📦 Design Review

by Autodesk

🔍 What is Design Review?

Description coming soon...

🛡️ Security Overview

Click on a severity to filter vulnerabilities

⚠️ Known Vulnerabilities

CVE-2022-27864

HIGH CVSS 8.8 Jul 29, 2022

CVE-2022-27864 is a double free vulnerability in Autodesk Design Review that allows remote attackers to execute arbitrary code when users open malicious PDF files. This affects users of Autodesk Desig...

CVE-2022-27866

HIGH CVSS 7.8 Jul 29, 2022

CVE-2022-27866 is an out-of-bounds read vulnerability in Autodesk Design Review's TIFF file parser. Attackers can craft malicious TIFF files that cause the application to read beyond allocated memory ...

CVE-2022-27526

HIGH CVSS 7.8 Apr 18, 2022

This vulnerability allows an attacker to execute arbitrary code by tricking a user into opening a malicious TGA image file in Autodesk Design Review. It affects users of Autodesk Design Review who ope...

CVE-2021-40167

HIGH CVSS 7.8 Jan 25, 2022

This vulnerability allows memory corruption through specially crafted DWF or PCT files when opened in Autodesk Design Review. Attackers could potentially execute arbitrary code by exploiting this read...

CVE-2021-40160

HIGH CVSS 7.8 Dec 23, 2021

CVE-2021-40160 is an out-of-bounds read vulnerability in PDFTron PDF parsing libraries prior to version 9.0.7. Attackers can exploit this by crafting malicious PDF files to read beyond allocated memor...

CVE-2021-27036

HIGH CVSS 7.8 Jul 9, 2021

This is a buffer overflow vulnerability in Autodesk software that allows arbitrary code execution when processing malicious image files. Attackers can exploit it by tricking users into opening special...

CVE-2021-27038

HIGH CVSS 7.8 Jul 9, 2021

A Type Confusion vulnerability in Autodesk Design Review allows arbitrary code execution when processing malicious PDF files. This affects users of Autodesk Design Review 2018, 2017, 2013, 2012, and 2...

CVE-2021-27034

HIGH CVSS 7.8 Jul 9, 2021

This heap-based buffer overflow vulnerability in Autodesk Design Review allows attackers to execute arbitrary code by tricking users into opening malicious PICT, PCX, RCL, or TIFF files. Users of affe...