1 results (0.009 seconds)

CVSS: 9.3EPSS: 2%CPEs: 2EXPL: 3

Autodesk Softimage 7.x and Softimage XSI 6.x allow remote attackers to execute arbitrary JavaScript code via a scene package containing a Scene Table of Contents (aka .scntoc) file with a Script_Content element, as demonstrated by code that loads the WScript.Shell ActiveX control. Autodesk Softimage v7.x y Softimage XSI v6.x permite a atacantes remotos ejecutar código JavaScript de su elección a través de un paquete de escena que contiene un archivo Tabla de Contenidos de Escena (como .scntoc) con un elemento Script_Content, como queda demostrado por el código que carga el control ActiveX WScript.Shell. • https://www.exploit-db.com/exploits/10211 https://www.exploit-db.com/exploits/33273 http://securitytracker.com/id?1023229 http://www.coresecurity.com/content/softimage-arbitrary-command-execution http://www.securityfocus.com/archive/1/508011/100/0/threaded http://www.securityfocus.com/bid/36637 • CWE-94: Improper Control of Generation of Code ('Code Injection') •