" } ] }, diff --git a/2024/23xxx/CVE-2024-23121.json b/2024/23xxx/CVE-2024-23121.json index 9cdc999e082..f98f8e3f82a 100644 --- a/2024/23xxx/CVE-2024-23121.json +++ b/2024/23xxx/CVE-2024-23121.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A maliciously crafted MODEL file in libodxdll.dll when parsed through Autodesk AutoCAD can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process.\n" + "value": "A maliciously crafted MODEL file when parsed in libodxdll.dll through Autodesk applications can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process." } ] }, @@ -36,7 +36,7 @@ "product": { "product_data": [ { - "product_name": "AutoCAD, Advance Steel and Civil 3D", + "product_name": "Autodesk applications", "version": { "version_data": [ { @@ -63,6 +63,11 @@ "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0004", "refsource": "MISC", "name": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0004" + }, + { + "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009", + "refsource": "MISC", + "name": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009" } ] },