Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0003", "name": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0003", "tags": ["Vendor Advisory"], "refsource": "MISC"}, {"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1132/", "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1132/", "tags": ["Third Party Advisory", "VDB Entry"], "refsource": "MISC"}, {"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1131/", "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1131/", "tags": ["Third Party Advisory", "VDB Entry"], "refsource": "MISC"}, {"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1130/", "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1130/", "tags": ["Third Party Advisory", "VDB Entry"], "refsource": "MISC"}, {"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1125/", "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1125/", "tags": ["Third Party Advisory", "VDB Entry"], "refsource": "MISC"}, {"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1129/", "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1129/", "tags": ["Third Party Advisory", "VDB Entry"], "refsource": "MISC"}, {"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1128/", "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1128/", "tags": ["Third Party Advisory", "VDB Entry"], "refsource": "MISC"}, {"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1127/", "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1127/", "tags": ["Third Party Advisory", "VDB Entry"], "refsource": "MISC"}, {"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1126/", "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1126/", "tags": ["Third Party Advisory", "VDB Entry"], "refsource": "MISC"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "A heap-based buffer overflow could occur while parsing PICT, PCX, RCL or TIFF files in Autodesk Design Review 2018, 2017, 2013, 2012, 2011. This vulnerability can be exploited to execute arbitrary code."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-787"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2021-27034", "ASSIGNER": "psirt@autodesk.com"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "severity": "MEDIUM", "acInsufInfo": false, "impactScore": 6.4, "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}, "baseMetricV3": {"cvssV3": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.8}}, "publishedDate": "2021-07-09T15:15Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:autodesk:design_review:2011:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:autodesk:design_review:2012:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:autodesk:design_review:2013:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:autodesk:design_review:2017:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:autodesk:design_review:2018:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2021-12-08T20:23Z"}