Show filters
7 Total Results
Displaying 1-7 of 7
Sort by:
Attacker Value
Unknown
CVE-2006-0619
Disclosure Date: February 09, 2006 (last updated February 22, 2025)
Multiple stack-based buffer overflows in QNX Neutrino RTOS 6.3.0 allow local users to execute arbitrary code via long (1) ABLPATH or (2) ABLANG environment variables in the libAP library (libAp.so.2) or (3) a long PHOTON_PATH environment variable to the setitem function in the libph library.
0
Attacker Value
Unknown
CVE-2006-0622
Disclosure Date: February 09, 2006 (last updated February 22, 2025)
QNX Neutrino RTOS 6.3.0 allows local users to cause a denial of service (hang) by supplying a "break *0xb032d59f" command to gdb.
0
Attacker Value
Unknown
CVE-2006-0618
Disclosure Date: February 09, 2006 (last updated February 22, 2025)
Format string vulnerability in fontsleuth in QNX Neutrino RTOS 6.3.0 allows local users to execute arbitrary code via format string specifiers in the zeroth argument (program name).
0
Attacker Value
Unknown
CVE-2006-0623
Disclosure Date: February 09, 2006 (last updated February 22, 2025)
QNX Neutrino RTOS 6.3.0 ships /etc/rc.d/rc.local with world-writable permissions, which allows local users to modify the file and execute arbitrary code at system startup.
0
Attacker Value
Unknown
CVE-2005-3928
Disclosure Date: November 30, 2005 (last updated February 22, 2025)
Buffer overflow in phgrafx in QNX 6.2.1 and 6.3.0 allows local users to execute arbitrary code via a long command line argument.
0
Attacker Value
Unknown
CVE-2005-2725
Disclosure Date: August 30, 2005 (last updated February 22, 2025)
The inputtrap utility in QNX RTOS 6.1.0, 6.3, and possibly earlier versions does not properly check permissions when the -t flag is specified, which allows local users to read arbitrary files.
0
Attacker Value
Unknown
CVE-2004-1391
Disclosure Date: December 31, 2004 (last updated February 22, 2025)
Untrusted execution path vulnerability in the PPPoE daemon (PPPoEd) in QNX RTP 6.1 allows local users to execute arbitrary programs by modifying the PATH environment variable to point to a malicious mount program.
0