Vulnerabilities > QNX > Rtos > 6.3.0
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2006-02-09 | CVE-2006-0623 | Local Privilege Escalation and Denial Of Service vulnerability in QNX Rtos 6.3.0 QNX Neutrino RTOS 6.3.0 ships /etc/rc.d/rc.local with world-writable permissions, which allows local users to modify the file and execute arbitrary code at system startup. | 7.2 |
2006-02-09 | CVE-2006-0622 | Resource Management Errors vulnerability in QNX Rtos 6.3.0 QNX Neutrino RTOS 6.3.0 allows local users to cause a denial of service (hang) by supplying a "break *0xb032d59f" command to gdb. | 4.9 |
2006-02-09 | CVE-2006-0619 | Buffer Errors vulnerability in QNX Rtos 6.3.0 Multiple stack-based buffer overflows in QNX Neutrino RTOS 6.3.0 allow local users to execute arbitrary code via long (1) ABLPATH or (2) ABLANG environment variables in the libAP library (libAp.so.2) or (3) a long PHOTON_PATH environment variable to the setitem function in the libph library. | 4.6 |
2005-11-30 | CVE-2005-3928 | Local Buffer Overflow vulnerability in QNX Rtos 6.2.1/6.3.0 Buffer overflow in phgrafx in QNX 6.2.1 and 6.3.0 allows local users to execute arbitrary code via a long command line argument. | 4.6 |
2005-08-30 | CVE-2005-2725 | Local Arbitrary File Disclosure vulnerability in QNX RTOS InputTrap The inputtrap utility in QNX RTOS 6.1.0, 6.3, and possibly earlier versions does not properly check permissions when the -t flag is specified, which allows local users to read arbitrary files. | 2.1 |
2004-12-31 | CVE-2004-1391 | Local Command Execution vulnerability in QNX Rtos and RTP Untrusted execution path vulnerability in the PPPoE daemon (PPPoEd) in QNX RTP 6.1 allows local users to execute arbitrary programs by modifying the PATH environment variable to point to a malicious mount program. | 4.6 |