Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 17 Nov 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:autodesk:3ds_max:*:*:*:*:*:*:*:* |
Fri, 14 Nov 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 12 Nov 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 12 Nov 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A maliciously crafted JPG file, when parsed through Autodesk 3ds Max, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process. | |
| Title | JPG File Parsing Out-of-Bounds Write Vulnerability | |
| First Time appeared |
Autodesk
Autodesk 3ds Max |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:* | |
| Vendors & Products |
Autodesk
Autodesk 3ds Max |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: autodesk
Published:
Updated: 2026-02-26T16:57:11.530Z
Reserved: 2025-10-15T14:19:28.654Z
Link: CVE-2025-11795
Updated: 2025-11-12T20:48:21.680Z
Status : Analyzed
Published: 2025-11-12T17:15:34.780
Modified: 2025-11-17T19:22:36.510
Link: CVE-2025-11795
No data.
OpenCVE Enrichment
No data.