Show filters
25 Total Results
Displaying 11-20 of 25
Sort by:
Attacker Value
Unknown
CVE-2020-6149
Disclosure Date: November 13, 2020 (last updated February 22, 2025)
A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software parses compressed sections in binary USD files. To trigger this vulnerability, the victim needs to open an attacker-provided malformed file in an instance in USDC file format PATHS section.
0
Attacker Value
Unknown
CVE-2020-6155
Disclosure Date: November 13, 2020 (last updated February 22, 2025)
A heap overflow vulnerability exists in the Pixar OpenUSD 20.05 while parsing compressed value rep arrays in binary USD files. A specially crafted malformed file can trigger a heap overflow, which can result in remote code execution. To trigger this vulnerability, the victim needs to access an attacker-provided malformed file.
0
Attacker Value
Unknown
CVE-2020-6148
Disclosure Date: November 13, 2020 (last updated February 22, 2025)
A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software parses compressed sections in binary USD files. An instance exists in USDC file format FIELDSETS section decompression heap overflow.
0
Attacker Value
Unknown
CVE-2020-6150
Disclosure Date: November 13, 2020 (last updated February 22, 2025)
A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software USDC file format SPECS section decompression heap overflow.
0
Attacker Value
Unknown
CVE-2020-6147
Disclosure Date: November 13, 2020 (last updated February 22, 2025)
A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software parses compressed sections in binary USD files. This instance exists in the USDC file format FIELDS section decompression heap overflow.
0
Attacker Value
Unknown
CVE-2020-13495
Disclosure Date: November 12, 2020 (last updated February 23, 2025)
An exploitable vulnerability exists in the way Pixar OpenUSD 20.05 handles file offsets in binary USD files. A specially crafted malformed file can trigger an arbitrary out-of-bounds memory access that could lead to the disclosure of sensitive information. This vulnerability could be used to bypass mitigations and aid additional exploitation. To trigger this vulnerability, the victim needs to access an attacker-provided file.
0
Attacker Value
Unknown
CVE-2019-5015
Disclosure Date: March 08, 2019 (last updated November 27, 2024)
A local privilege escalation vulnerability exists in the Mac OS X version of Pixar Renderman 22.3.0's Install Helper helper tool. A user with local access can use this vulnerability to escalate their privileges to root. An attacker would need local access to the machine for a successful exploit.
0
Attacker Value
Unknown
CVE-2018-4054
Disclosure Date: March 08, 2019 (last updated November 27, 2024)
A local privilege escalation vulnerability exists in the install helper tool of the Mac OS X version of Pixar Renderman, version 22.2.0. A user with local access can use this vulnerability to escalate their privileges to root. An attacker would need local access to the machine to successfully exploit this flaw.
0
Attacker Value
Unknown
CVE-2018-4055
Disclosure Date: March 08, 2019 (last updated November 27, 2024)
A local privilege escalation vulnerability exists in the install helper tool of the Mac OS X version of Pixar Renderman, version 22.2.0. A user with local access can use this vulnerability to read any root file from the file system. An attacker would need local access to the machine to successfully exploit this flaw.
0
Attacker Value
Unknown
Pixar's Tractor software, versions 2.2 and earlier, contains a stored cross-sit…
Disclosure Date: December 13, 2018 (last updated November 27, 2024)
Pixar's Tractor software, versions 2.2 and earlier, contain a stored cross-site scripting vulnerability in the field that allows a user to add a note to an existing node. The stored information is displayed when a user requests information about the node. An attacker could insert Javascript into this note field that is then saved and displayed to the end user. An attacker might include Javascript that could execute on an authenticated user's system that could lead to website redirects, session cookie hijacking, social engineering, etc. As this is stored with the information about the node, all other authenticated users with access to this data are also vulnerable.
0