Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 06 Feb 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:autodesk:3ds_max:*:*:*:*:*:*:*:* |
Fri, 06 Feb 2026 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Feb 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A maliciously crafted RGB file, when parsed through Autodesk 3ds Max, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process. | |
| Title | Out-of-Bounds Write in RGB File Parsing | |
| First Time appeared |
Autodesk
Autodesk 3ds Max |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:* | |
| Vendors & Products |
Autodesk
Autodesk 3ds Max |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: autodesk
Published:
Updated: 2026-02-06T04:55:23.531Z
Reserved: 2026-01-06T19:58:23.903Z
Link: CVE-2026-0661
Updated: 2026-02-04T16:54:22.922Z
Status : Analyzed
Published: 2026-02-04T17:16:12.947
Modified: 2026-02-06T16:26:55.207
Link: CVE-2026-0661
No data.
OpenCVE Enrichment
No data.