{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T07:47:35.121","vulnerabilities":[{"cve":{"id":"CVE-2022-27864","sourceIdentifier":"psirt@autodesk.com","published":"2022-07-29T20:15:12.160","lastModified":"2024-11-21T06:56:21.373","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Double Free vulnerability allows remote attackers to execute arbitrary code through DesignReview.exe application on PDF files within affected installations. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file."},{"lang":"es","value":"Una vulnerabilidad de Doble Liberación permite a atacantes remotos ejecutar código arbitrario mediante la aplicación DesignReview.exe en archivos PDF dentro de las instalaciones afectadas. Es requerida una interacción del usuario para explotar esta vulnerabilidad, ya que el objetivo debe visitar una página maliciosa o abrir un archivo malicioso"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-415"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:design_review:2011:-:*:*:*:*:*:*","matchCriteriaId":"8E86021D-C654-4DC3-9D68-E64057566ABB"},{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:design_review:2012:-:*:*:*:*:*:*","matchCriteriaId":"D03EA125-FDF2-4A27-A020-0AC6E5F9C15E"},{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:design_review:2013:-:*:*:*:*:*:*","matchCriteriaId":"BCF10ED6-1D50-483D-9E03-9172D5CF24FD"},{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:design_review:2017:-:*:*:*:*:*:*","matchCriteriaId":"76C839AD-A4B3-4534-A7A8-17EBD59586E7"},{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*","matchCriteriaId":"213232B9-A40B-436D-A66A-B65C49D59BE6"},{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:design_review:2018:hotfix:*:*:*:*:*:*","matchCriteriaId":"2D0CF4DC-ACA5-41D0-B28E-CEB5D2C96F71"},{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:design_review:2018:hotfix2:*:*:*:*:*:*","matchCriteriaId":"84ED1789-A17F-48F7-A152-09D2A5C59254"},{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:design_review:2018:hotfix3:*:*:*:*:*:*","matchCriteriaId":"74819924-EB63-4BBF-9986-FEF6100EEE15"},{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:design_review:2018:hotfix4:*:*:*:*:*:*","matchCriteriaId":"100922EF-C773-4798-B352-B16FCAD48F36"},{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:design_review:2018:hotfix5:*:*:*:*:*:*","matchCriteriaId":"1C7E8CE3-8A75-4357-8722-17E2CE2378CC"}]}]}],"references":[{"url":"https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0009","source":"psirt@autodesk.com","tags":["Patch","Vendor Advisory"]},{"url":"https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0009","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}