A maliciously crafted DWG file when parsed through Autodesk DWG TrueView can be used to cause a Stack-based Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
Max CVSS
N/A
EPSS Score
0.04%
Published
2024-03-17
Updated
2024-03-18
DWG TrueViewTM 2023 version has a DLL Search Order Hijacking vulnerability. Successful exploitation by a malicious attacker could result in remote code execution on the target system.
Max CVSS
7.8
EPSS Score
0.08%
Published
2022-12-19
Updated
2022-12-28
An out-of-bounds read can be exploited in Autodesk TrueView 2022 may lead to an exposure of sensitive information or a crash through using a maliciously crafted DWG file as an Input. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
Max CVSS
7.1
EPSS Score
0.06%
Published
2022-04-13
Updated
2022-04-21
A buffer over-read can be exploited in Autodesk TrueView 2022 may lead to an exposure of sensitive information or a crash through using a maliciously crafted DWG file as an Input. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
Max CVSS
7.1
EPSS Score
0.06%
Published
2022-04-13
Updated
2022-04-21
A maliciously crafted PDF file in Autodesk AutoCAD 2022, 2021, 2020, 2019 can be used to dereference for a write beyond the allocated buffer while parsing PDF files. The vulnerability exists because the application fails to handle a crafted PDF file, which causes an unhandled exception.
Max CVSS
7.8
EPSS Score
0.09%
Published
2022-04-13
Updated
2022-10-07
A maliciously crafted PNG file in Autodesk Image Processing component may be used to attempt to free an object that has already been freed while parsing them. This vulnerability may be exploited by attackers to execute arbitrary code.
Max CVSS
7.8
EPSS Score
0.07%
Published
2022-10-07
Updated
2022-10-11
A maliciously crafted TIFF, PICT, TGA, or RLC file in Autodesk Image Processing component may be used to write beyond the allocated buffer while parsing TIFF, PICT, TGA, or RLC files. This vulnerability may be exploited to execute arbitrary code.
Max CVSS
7.8
EPSS Score
0.07%
Published
2022-10-07
Updated
2022-10-11
A heap-based buffer overflow could occur while parsing TIFF, PICT, TGA, or RLC files. This vulnerability may be exploited to execute arbitrary code.
Max CVSS
7.8
EPSS Score
0.07%
Published
2022-10-07
Updated
2022-10-11
A Memory Corruption vulnerability may lead to code execution through maliciously crafted DLL files through Autodesk Image Processing component.
Max CVSS
7.8
EPSS Score
0.06%
Published
2022-10-07
Updated
2022-10-11
A maliciously crafted TIF, PICT, TGA, or RLC files in Autodesk Image Processing component may be forced to read beyond allocated boundaries when parsing the TIFF, PICT, TGA, or RLC files. This vulnerability may be exploited to execute arbitrary code.
Max CVSS
7.8
EPSS Score
0.07%
Published
2022-10-07
Updated
2022-10-11
An Arbitrary Address Write issue in the Autodesk DWG application can allow a malicious user to leverage the application to write in unexpected paths. In order to exploit this the attacker would need the victim to enable full page heap in the application.
Max CVSS
7.8
EPSS Score
0.11%
Published
2021-06-25
Updated
2022-05-13
A maliciously crafted DWG file can be forced to read beyond allocated boundaries when parsing the DWG file. This vulnerability can be exploited to execute arbitrary code.
Max CVSS
4.3
EPSS Score
0.21%
Published
2021-06-25
Updated
2022-05-13
Unspecified vulnerability in Autodesk AutoCAD through 2014, AutoCAD LT through 2014, and DWG TrueView through 2014 allows remote attackers to execute arbitrary code via a crafted DWG file.
Max CVSS
6.8
EPSS Score
0.12%
Published
2013-07-18
Updated
2013-07-29
13 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!