Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
autodesk design review 2012 vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2021-27033
A Double Free vulnerability allows remote malicious users to execute arbitrary code on PDF files within affected installations of Autodesk Design Review 2018, 2017, 2013, 2012, 2011. User interaction is required to exploit this vulnerability in that the target must visit a malici...
Autodesk Design Review 2013
Autodesk Design Review 2012
Autodesk Design Review 2018
Autodesk Design Review 2011
Autodesk Design Review 2017
7.8
CVSSv3
CVE-2019-7362
DLL preloading vulnerability in Autodesk Design Review versions 2011, 2012, 2013, and 2018. An attacker may trick a user into opening a malicious DWF file that may leverage a DLL preloading vulnerability, which may result in code execution.
Autodesk Design Review 2011
Autodesk Design Review 2013
Autodesk Design Review 2012
Autodesk Design Review 2018
7.8
CVSSv3
CVE-2019-7363
Use-after-free vulnerability in Autodesk Design Review versions 2011, 2012, 2013, and 2018. An attacker may trick a user into opening a malicious DWF file that may leverage a use-after-free vulnerability, which may result in code execution.
Autodesk Design Review 2012
Autodesk Design Review 2013
Autodesk Design Review 2018
Autodesk Design Review 2011
7.8
CVSSv3
CVE-2021-27039
A maliciously crafted TIFF and PCX file can be forced to read and write beyond allocated boundaries when parsing the TIFF and PCX file for based overflow. This vulnerability can be exploited to execute arbitrary code.
Autodesk Autocad
Autodesk Design Review 2011
Autodesk Design Review 2012
Autodesk Design Review 2013
Autodesk Design Review 2017
Autodesk Design Review 2018
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
HTML injection
CVE-2024-35894
SQL
CVE-2024-5105
CVE-2014-100005
CVE-2024-35895
unauthorized
CVE-2024-22120
CVE-2024-35890
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2