Page 7 of 41 results (0.006 seconds)

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 0

A Type Confusion vulnerability in Autodesk Design Review 2018, 2017, 2013, 2012, 2011 can occur when processing a maliciously crafted PDF file. A malicious actor can leverage this to execute arbitrary code. Una vulnerabilidad de confusión de tipo en Autodesk Design Review 2018, 2017, 2013, 2012, 2011 puede ocurrir al procesar un archivo PDF maliciosamente diseñado. Un actor malicioso puede aprovechar esto para ejecutar código arbitrario This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk Design Review. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. • https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •

CVSS: 7.8EPSS: 0%CPEs: 7EXPL: 0

A maliciously crafted PNG, PDF or DWF file in Autodesk Design Review 2018, 2017, 2013, 2012, 2011 can be used to attempt to free an object that has already been freed while parsing them. This vulnerability may be exploited by remote malicious actors to execute arbitrary code. Un archivo PNG, PDF o DWF malintencionado en Autodesk Design Review 2018, 2017, 2013, 2012, 2011 puede ser utilizado para intentar liberar un objeto que ya ha sido liberado mientras los analiza. Esta vulnerabilidad puede ser explotada por actores maliciosos remotos para ejecutar código arbitrario This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk Design Review. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PNG files. • https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 • CWE-416: Use After Free •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0

A maliciously crafted PCX, PICT, RCL, TIF, BMP, PSD or TIFF file can be used to write beyond the allocated buffer while parsing PCX, PDF, PICT, RCL, BMP, PSD or TIFF files. This vulnerability can be exploited to execute arbitrary code Un archivo PCX, PICT, RCL, TIF, BMP, PSD o TIFF malicioso puede utilizarse para escribir más allá del búfer asignado mientras se analizan archivos PCX, PDF, PICT, RCL, BMP, PSD o TIFF. Esta vulnerabilidad puede ser explotada para ejecutar código arbitrario This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk Design Review. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PCX files. Crafted data in a PCX file can trigger a write past the end of an allocated buffer. • https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0

A maliciously crafted TIFF, TIF, PICT, TGA, or DWF files in Autodesk Design Review 2018, 2017, 2013, 2012, 2011 can be forced to read beyond allocated boundaries when parsing the TIFF, PICT, TGA or DWF files. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process. Un archivo TIFF, TIF, PICT, TGA o DWF malintencionado en Autodesk Design Review 2018, 2017, 2013, 2012, 2011 puede ser forzado a leer más allá de los límites asignados al analizar los archivos TIFF, PICT, TGA o DWF. Esta vulnerabilidad en conjunto con otras vulnerabilidades podría llevar a la ejecución de código en el contexto del proceso actual This vulnerability allows remote attackers to disclose sensitive information on affected installations of Autodesk Design Review. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DWF files. • https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 0

A heap-based buffer overflow could occur while parsing PICT, PCX, RCL or TIFF files in Autodesk Design Review 2018, 2017, 2013, 2012, 2011. This vulnerability can be exploited to execute arbitrary code. Podría producirse un desbordamiento del búfer basado en la pila mientras se analizan archivos PICT, PCX, RCL o TIFF en Autodesk Design Review 2018, 2017, 2013, 2012, 2011. Esta vulnerabilidad puede ser explotada para ejecutar código arbitrario. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Autodesk Design Review. • https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0003 https://www.zerodayinitiative.com/advisories/ZDI-21-1125 https://www.zerodayinitiative.com/advisories/ZDI-21-1126 https://www.zerodayinitiative.com/advisories/ZDI-21-1127 https://www.zerodayinitiative.com/advisories/ZDI-21-1128 https://www.zerodayinitiative.com/advisories/ZDI-21-1129 https://www.zerodayinitiative.com/advisories/ZDI-21-1130 https://www.zerodayinitiative.com/advisories/ZDI-21-1131 https://www.zerodayinitiative.com/adviso • CWE-787: Out-of-bounds Write •