4 results (0.006 seconds)

CVSS: 7.8EPSS: 0%CPEs: 28EXPL: 0

A maliciously crafted GIF or JPEG files when parsed through Autodesk Design Review 2018, and AutoCAD 2023 and 2022 could be used to write beyond the allocated heap buffer. This vulnerability could lead to arbitrary code execution. Un archivo GIF o JPEG diseñado de forma maliciosa cuando es analizado mediante Autodesk Design Review versión 2018 y AutoCAD versiones 2023 y 2022, podría usarse para escribir más allá del búfer de la pila asignado. Esta vulnerabilidad podría conllevar a una ejecución de código arbitrario • https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0021 • CWE-787: Out-of-bounds Write •

CVSS: 7.5EPSS: 8%CPEs: 1EXPL: 0

The AdView.AdViewer.1 ActiveX control in Autodesk Design Review (ADR) before 2013 Hotfix 1 allows remote attackers to execute arbitrary code via a crafted DWF file. El control AdView.AdViewer.1 ActiveX en Autodesk Design Review (ADR) anterior a 2013 Hotfix 1 permite a atacantes remotos ejecutar código arbitrario a través de un fichero DWF manipulado. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Autodesk Design Review. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the AdView.AdViewer.1 ActiveX control. By providing a malformed DWF file to the control, an attacker can execute arbitrary code in the context of the browser. • http://knowledge.autodesk.com/support/design-review/downloads/caas/downloads/content/autodesk-design-review-2013-hotfix.html http://www.zerodayinitiative.com/advisories/ZDI-14-402 • CWE-20: Improper Input Validation •

CVSS: 9.3EPSS: 1%CPEs: 3EXPL: 2

Directory traversal vulnerability in the CExpressViewerControl class in the DWF Viewer ActiveX control (AdView.dll 9.0.0.96), as used in Revit Architecture 2009 SP2 and Autodesk Design Review 2009, allows remote attackers to overwrite arbitrary files via "..\" sequences in the argument to the SaveAS method. Vulnerabilidad de salto de directorio en la clase CExpressViewerControl en el control ActiveX DWF Viewer (AdView.dll 9.0.0.96), utilizado en Revit Architecture 2009 SP2 y Autodesk Design Review 2009, que permite a los atacante remotos sobrescribir arbitrariamente archivos a través de secuencias "..\" en el argumento to del método SaveAs. • https://www.exploit-db.com/exploits/6630 http://retrogod.altervista.org/9sg_autodesk_revit_arch_2009_exploit.html http://secunia.com/advisories/31989 http://securityreason.com/securityalert/4361 http://www.securityfocus.com/archive/1/496847/100/0/threaded http://www.securityfocus.com/bid/31487 http://www.vupen.com/english/advisories/2008/2704 https://exchange.xforce.ibmcloud.com/vulnerabilities/45519 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.3EPSS: 1%CPEs: 3EXPL: 1

The UpdateEngine class in the LiveUpdate ActiveX control (LiveUpdate16.DLL 17.2.56), as used in Revit Architecture 2009 SP2 and Autodesk Design Review 2009, allows remote attackers to execute arbitrary programs via the second argument to the ApplyPatch method. La clase UpdateEngine en el control Active X LiveUpdate (LiveUpdate16.DLL 17.2.56), utilizado en Revit Architecture 2009 SP2 y Autodesk Design Review 2009, que permite a los atacantes remotos ejecutar arbitrariamente programas a través del segundo argumento del método ApplyPatch. • https://www.exploit-db.com/exploits/6630 http://images.autodesk.com/adsk/files/live_update_hotfix0.html http://retrogod.altervista.org/9sg_autodesk_revit_arch_2009_exploit.html http://securityreason.com/securityalert/4361 http://usa.autodesk.com/adsk/servlet/ps/dl/item?siteID=123112&id=12452198&linkID=11705366 http://www.securityfocus.com/archive/1/496847/100/0/threaded http://www.securityfocus.com/bid/31490 http://www.vupen.com/english/advisories/2008/2704 https://exchange.xforce. • CWE-264: Permissions, Privileges, and Access Controls •