Metrics
Affected Vendors & Products
Tue, 26 Aug 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:autodesk:revit:2024:*:*:*:*:*:*:* cpe:2.3:a:autodesk:revit:2025:*:*:*:*:*:*:* |
Mon, 18 Aug 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 18 Aug 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 08 May 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Autodesk
Autodesk revit |
|
| CPEs | cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Autodesk
Autodesk revit |
Mon, 09 Dec 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Dec 2024 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A maliciously crafted PDF file, when parsed through Autodesk Revit, can force an Out-of-Bounds Read. A malicious actor can leverage this vulnerability to cause a crash or could lead to an arbitrary memory leak. | |
| Title | PDF File Parsing Vulnerability in Autodesk Revit | |
| Weaknesses | CWE-125 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: autodesk
Published: 2024-12-09T17:42:15.362Z
Updated: 2025-08-26T16:51:06.761Z
Reserved: 2024-11-15T17:53:44.142Z
Link: CVE-2024-11268
Updated: 2024-12-09T18:07:54.327Z
Status : Modified
Published: 2024-12-09T18:15:22.120
Modified: 2025-08-18T21:15:29.513
Link: CVE-2024-11268
No data.