![]() ![]() *Note: Product list table contents subject to change. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process.Ħ) CVE-2023-41140 - A maliciously crafted PRT file when parsed through Autodesk AutoCAD 20 can be used to cause a Heap-Based Buffer Overflow. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process.ĥ) CVE-2023-41139 - A maliciously crafted STP file when parsed through Autodesk AutoCAD 20 can be used to dereference an untrusted pointer. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.Ĥ) CVE-2023-29076 - A maliciously crafted MODEL, SLDASM, SAT or CATPART file when parsed through Autodesk AutoCAD 20 could cause memory corruption vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.ģ) CVE-2023-29075 - A maliciously crafted PRT file when parsed through Autodesk AutoCAD 20 can be used to cause an Out-Of-Bounds Write. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.Ģ) CVE- 2023-29074 - A maliciously crafted CATPART file when parsed through Autodesk AutoCAD 20 can be used to cause an Out-Of-Bounds Write. The details of the vulnerabilities are as follows:ġ) CVE-2023-29073 - A maliciously crafted MODEL file when parsed through Autodesk AutoCAD 20 can be used to cause a Heap-Based Buffer Overflow.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |