Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:autodesk:design_review:2011:*:*:*:*:*:*:*", "matchCriteriaId": "83CF6CDF-806C-4DC5-B572-C1C2BC2C25F2", "vulnerable": true}, {"criteria": "cpe:2.3:a:autodesk:design_review:2012:*:*:*:*:*:*:*", "matchCriteriaId": "2A78B6F8-DF84-4E6C-A247-0F6D2F8CA679", "vulnerable": true}, {"criteria": "cpe:2.3:a:autodesk:design_review:2013:*:*:*:*:*:*:*", "matchCriteriaId": "DCD2CA9B-16E1-4BE7-A4E1-A9817A503958", "vulnerable": true}, {"criteria": "cpe:2.3:a:autodesk:design_review:2017:*:*:*:*:*:*:*", "matchCriteriaId": "31F2529F-ECF0-4568-BBDC-82B396A52332", "vulnerable": true}, {"criteria": "cpe:2.3:a:autodesk:design_review:2018:*:*:*:*:*:*:*", "matchCriteriaId": "7D07C55F-1D23-4E2B-AC1E-67D735F800B7", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "A Type Confusion vulnerability in Autodesk Design Review 2018, 2017, 2013, 2012, 2011 can occur when processing a maliciously crafted PDF file. A malicious actor can leverage this to execute arbitrary code."}, {"lang": "es", "value": "Una vulnerabilidad de confusi\u00f3n de tipo en Autodesk Design Review 2018, 2017, 2013, 2012, 2011 puede ocurrir al procesar un archivo PDF maliciosamente dise\u00f1ado. Un actor malicioso puede aprovechar esto para ejecutar c\u00f3digo arbitrario"}], "id": "CVE-2021-27038", "lastModified": "2024-11-21T05:57:13.657", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2021-07-09T15:15:08.317", "references": [{"source": "psirt@autodesk.com", "tags": ["Patch", "Vendor Advisory"], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004"}], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-843"}], "source": "nvd@nist.gov", "type": "Primary"}]}