Show filters
7 Total Results
Displaying 1-7 of 7
Sort by:
Attacker Value
Unknown

CVE-2006-0619

Disclosure Date: February 09, 2006 (last updated February 22, 2025)
Multiple stack-based buffer overflows in QNX Neutrino RTOS 6.3.0 allow local users to execute arbitrary code via long (1) ABLPATH or (2) ABLANG environment variables in the libAP library (libAp.so.2) or (3) a long PHOTON_PATH environment variable to the setitem function in the libph library.
0
Attacker Value
Unknown

CVE-2006-0622

Disclosure Date: February 09, 2006 (last updated February 22, 2025)
QNX Neutrino RTOS 6.3.0 allows local users to cause a denial of service (hang) by supplying a "break *0xb032d59f" command to gdb.
0
Attacker Value
Unknown

CVE-2006-0618

Disclosure Date: February 09, 2006 (last updated February 22, 2025)
Format string vulnerability in fontsleuth in QNX Neutrino RTOS 6.3.0 allows local users to execute arbitrary code via format string specifiers in the zeroth argument (program name).
0
Attacker Value
Unknown

CVE-2006-0623

Disclosure Date: February 09, 2006 (last updated February 22, 2025)
QNX Neutrino RTOS 6.3.0 ships /etc/rc.d/rc.local with world-writable permissions, which allows local users to modify the file and execute arbitrary code at system startup.
0
Attacker Value
Unknown

CVE-2005-3928

Disclosure Date: November 30, 2005 (last updated February 22, 2025)
Buffer overflow in phgrafx in QNX 6.2.1 and 6.3.0 allows local users to execute arbitrary code via a long command line argument.
0
Attacker Value
Unknown

CVE-2005-2725

Disclosure Date: August 30, 2005 (last updated February 22, 2025)
The inputtrap utility in QNX RTOS 6.1.0, 6.3, and possibly earlier versions does not properly check permissions when the -t flag is specified, which allows local users to read arbitrary files.
0
Attacker Value
Unknown

CVE-2004-1391

Disclosure Date: December 31, 2004 (last updated February 22, 2025)
Untrusted execution path vulnerability in the PPPoE daemon (PPPoEd) in QNX RTP 6.1 allows local users to execute arbitrary programs by modifying the PATH environment variable to point to a malicious mount program.
0