Page 6 of 130 results (0.003 seconds)

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

22 Feb 2024 — A maliciously crafted STP file, when parsed in ASMIMPORT229A.dll, ASMKERN228A.dll, ASMkern229A.dll or ASMDATAX228A.dll through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, in conjunction with other vulnerabilities, can lead to code execution in the context of the current process. Un archivo STP creado con fines malintencionados en ASMKERN228A.dll o ASMDATAX228A.dll cuando se analiza mediante Autodesk AutoCAD podría provocar una vulnerabi... • https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0002 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

22 Feb 2024 — A maliciously crafted SLDASM or SLDPRT file, when parsed in ODXSW_DLL.dll through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, in conjunction with other vulnerabilities, can lead to code execution in the context of the current process. Un archivo SLDASM o SLDPRT creado con fines malintencionados en ODXSW_DLL.dll cuando se analiza a través de Autodesk AutoCAD podría provocar una vulnerabilidad de corrupción de memoria por infracción de ac... • https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0002 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

22 Feb 2024 — A maliciously crafted MODEL 3DM, STP, or SLDASM file, when in opennurbs.dll parsed through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, in conjunction with other vulnerabilities, can lead to code execution in the context of the current process. Un archivo MODEL 3DM, STP o SLDASM creado con fines malintencionados en opennurbs.dll cuando se analiza a través de Autodesk AutoCAD podría provocar una vulnerabilidad de corrupción de memoria por... • https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0002 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

22 Feb 2024 — A maliciously crafted MODEL file, when parsed in libodxdll.dll and ASMDATAX229A.dll through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, in conjunction with other vulnerabilities, can lead to code execution in the context of the current process. Un archivo MODEL creado con fines malintencionados en libodxdll.dll cuando se analiza mediante Autodesk AutoCAD podría provocar una vulnerabilidad de corrupción de memoria por infracción de acces... • https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0002 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

22 Feb 2024 — A maliciously crafted MODEL, SLDPRT, or SLDASM file, when parsed in ODXSW_DLL.dll and libodxdll.dll through Autodesk applications, can be used to cause a Heap-based Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process. Un archivo MODEL, SLDPRT o SLDASM creado con fines malintencionados cuando se analiza VCRUNTIME140.dll a través de Autodesk AutoCAD se puede utilizar para provocar un desbordamiento d... • https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0002 • CWE-122: Heap-based Buffer Overflow •

CVSS: 8.8EPSS: 0%CPEs: 5EXPL: 0

22 Feb 2024 — A maliciously crafted CATPART file, when parsed in CC5Dll.dll and ASMBASE228A.dll through Autodesk applications, can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process. Un archivo CATPART creado con fines malintencionados, cuando se analiza en CC5Dll.dll y ASMBASE228A.dll a través de Autodesk AutoCAD, puede forzar una escritura fuera de los límites. Un actor malintencionado pued... • https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0002 • CWE-787: Out-of-bounds Write •

CVSS: 8.8EPSS: 0%CPEs: 5EXPL: 0

22 Feb 2024 — A maliciously crafted 3DM file, when parsed in opennurbs.dll through Autodesk applications, can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process. Un archivo 3DM creado con fines malintencionados, cuando se analiza en opennurbs.dll a través de Autodesk AutoCAD, puede forzar una escritura fuera de los límites. Un actor malintencionado puede aprovechar esta vulnerabilidad para pr... • https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0002 • CWE-787: Out-of-bounds Write •

CVSS: 8.8EPSS: 0%CPEs: 11EXPL: 0

21 Feb 2024 — A maliciously crafted STP and STEP file when parsed in ASMIMPORT228A.dll and ASMIMPORT229A.dll and through Autodesk applications can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process. Un archivo STP creado con fines malintencionados cuando se analiza en ASMIMPORT228A.dll a través de Autodesk AutoCAD puede forzar una escritura fuera de los límites. Un actor malintencionado puede... • https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0002 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 9EXPL: 0

21 Feb 2024 — A maliciously crafted STP, CATPART or MODEL file when parsed in ASMKERN228A.dll and ASMdatax229A.dll through Autodesk applications can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process. Un archivo STP, CATPART o MODEL creado con fines malintencionados cuando se analiza en ASMKERN228A.dll a través de Autodesk AutoCAD puede forzar una escritura fuera de los límites. Un actor mali... • https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0002 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 11EXPL: 0

12 Feb 2024 — A maliciously crafted MODEL file when parsed in libodxdll.dll through Autodesk applications can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process. Un archivo MODEL creado con fines malintencionados cuando se analiza en libodxdll.dll a través de Autodesk AutoCAD puede forzar una escritura fuera de los límites. Un actor malintencionado puede aprovechar esta vulnerabilidad para pr... • https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0002 • CWE-787: Out-of-bounds Write •