Vulnerabilities > QNX > Rtos > 6.2.0
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2006-02-09 | CVE-2006-0621 | Local Privilege Escalation and Denial Of Service vulnerability in QNX Rtos 6.2.0 Multiple buffer overflows in QNX Neutrino RTOS 6.2.0 allow local users to execute arbitrary code via a long first argument to the (1) su or (2) passwd commands. | 7.2 |
2004-12-31 | CVE-2004-1391 | Local Command Execution vulnerability in QNX Rtos and RTP Untrusted execution path vulnerability in the PPPoE daemon (PPPoEd) in QNX RTP 6.1 allows local users to execute arbitrary programs by modifying the PATH environment variable to point to a malicious mount program. | 4.6 |
2004-12-31 | CVE-2004-1390 | Local Buffer Overrun vulnerability in QNX Rtos and RTP Multiple buffer overflows in the PPPoE daemon (PPPoEd) in QNX RTP 6.1 allow remote attackers to execute arbitrary code via a long argument to the (1) -F, (2) name, (3) en, (4) upscript, (5) downscript, (6) retries, (7) timeout, (8) scriptdetach, (9) noscript, (10) nodetach, (11) remote_mac, or (12) local_mac flags. | 10.0 |
2004-09-13 | CVE-2004-1683 | Local Command Execution vulnerability in QNX CRTTrap Path Environment Variable A race condition in crrtrap for QNX RTP 6.1 allows local users to gain privileges by modifying the PATH environment variable to reference a malicious io-graphics program before is executed by crrtrap. | 3.7 |
2002-11-12 | CVE-2002-1239 | Unspecified vulnerability in QNX Rtos 6.2.0 QNX Neutrino RTOS 6.2.0 uses the PATH environment variable to find and execute the cp program while operating at raised privileges, which allows local users to gain privileges by modifying the PATH to point to a malicious cp program. | 7.2 |