RSS   Vulnerabilities for 'Autocad'   RSS

2014-02-22
 
CVE-2014-0819

CWE-20
 

 
Untrusted search path vulnerability in Autodesk AutoCAD before 2014 allows local users to gain privileges via a Trojan horse DLL in the current working directory.

 
 
CVE-2014-0818

CWE-94
 

 
Autodesk AutoCAD before 2014 allows remote attackers to execute arbitrary VBScript code via a crafted FAS file search path.

 
2013-07-18
 
CVE-2013-3665

 

 
Unspecified vulnerability in Autodesk AutoCAD through 2014, AutoCAD LT through 2014, and DWG TrueView through 2014 allows remote attackers to execute arbitrary code via a crafted DWG file.

 
2012-09-07
 
CVE-2010-5241

 

 
Multiple untrusted search path vulnerabilities in Autodesk AutoCAD 2010 allow local users to gain privileges via a Trojan horse (1) dwmapi.dll or (2) IBFS32.DLL file in the current working directory, as demonstrated by a directory that contains a .dwg file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

 
2005-12-31
 
CVE-2005-4710

 

 
Unspecified vulnerability in multiple Autodesk and AutoCAD products and product families from 2006 and earlier allows remote attackers to "gain inappropriate access to another local user's computer," aka ID DL5549329.

 

 >>> Vendor: Autodesk 44 Products
3ds max
Architectural desktop
Autocad
Autocad civil 3d
Autocad electrical
Autocad lt
Autocad mechanical
Building systems
Civil design
Inventor
Land desktop
Map 3d
Raster design
Revit
Revit structure
Survey
Utility design
VIZ
Backburner
Design review
Dwf viewer
Revit architecture
Autodesk softimage
Autodesk softimage xsi
Alias wavefront maya
Autodesk maya
Design review 2011
Autocad architecture
Autocad ecscad
Autocad map 3d
Autocad mep
Autocad p&id
Autocad plant 3d
Autocad structural detailing
Autocad utility design
Dwg trueview
Sketchbook for enterprise 2014
Sketchbook express
Sketchbook pro
Sketchbook
VRED
Design review 2013
Autodesk backburner
Fbx software development kit


Copyright 2017, cxsecurity.com

 

Back to Top