Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
autodesk vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2022-33882
Under certain conditions, an attacker could create an unintended sphere of control through a vulnerability present in file delete operation in Autodesk desktop app (ADA). An attacker could leverage this vulnerability to escalate privileges and execute arbitrary code.
Autodesk Autodesk Desktop
7.8
CVSSv3
CVE-2019-7362
DLL preloading vulnerability in Autodesk Design Review versions 2011, 2012, 2013, and 2018. An attacker may trick a user into opening a malicious DWF file that may leverage a DLL preloading vulnerability, which may result in code execution.
Autodesk Design Review 2011
Autodesk Design Review 2013
Autodesk Design Review 2012
Autodesk Design Review 2018
7.8
CVSSv3
CVE-2019-7363
Use-after-free vulnerability in Autodesk Design Review versions 2011, 2012, 2013, and 2018. An attacker may trick a user into opening a malicious DWF file that may leverage a use-after-free vulnerability, which may result in code execution.
Autodesk Design Review 2012
Autodesk Design Review 2013
Autodesk Design Review 2018
Autodesk Design Review 2011
7.8
CVSSv3
CVE-2022-41308
A maliciously crafted PKT file when consumed through SubassemblyComposer.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current...
Autodesk Subassembly Composer 2020
Autodesk Subassembly Composer 2021
Autodesk Subassembly Composer 2022
Autodesk Subassembly Composer 2023
7.8
CVSSv3
CVE-2022-41305
A maliciously crafted PKT file when consumed through SubassemblyComposer.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the curren...
Autodesk Subassembly Composer 2020
Autodesk Subassembly Composer 2021
Autodesk Subassembly Composer 2022
Autodesk Subassembly Composer 2023
7.8
CVSSv3
CVE-2022-41307
A maliciously crafted PKT file when consumed through SubassemblyComposer.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current...
Autodesk Subassembly Composer 2020
Autodesk Subassembly Composer 2021
Autodesk Subassembly Composer 2022
Autodesk Subassembly Composer 2023
NA
CVE-2008-4471
Directory traversal vulnerability in the CExpressViewerControl class in the DWF Viewer ActiveX control (AdView.dll 9.0.0.96), as used in Revit Architecture 2009 SP2 and Autodesk Design Review 2009, allows remote malicious users to overwrite arbitrary files via "..\" seq...
Autodesk Design Review 2009
Autodesk Dwf Viewer
Autodesk Revit Architecture 2009
1 EDB exploit
NA
CVE-2008-4472
The UpdateEngine class in the LiveUpdate ActiveX control (LiveUpdate16.DLL 17.2.56), as used in Revit Architecture 2009 SP2 and Autodesk Design Review 2009, allows remote malicious users to execute arbitrary programs via the second argument to the ApplyPatch method.
Autodesk Dwf Viewer
Autodesk Revit Architecture 2009
Autodesk Design Review 2009
1 EDB exploit
7.8
CVSSv3
CVE-2023-25001
A maliciously crafted SKP file in Autodesk Navisworks 2023 and 2022 be used to trigger use-after-free vulnerability. Exploitation of this vulnerability may lead to code execution.
Autodesk Navisworks 2022
Autodesk Navisworks 2023
NA
CVE-2014-3938
Integer overflow in Autodesk SketchBook Pro prior to 6.2.6 allows remote malicious users to execute arbitrary code via crafted layer mask data in a PSD file, which triggers a heap-based buffer overflow.
Autodesk Sketchbook Pro 6.2.4
Autodesk Sketchbook Pro
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-25525
CVE-2024-4652
CVE-2024-1438
CVE-2024-4671
CVE-2024-34351
arbitrary
CVE-2024-4650
SQL injection
overflow
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »