{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-13T10:46:20.537","vulnerabilities":[{"cve":{"id":"CVE-2021-27035","sourceIdentifier":"psirt@autodesk.com","published":"2021-07-09T15:15:07.877","lastModified":"2024-11-21T05:57:13.320","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A maliciously crafted TIFF, TIF, PICT, TGA, or DWF files in Autodesk Design Review 2018, 2017, 2013, 2012, 2011 can be forced to read beyond allocated boundaries when parsing the TIFF, PICT, TGA or DWF files. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process."},{"lang":"es","value":"Un archivo TIFF, TIF, PICT, TGA o DWF malintencionado en Autodesk Design Review 2018, 2017, 2013, 2012, 2011 puede ser forzado a leer más allá de los límites asignados al analizar los archivos TIFF, PICT, TGA o DWF. Esta vulnerabilidad en conjunto con otras vulnerabilidades podría llevar a la ejecución de código en el contexto del proceso actual"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:design_review:2011:*:*:*:*:*:*:*","matchCriteriaId":"83CF6CDF-806C-4DC5-B572-C1C2BC2C25F2"},{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:design_review:2012:*:*:*:*:*:*:*","matchCriteriaId":"2A78B6F8-DF84-4E6C-A247-0F6D2F8CA679"},{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:design_review:2013:*:*:*:*:*:*:*","matchCriteriaId":"DCD2CA9B-16E1-4BE7-A4E1-A9817A503958"},{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:design_review:2017:*:*:*:*:*:*:*","matchCriteriaId":"31F2529F-ECF0-4568-BBDC-82B396A52332"},{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*","matchCriteriaId":"213232B9-A40B-436D-A66A-B65C49D59BE6"},{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:design_review:2018:hotfix:*:*:*:*:*:*","matchCriteriaId":"2D0CF4DC-ACA5-41D0-B28E-CEB5D2C96F71"},{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:design_review:2018:hotfix2:*:*:*:*:*:*","matchCriteriaId":"84ED1789-A17F-48F7-A152-09D2A5C59254"},{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:design_review:2018:hotfix3:*:*:*:*:*:*","matchCriteriaId":"74819924-EB63-4BBF-9986-FEF6100EEE15"}]}]}],"references":[{"url":"https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004","source":"psirt@autodesk.com","tags":["Patch","Vendor Advisory"]},{"url":"https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}