Related Weaknesses
CWE-ID |
Weakness Name |
Source |
CWE-94 |
Improper Control of Generation of Code ('Code Injection') The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
|
Metrics
Metric |
Score |
Severity |
CVSS Vector |
Source |
V2 |
7.5 |
|
AV:N/AC:L/Au:N/C:P/I:P/A:P |
nvd@nist.gov |
EPSS
EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.
EPSS Score
The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.
EPSS Percentile
The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.
Exploit information
Exploit Database EDB-ID : 27728
Publication date : 2006-04-23 22:00 +00:00
Author : Joxean Koret
EDB Verified : Yes
source: https://www.securityfocus.com/bid/17663/info
Blender is susceptible to a Python code-execution vulnerability. This issue is due to the application's failure to properly sanitize user-supplied input before using it in a Python 'eval' statement.
This issue allows attackers to execute arbitrary Python code in the context of the user running the affected application.
http://bugs.debian.org/cgi-bin/bugreport.cgi/exploit.bvh?bug=330895;msg=5;att=1
http://bugs.debian.org/cgi-bin/bugreport.cgi/poc1.bvh?bug=330895;msg=5;att=3
http://bugs.debian.org/cgi-bin/bugreport.cgi/poc2.bvh?bug=330895;msg=5;att=4
Products Mentioned
Configuraton 0
Blender>>Blender >> Version 2.36
Configuraton 0
Debian>>Debian_linux >> Version 3.1
References