Lucene search

K

6 matches found

CVE
CVE
added 2025/04/15 9:15 p.m.54 views

CVE-2025-1275

A maliciously crafted JPG file, when linked or imported into certain Autodesk applications, can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.

7.8CVSS7.8AI score0.00029EPSS
CVE
CVE
added 2025/04/15 9:15 p.m.52 views

CVE-2025-1656

A maliciously crafted PDF file, when linked or imported into Autodesk applications, can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.

7.8CVSS7.7AI score0.0002EPSS
CVE
CVE
added 2025/04/15 9:15 p.m.49 views

CVE-2025-1273

A maliciously crafted PDF file, when linked or imported into Autodesk applications, can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.

7.8CVSS7.7AI score0.0002EPSS
CVE
CVE
added 2025/04/15 9:15 p.m.49 views

CVE-2025-2497

A maliciously crafted DWG file, when parsed through Autodesk Revit, can cause a Stack-Based Buffer Overflow vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

7.8CVSS7.9AI score0.0002EPSS
CVE
CVE
added 2025/04/15 9:15 p.m.48 views

CVE-2025-1274

A maliciously crafted RCS file, when parsed through Autodesk Revit, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.

7.8CVSS7.8AI score0.00036EPSS
CVE
CVE
added 2025/04/15 9:15 p.m.48 views

CVE-2025-1277

A maliciously crafted PDF file, when parsed through Autodesk applications, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

7.8CVSS7.8AI score0.0002EPSS