{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T18:54:20.466","vulnerabilities":[{"cve":{"id":"CVE-2021-27039","sourceIdentifier":"psirt@autodesk.com","published":"2021-07-09T15:15:08.407","lastModified":"2024-11-21T05:57:13.760","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A maliciously crafted TIFF and PCX file can be forced to read and write beyond allocated boundaries when parsing the TIFF and PCX file for based overflow. This vulnerability can be exploited to execute arbitrary code."},{"lang":"es","value":"Un archivo TIFF y PCX malicioso puede ser forzado a leer y escribir más allá de los límites asignados cuando se analiza el archivo TIFF y PCX para el desbordamiento basado. Esta vulnerabilidad puede ser explotada para ejecutar código arbitrario"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*","versionEndExcluding":"2022.1.1","matchCriteriaId":"EC1B9EF9-2E54-46BC-A7BB-71FB77918562"},{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:design_review:2011:*:*:*:*:*:*:*","matchCriteriaId":"83CF6CDF-806C-4DC5-B572-C1C2BC2C25F2"},{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:design_review:2012:*:*:*:*:*:*:*","matchCriteriaId":"2A78B6F8-DF84-4E6C-A247-0F6D2F8CA679"},{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:design_review:2013:*:*:*:*:*:*:*","matchCriteriaId":"DCD2CA9B-16E1-4BE7-A4E1-A9817A503958"},{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:design_review:2017:*:*:*:*:*:*:*","matchCriteriaId":"31F2529F-ECF0-4568-BBDC-82B396A52332"},{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:design_review:2018:*:*:*:*:*:*:*","matchCriteriaId":"7D07C55F-1D23-4E2B-AC1E-67D735F800B7"}]}]}],"references":[{"url":"https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004","source":"psirt@autodesk.com","tags":["Vendor Advisory"]},{"url":"https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}