
CVE-2023-25004
https://notcve.org/view.php?id=CVE-2023-25004
27 Jun 2023 — A maliciously crafted pskernel.dll file in Autodesk products is used to trigger integer overflow vulnerabilities. Exploitation of these vulnerabilities may lead to code execution. • https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0009 • CWE-190: Integer Overflow or Wraparound •

CVE-2023-29068
https://notcve.org/view.php?id=CVE-2023-29068
27 Jun 2023 — A maliciously crafted file consumed through pskernel.dll file could lead to memory corruption vulnerabilities. These vulnerabilities in conjunction with other vulnerabilities could lead to code execution in the context of the current process. • https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0009 • CWE-787: Out-of-bounds Write •

CVE-2023-25003
https://notcve.org/view.php?id=CVE-2023-25003
23 Jun 2023 — A maliciously crafted pskernel.dll file in Autodesk AutoCAD 2023 and Maya 2022 may be used to trigger out-of-bound read write / read vulnerabilities. Exploitation of this vulnerability may lead to code execution. • https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0009 • CWE-125: Out-of-bounds Read CWE-787: Out-of-bounds Write •

CVE-2023-25005
https://notcve.org/view.php?id=CVE-2023-25005
12 May 2023 — A maliciously crafted DLL file can be forced to read beyond allocated boundaries in Autodesk InfraWorks 2023, and 2021 when parsing the DLL files could lead to a resource injection vulnerability. • https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0006 • CWE-427: Uncontrolled Search Path Element •

CVE-2021-40162
https://notcve.org/view.php?id=CVE-2021-40162
07 Oct 2022 — A maliciously crafted TIF, PICT, TGA, or RLC files in Autodesk Image Processing component may be forced to read beyond allocated boundaries when parsing the TIFF, PICT, TGA, or RLC files. This vulnerability may be exploited to execute arbitrary code. Los archivos TIF, PICT, TGA o RLC diseñados de forma maliciosa en el componente de procesamiento de imágenes de Autodesk pueden ser forzados a leer más allá de los límites asignados cuando son analizados los archivos TIFF, PICT, TGA o RLC. Esta vulnerabilidad p... • https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011 • CWE-125: Out-of-bounds Read •

CVE-2021-40163
https://notcve.org/view.php?id=CVE-2021-40163
07 Oct 2022 — A Memory Corruption vulnerability may lead to code execution through maliciously crafted DLL files through Autodesk Image Processing component. Una vulnerabilidad de corrupción de memoria puede conllevar a una ejecución de código mediante archivos DLL diseñados de forma maliciosa por medio del componente de procesamiento de imágenes de Autodesk • https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011 • CWE-787: Out-of-bounds Write •

CVE-2021-40164
https://notcve.org/view.php?id=CVE-2021-40164
07 Oct 2022 — A heap-based buffer overflow could occur while parsing TIFF, PICT, TGA, or RLC files. This vulnerability may be exploited to execute arbitrary code. Podría producirse un desbordamiento del búfer en la región heap de la memoria pila mientras son analizados archivos TIFF, PICT, TGA o RLC. Esta vulnerabilidad puede ser explotada para ejecutar código arbitrario • https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011 • CWE-787: Out-of-bounds Write •

CVE-2021-40165
https://notcve.org/view.php?id=CVE-2021-40165
07 Oct 2022 — A maliciously crafted TIFF, PICT, TGA, or RLC file in Autodesk Image Processing component may be used to write beyond the allocated buffer while parsing TIFF, PICT, TGA, or RLC files. This vulnerability may be exploited to execute arbitrary code. Un archivo TIFF, PICT, TGA o RLC diseñado de forma maliciosa en el componente de procesamiento de imágenes de Autodesk puede usarse para escribir más allá del búfer asignado mientras se analizan los archivos TIFF, PICT, TGA o RLC. Esta vulnerabilidad puede ser expl... • https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011 • CWE-787: Out-of-bounds Write •

CVE-2021-40166
https://notcve.org/view.php?id=CVE-2021-40166
07 Oct 2022 — A maliciously crafted PNG file in Autodesk Image Processing component may be used to attempt to free an object that has already been freed while parsing them. This vulnerability may be exploited by attackers to execute arbitrary code. Un archivo PNG diseñado de forma maliciosa en el componente de procesamiento de imágenes de Autodesk puede usarse para intentar liberar un objeto que ya ha sido liberado mientras es analizado. Esta vulnerabilidad puede ser explotada por atacantes para ejecutar código arbitrari... • https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011 • CWE-416: Use After Free •