Show filters
130 Total Results
Displaying 61-70 of 130
Sort by:
Attacker Value
Unknown

CVE-2024-23126

Disclosure Date: February 22, 2024 (last updated January 27, 2025)
A maliciously crafted CATPART file when parsed CC5Dll.dll through Autodesk applications can be used to cause a Stack-based Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
0
Attacker Value
Unknown

CVE-2024-23125

Disclosure Date: February 22, 2024 (last updated January 27, 2025)
A maliciously crafted SLDPRT file when parsed ODXSW_DLL.dll through Autodesk applications can be used to cause a Stack-based Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
0
Attacker Value
Unknown

CVE-2024-23124

Disclosure Date: February 22, 2024 (last updated February 10, 2025)
A maliciously crafted STP file, when parsed in ASMIMPORT228A.dll through Autodesk AutoCAD, may force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
0
Attacker Value
Unknown

CVE-2024-23123

Disclosure Date: February 22, 2024 (last updated February 10, 2025)
A maliciously crafted CATPART file, when parsed in CC5Dll.dll and ASMBASE228A.dll through Autodesk AutoCAD, may force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
0
Attacker Value
Unknown

CVE-2024-23122

Disclosure Date: February 22, 2024 (last updated February 10, 2025)
A maliciously crafted 3DM file, when parsed in opennurbs.dll through Autodesk AutoCAD, may force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
0
Attacker Value
Unknown

CVE-2024-23121

Disclosure Date: February 22, 2024 (last updated February 10, 2025)
A maliciously crafted MODEL file, when parsed in libodxdll.dll through Autodesk AutoCAD, may force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
0
Attacker Value
Unknown

CVE-2024-23120

Disclosure Date: February 22, 2024 (last updated February 10, 2025)
A maliciously crafted STP and STEP file, when parsed in ASMIMPORT228A.dll and ASMIMPORT229A.dll through Autodesk AutoCAD, may force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
0
Attacker Value
Unknown

CVE-2024-0446

Disclosure Date: February 22, 2024 (last updated February 10, 2025)
A maliciously crafted STP, CATPART or MODEL file, when parsed in ASMKERN228A.dll and ASMdatax229A.dll through Autodesk AutoCAD, may force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
0
Attacker Value
Unknown

CVE-2023-41140

Disclosure Date: November 23, 2023 (last updated December 01, 2023)
A maliciously crafted PRT file when parsed through Autodesk AutoCAD 2024 and 2023 can be used to cause a Heap-Based Buffer Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
Attacker Value
Unknown

CVE-2023-41139

Disclosure Date: November 23, 2023 (last updated December 01, 2023)
A maliciously crafted STP file when parsed through Autodesk AutoCAD 2024 and 2023 can be used to dereference an untrusted pointer. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process.