{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T06:44:01.662","vulnerabilities":[{"cve":{"id":"CVE-2026-0536","sourceIdentifier":"psirt@autodesk.com","published":"2026-02-04T19:16:14.290","lastModified":"2026-02-05T22:06:39.947","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A maliciously crafted GIF file, when parsed through Autodesk 3ds Max, can cause a Stack-Based Buffer Overflow vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process."},{"lang":"es","value":"Un archivo GIF creado maliciosamente, al ser analizado por Autodesk 3ds Max, puede causar una vulnerabilidad de desbordamiento de búfer basado en pila. Un actor malicioso puede aprovechar esta vulnerabilidad para ejecutar código arbitrario en el contexto del proceso actual."}],"metrics":{"cvssMetricV31":[{"source":"psirt@autodesk.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"psirt@autodesk.com","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:autodesk:3ds_max:*:*:*:*:*:*:*:*","versionStartIncluding":"2026","versionEndExcluding":"2026.3.2","matchCriteriaId":"CF0B2FEF-FF28-4FF2-91CF-B417FB77CF04"}]}]}],"references":[{"url":"https://www.autodesk.com/products/autodesk-access/overview","source":"psirt@autodesk.com","tags":["Product"]},{"url":"https://www.autodesk.com/trust/security-advisories/adsk-sa-2026-0002","source":"psirt@autodesk.com","tags":["Vendor Advisory"]}]}}]}