Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
autodesk design review 2012 vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2021-27037
A maliciously crafted PNG, PDF or DWF file in Autodesk Design Review 2018, 2017, 2013, 2012, 2011 can be used to attempt to free an object that has already been freed while parsing them. This vulnerability may be exploited by remote malicious actors to execute arbitrary code.
Autodesk Design Review 2013
Autodesk Design Review 2012
Autodesk Design Review 2011
Autodesk Design Review 2017
Autodesk Design Review 2018
6.8
CVSSv2
CVE-2019-7362
DLL preloading vulnerability in Autodesk Design Review versions 2011, 2012, 2013, and 2018. An attacker may trick a user into opening a malicious DWF file that may leverage a DLL preloading vulnerability, which may result in code execution.
Autodesk Design Review 2011
Autodesk Design Review 2013
Autodesk Design Review 2012
Autodesk Design Review 2018
6.8
CVSSv2
CVE-2019-7363
Use-after-free vulnerability in Autodesk Design Review versions 2011, 2012, 2013, and 2018. An attacker may trick a user into opening a malicious DWF file that may leverage a use-after-free vulnerability, which may result in code execution.
Autodesk Design Review 2012
Autodesk Design Review 2013
Autodesk Design Review 2018
Autodesk Design Review 2011
6.8
CVSSv2
CVE-2021-27039
A maliciously crafted TIFF and PCX file can be forced to read and write beyond allocated boundaries when parsing the TIFF and PCX file for based overflow. This vulnerability can be exploited to execute arbitrary code.
Autodesk Autocad
Autodesk Design Review 2011
Autodesk Design Review 2012
Autodesk Design Review 2013
Autodesk Design Review 2017
Autodesk Design Review 2018
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege escalation
CVE-2024-20696
CVE-2024-29829
CVE-2024-33999
CVE-2024-35646
physical
CVE-2024-24919
CVE-2024-31030
local users
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2