Autodesk Subassembly Composer vulnerabilities

4 known vulnerabilities affecting autodesk/subassembly_composer.

Total CVEs
4
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH4

Vulnerabilities

Page 1 of 1
CVE-2022-41307HIGHCVSS 7.8v2020v2021+2 more2022-10-14
CVE-2022-41307 [HIGH] CWE-787 CVE-2022-41307: A maliciously crafted PKT file when consumed through SubassemblyComposer.exe application could lead A maliciously crafted PKT file when consumed through SubassemblyComposer.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
nvd
CVE-2022-41308HIGHCVSS 7.8v2020v2021+2 more2022-10-14
CVE-2022-41308 [HIGH] CWE-787 CVE-2022-41308: A maliciously crafted PKT file when consumed through SubassemblyComposer.exe application could lead A maliciously crafted PKT file when consumed through SubassemblyComposer.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
nvd
CVE-2022-41305HIGHCVSS 7.8v2020v2021+2 more2022-10-14
CVE-2022-41305 [HIGH] CWE-787 CVE-2022-41305: A maliciously crafted PKT file when consumed through SubassemblyComposer.exe application could lead A maliciously crafted PKT file when consumed through SubassemblyComposer.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
nvd
CVE-2022-41301HIGHCVSS 7.8≥ 2020, < 2020.6.3≥ 2021, < 2021.3.2+2 more2022-10-03
CVE-2022-41301 [HIGH] CWE-787 CVE-2022-41301: A maliciously crafted PKT file when consumed through SubassemblyComposer.exe application could lead A maliciously crafted PKT file when consumed through SubassemblyComposer.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
nvd