mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-01 11:11:27 +00:00
32 lines
943 B
JSON
32 lines
943 B
JSON
![]() |
{
|
||
|
"id": "CVE-2024-23140",
|
||
|
"sourceIdentifier": "psirt@autodesk.com",
|
||
|
"published": "2024-06-25T02:15:10.940",
|
||
|
"lastModified": "2024-06-25T02:15:10.940",
|
||
|
"vulnStatus": "Received",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "A maliciously crafted 3DM and MODEL file, when parsed in opennurbs.dll and atf_api.dll through Autodesk applications, can force an Out-of-Bound Read. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "psirt@autodesk.com",
|
||
|
"type": "Secondary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-125"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009",
|
||
|
"source": "psirt@autodesk.com"
|
||
|
}
|
||
|
]
|
||
|
}
|