Filtered by vendor Pixar
Subscribe
Total
22 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-13495 | 2 Apple, Pixar | 2 Mac Os X, Openusd | 2024-02-04 | 4.3 MEDIUM | 5.5 MEDIUM |
An exploitable vulnerability exists in the way Pixar OpenUSD 20.05 handles file offsets in binary USD files. A specially crafted malformed file can trigger an arbitrary out-of-bounds memory access that could lead to the disclosure of sensitive information. This vulnerability could be used to bypass mitigations and aid additional exploitation. To trigger this vulnerability, the victim needs to access an attacker-provided file. | |||||
CVE-2021-33575 | 1 Pixar | 1 Ruby-jss | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
The Pixar ruby-jss gem before 1.6.0 allows remote attackers to execute arbitrary code because of the Plist gem's documented behavior of using Marshal.load during XML document processing. | |||||
CVE-2020-6147 | 2 Apple, Pixar | 3 Ipados, Iphone Os, Openusd | 2024-02-04 | 6.8 MEDIUM | 7.8 HIGH |
A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software parses compressed sections in binary USD files. This instance exists in the USDC file format FIELDS section decompression heap overflow. | |||||
CVE-2020-13498 | 2 Apple, Pixar | 2 Macos, Openusd | 2024-02-04 | 4.3 MEDIUM | 5.5 MEDIUM |
An exploitable vulnerability exists in the way Pixar OpenUSD 20.05 handles parses certain encoded types. A specially crafted malformed file can trigger an arbitrary out of bounds memory access which could lead to information disclosure. This vulnerability could be used to bypass mitigations and aid further exploitation. To trigger this vulnerability, the victim needs to access an attacker-provided malformed file. | |||||
CVE-2020-6149 | 1 Pixar | 1 Openusd | 2024-02-04 | 6.8 MEDIUM | 7.8 HIGH |
A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software parses compressed sections in binary USD files. To trigger this vulnerability, the victim needs to open an attacker-provided malformed file in an instance in USDC file format PATHS section. | |||||
CVE-2020-6155 | 1 Pixar | 1 Openusd | 2024-02-04 | 6.8 MEDIUM | 7.8 HIGH |
A heap overflow vulnerability exists in the Pixar OpenUSD 20.05 while parsing compressed value rep arrays in binary USD files. A specially crafted malformed file can trigger a heap overflow, which can result in remote code execution. To trigger this vulnerability, the victim needs to access an attacker-provided malformed file. | |||||
CVE-2020-13493 | 2 Apple, Pixar | 2 Macos, Openusd | 2024-02-04 | 6.8 MEDIUM | 7.8 HIGH |
A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software parses compressed sections in binary USD files. A specially crafted USDC file format path jumps decompression heap overflow in a way path jumps are processed. To trigger this vulnerability, the victim needs to open an attacker-provided malformed file. | |||||
CVE-2020-6148 | 1 Pixar | 1 Openusd | 2024-02-04 | 6.8 MEDIUM | 7.8 HIGH |
A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software parses compressed sections in binary USD files. An instance exists in USDC file format FIELDSETS section decompression heap overflow. | |||||
CVE-2020-13497 | 2 Apple, Pixar | 2 Macos, Openusd | 2024-02-04 | 4.3 MEDIUM | 5.5 MEDIUM |
An exploitable vulnerability exists in the way Pixar OpenUSD 20.05 handles parses certain encoded types. A specially crafted malformed file can trigger an arbitrary out of bounds memory access in String Type Index. This vulnerability could be used to bypass mitigations and aid further exploitation. To trigger this vulnerability, the victim needs to access an attacker-provided malformed file. | |||||
CVE-2020-13496 | 2 Apple, Pixar | 2 Macos, Openusd | 2024-02-04 | 4.3 MEDIUM | 6.5 MEDIUM |
An exploitable vulnerability exists in the way Pixar OpenUSD 20.05 handles parses certain encoded types. A specially crafted malformed file can trigger an arbitrary out of bounds memory access in TfToken Type Index. This vulnerability could be used to bypass mitigations and aid further exploitation. To trigger this vulnerability, the victim needs to access an attacker-provided malformed file. | |||||
CVE-2020-6156 | 1 Pixar | 1 Openusd | 2024-02-04 | 6.8 MEDIUM | 7.8 HIGH |
A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software parses compressed sections in binary USD files. To trigger this vulnerability, the victim needs to open an attacker-provided malformed file in an instance USDC file format path element token index. | |||||
CVE-2020-6150 | 1 Pixar | 1 Openusd | 2024-02-04 | 6.8 MEDIUM | 7.8 HIGH |
A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software USDC file format SPECS section decompression heap overflow. | |||||
CVE-2020-13531 | 1 Pixar | 1 Openusd | 2024-02-04 | 6.8 MEDIUM | 8.8 HIGH |
A use-after-free vulnerability exists in a way Pixar OpenUSD 20.08 processes reference paths textual USD files. A specially crafted file can trigger the reuse of a freed memory which can result in further memory corruption and arbitrary code execution. To trigger this vulnerability, the victim needs to open an attacker-provided malformed file. | |||||
CVE-2020-13520 | 2 Apple, Pixar | 2 Macos, Openusd | 2024-02-04 | 6.8 MEDIUM | 7.8 HIGH |
An out of bounds memory corruption vulnerability exists in the way Pixar OpenUSD 20.05 reconstructs paths from binary USD files. A specially crafted malformed file can trigger an out of bounds memory modification which can result in remote code execution. To trigger this vulnerability, victim needs to access an attacker-provided malformed file. | |||||
CVE-2020-13494 | 2 Apple, Pixar | 2 Macos, Openusd | 2024-02-04 | 4.3 MEDIUM | 5.5 MEDIUM |
A heap overflow vulnerability exists in the Pixar OpenUSD 20.05 parsing of compressed string tokens in binary USD files. A specially crafted malformed file can trigger a heap overflow which can result in out of bounds memory access which could lead to information disclosure. This vulnerability could be used to bypass mitigations and aid further exploitation. To trigger this vulnerability, victim needs to access an attacker-provided malformed file. | |||||
CVE-2020-13524 | 2 Apple, Pixar | 3 Mac Os X, Macos, Openusd | 2024-02-04 | 4.3 MEDIUM | 5.5 MEDIUM |
An out-of-bounds memory corruption vulnerability exists in the way Pixar OpenUSD 20.05 uses SPECS data from binary USD files. A specially crafted malformed file can trigger an out-of-bounds memory access and modification which results in memory corruption. To trigger this vulnerability, the victim needs to access an attacker-provided malformed file. | |||||
CVE-2018-4055 | 1 Pixar | 1 Renderman | 2024-02-04 | 2.1 LOW | 5.5 MEDIUM |
A local privilege escalation vulnerability exists in the install helper tool of the Mac OS X version of Pixar Renderman, version 22.2.0. A user with local access can use this vulnerability to read any root file from the file system. An attacker would need local access to the machine to successfully exploit this flaw. | |||||
CVE-2018-4054 | 1 Pixar | 1 Renderman | 2024-02-04 | 7.2 HIGH | 7.8 HIGH |
A local privilege escalation vulnerability exists in the install helper tool of the Mac OS X version of Pixar Renderman, version 22.2.0. A user with local access can use this vulnerability to escalate their privileges to root. An attacker would need local access to the machine to successfully exploit this flaw. | |||||
CVE-2019-5015 | 1 Pixar | 1 Renderman | 2024-02-04 | 7.2 HIGH | 7.8 HIGH |
A local privilege escalation vulnerability exists in the Mac OS X version of Pixar Renderman 22.3.0's Install Helper helper tool. A user with local access can use this vulnerability to escalate their privileges to root. An attacker would need local access to the machine for a successful exploit. | |||||
CVE-2018-5411 | 1 Pixar | 1 Tractor | 2024-02-04 | 3.5 LOW | 5.4 MEDIUM |
Pixar's Tractor software, versions 2.2 and earlier, contain a stored cross-site scripting vulnerability in the field that allows a user to add a note to an existing node. The stored information is displayed when a user requests information about the node. An attacker could insert Javascript into this note field that is then saved and displayed to the end user. An attacker might include Javascript that could execute on an authenticated user's system that could lead to website redirects, session cookie hijacking, social engineering, etc. As this is stored with the information about the node, all other authenticated users with access to this data are also vulnerable. |