{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T04:26:07.339","vulnerabilities":[{"cve":{"id":"CVE-2021-27036","sourceIdentifier":"psirt@autodesk.com","published":"2021-07-09T15:15:08.040","lastModified":"2024-11-21T05:57:13.430","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A maliciously crafted PCX, PICT, RCL, TIF, BMP, PSD or TIFF file can be used to write beyond the allocated buffer while parsing PCX, PDF, PICT, RCL, BMP, PSD or TIFF files. This vulnerability can be exploited to execute arbitrary code"},{"lang":"es","value":"Un archivo PCX, PICT, RCL, TIF, BMP, PSD o TIFF malicioso puede utilizarse para escribir más allá del búfer asignado mientras se analizan archivos PCX, PDF, PICT, RCL, BMP, PSD o TIFF. Esta vulnerabilidad puede ser explotada para ejecutar código arbitrario"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:design_review:2011:*:*:*:*:*:*:*","matchCriteriaId":"83CF6CDF-806C-4DC5-B572-C1C2BC2C25F2"},{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:design_review:2012:*:*:*:*:*:*:*","matchCriteriaId":"2A78B6F8-DF84-4E6C-A247-0F6D2F8CA679"},{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:design_review:2013:*:*:*:*:*:*:*","matchCriteriaId":"DCD2CA9B-16E1-4BE7-A4E1-A9817A503958"},{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:design_review:2017:*:*:*:*:*:*:*","matchCriteriaId":"31F2529F-ECF0-4568-BBDC-82B396A52332"},{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*","matchCriteriaId":"213232B9-A40B-436D-A66A-B65C49D59BE6"},{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:design_review:2018:hotfix:*:*:*:*:*:*","matchCriteriaId":"2D0CF4DC-ACA5-41D0-B28E-CEB5D2C96F71"},{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:design_review:2018:hotfix2:*:*:*:*:*:*","matchCriteriaId":"84ED1789-A17F-48F7-A152-09D2A5C59254"},{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:design_review:2018:hotfix3:*:*:*:*:*:*","matchCriteriaId":"74819924-EB63-4BBF-9986-FEF6100EEE15"}]}]}],"references":[{"url":"https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004","source":"psirt@autodesk.com","tags":["Patch","Vendor Advisory"]},{"url":"https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}