
CVE-2023-25004
https://notcve.org/view.php?id=CVE-2023-25004
27 Jun 2023 — A maliciously crafted pskernel.dll file in Autodesk products is used to trigger integer overflow vulnerabilities. Exploitation of these vulnerabilities may lead to code execution. • https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0009 • CWE-190: Integer Overflow or Wraparound •

CVE-2023-29068
https://notcve.org/view.php?id=CVE-2023-29068
27 Jun 2023 — A maliciously crafted file consumed through pskernel.dll file could lead to memory corruption vulnerabilities. These vulnerabilities in conjunction with other vulnerabilities could lead to code execution in the context of the current process. • https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0009 • CWE-787: Out-of-bounds Write •

CVE-2023-25003
https://notcve.org/view.php?id=CVE-2023-25003
23 Jun 2023 — A maliciously crafted pskernel.dll file in Autodesk AutoCAD 2023 and Maya 2022 may be used to trigger out-of-bound read write / read vulnerabilities. Exploitation of this vulnerability may lead to code execution. • https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0009 • CWE-125: Out-of-bounds Read CWE-787: Out-of-bounds Write •

CVE-2021-40162
https://notcve.org/view.php?id=CVE-2021-40162
07 Oct 2022 — A maliciously crafted TIF, PICT, TGA, or RLC files in Autodesk Image Processing component may be forced to read beyond allocated boundaries when parsing the TIFF, PICT, TGA, or RLC files. This vulnerability may be exploited to execute arbitrary code. Los archivos TIF, PICT, TGA o RLC diseñados de forma maliciosa en el componente de procesamiento de imágenes de Autodesk pueden ser forzados a leer más allá de los límites asignados cuando son analizados los archivos TIFF, PICT, TGA o RLC. Esta vulnerabilidad p... • https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011 • CWE-125: Out-of-bounds Read •

CVE-2021-40163
https://notcve.org/view.php?id=CVE-2021-40163
07 Oct 2022 — A Memory Corruption vulnerability may lead to code execution through maliciously crafted DLL files through Autodesk Image Processing component. Una vulnerabilidad de corrupción de memoria puede conllevar a una ejecución de código mediante archivos DLL diseñados de forma maliciosa por medio del componente de procesamiento de imágenes de Autodesk • https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011 • CWE-787: Out-of-bounds Write •

CVE-2021-40164
https://notcve.org/view.php?id=CVE-2021-40164
07 Oct 2022 — A heap-based buffer overflow could occur while parsing TIFF, PICT, TGA, or RLC files. This vulnerability may be exploited to execute arbitrary code. Podría producirse un desbordamiento del búfer en la región heap de la memoria pila mientras son analizados archivos TIFF, PICT, TGA o RLC. Esta vulnerabilidad puede ser explotada para ejecutar código arbitrario • https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011 • CWE-787: Out-of-bounds Write •

CVE-2021-40165
https://notcve.org/view.php?id=CVE-2021-40165
07 Oct 2022 — A maliciously crafted TIFF, PICT, TGA, or RLC file in Autodesk Image Processing component may be used to write beyond the allocated buffer while parsing TIFF, PICT, TGA, or RLC files. This vulnerability may be exploited to execute arbitrary code. Un archivo TIFF, PICT, TGA o RLC diseñado de forma maliciosa en el componente de procesamiento de imágenes de Autodesk puede usarse para escribir más allá del búfer asignado mientras se analizan los archivos TIFF, PICT, TGA o RLC. Esta vulnerabilidad puede ser expl... • https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011 • CWE-787: Out-of-bounds Write •

CVE-2021-40166
https://notcve.org/view.php?id=CVE-2021-40166
07 Oct 2022 — A maliciously crafted PNG file in Autodesk Image Processing component may be used to attempt to free an object that has already been freed while parsing them. This vulnerability may be exploited by attackers to execute arbitrary code. Un archivo PNG diseñado de forma maliciosa en el componente de procesamiento de imágenes de Autodesk puede usarse para intentar liberar un objeto que ya ha sido liberado mientras es analizado. Esta vulnerabilidad puede ser explotada por atacantes para ejecutar código arbitrari... • https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011 • CWE-416: Use After Free •

CVE-2022-25788 – Autodesk AutoCAD JT File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2022-25788
11 Mar 2022 — A maliciously crafted JT file in Autodesk AutoCAD 2022 may be used to write beyond the allocated buffer while parsing JT files. This vulnerability can be exploited to execute arbitrary code. Un archivo JT malicioso en Autodesk AutoCAD versión 2022 puede usarse para escribir más allá del búfer asignado mientras son analizados los archivos JT. Esta vulnerabilidad puede ser explotada para ejecutar código arbitrario This vulnerability allows remote attackers to execute arbitrary code on affected installations o... • https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0002 • CWE-787: Out-of-bounds Write •

CVE-2021-40158 – Autodesk AutoCAD JT File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2021-40158
25 Jan 2022 — A maliciously crafted JT file in Autodesk Inventor 2022, 2021, 2020, 2019 and AutoCAD 2022 may be forced to read beyond allocated boundaries when parsing the JT file. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process. Un archivo JT malicioso en Autodesk Inventor 2022, 2021, 2020, 2019 y AutoCAD 2022 puede ser forzado a leer más allá de los límites asignados cuando se analiza el archivo JT. Esta vulnerabilidad, junto con otras, pod... • https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0002 • CWE-125: Out-of-bounds Read •