Show filters
272 Total Results
Displaying 171-180 of 272
Sort by:
Attacker Value
Unknown

CVE-2022-33884

Disclosure Date: October 03, 2022 (last updated February 24, 2025)
Parsing a maliciously crafted X_B file can force Autodesk AutoCAD 2023 and 2022 to read beyond allocated boundaries. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
Attacker Value
Unknown

CVE-2022-33883

Disclosure Date: October 03, 2022 (last updated February 24, 2025)
A malicious crafted file consumed through Moldflow Synergy, Moldflow Adviser, Moldflow Communicator, and Advanced Material Exchange applications could lead to memory corruption vulnerability. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
Attacker Value
Unknown

CVE-2022-25793

Disclosure Date: August 10, 2022 (last updated February 24, 2025)
A Stack-based Buffer Overflow Vulnerability in Autodesk 3ds Max 2022, 2021, and 2020 may lead to code execution through the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer when parsing ActionScript Byte Code files. This vulnerability may allow arbitrary code execution on affected installations of Autodesk 3ds Max.
Attacker Value
Unknown

CVE-2022-27866

Disclosure Date: July 29, 2022 (last updated February 24, 2025)
A maliciously crafted TIFF file when consumed through DesignReview.exe application can be forced to read beyond allocated boundaries when parsing the TIFF file. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
Attacker Value
Unknown

CVE-2022-27865

Disclosure Date: July 29, 2022 (last updated February 24, 2025)
A maliciously crafted TGA or PCX file may be used to write beyond the allocated buffer through DesignReview.exe application while parsing TGA and PCX files. This vulnerability may be exploited to execute arbitrary code.
Attacker Value
Unknown

CVE-2022-27864

Disclosure Date: July 29, 2022 (last updated February 24, 2025)
A Double Free vulnerability allows remote attackers to execute arbitrary code through DesignReview.exe application on PDF files within affected installations. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
Attacker Value
Unknown

CVE-2022-33881

Disclosure Date: July 29, 2022 (last updated February 24, 2025)
Parsing a maliciously crafted PRT file can force Autodesk AutoCAD 2023 to read beyond allocated boundaries. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
Attacker Value
Unknown

CVE-2022-27873

Disclosure Date: July 29, 2022 (last updated February 24, 2025)
An attacker can force the victim’s device to perform arbitrary HTTP requests in WAN through a malicious SVG file being parsed by Autodesk Fusion 360’s document parser. The vulnerability exists in the application’s ‘Insert SVG’ procedure. An attacker can also leverage this vulnerability to obtain victim’s public IP and possibly other sensitive information.
Attacker Value
Unknown

CVE-2022-27872

Disclosure Date: June 21, 2022 (last updated February 23, 2025)
A maliciously crafted PDF file may be used to dereference a pointer for read or write operation while parsing PDF files in Autodesk Navisworks 2022. The vulnerability exists because the application fails to handle a crafted PDF file, which causes an unhandled exception. An attacker can leverage this vulnerability to cause a crash or read sensitive data or execute arbitrary code.
Attacker Value
Unknown

CVE-2022-27871

Disclosure Date: June 21, 2022 (last updated February 23, 2025)
Autodesk AutoCAD product suite, Revit, Design Review and Navisworks releases using PDFTron prior to 9.1.17 version may be used to write beyond the allocated buffer while parsing PDF files. This vulnerability may be exploited to execute arbitrary code.