Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
qnx neutrino rtos 6.2.0 vulnerabilities and exploits
(subscribe to this query)
3.5
CVSSv2
CVE-2002-2409
Photon microGUI in QNX Neutrino realtime operating system (RTOS) 6.1.0 and 6.2.0 allows malicious users to read user clipboard information via a direct request to the 1.TEXT file in a directory whose name is a hex-encoded user ID.
Qnx Neutrino Rtos 6.2.0
Qnx Photon Microgui
Qnx Neutrino Rtos 6.1.0
7.2
CVSSv2
CVE-2006-0621
Multiple buffer overflows in QNX Neutrino RTOS 6.2.0 allow local users to execute arbitrary code via a long first argument to the (1) su or (2) passwd commands.
Qnx Rtos 6.2.0
7.2
CVSSv2
CVE-2002-1239
QNX Neutrino RTOS 6.2.0 uses the PATH environment variable to find and execute the cp program while operating at raised privileges, which allows local users to gain privileges by modifying the PATH to point to a malicious cp program.
Qnx Rtos 6.2.0
1 EDB exploit
6.9
CVSSv2
CVE-2002-2407
Certain patches for QNX Neutrino realtime operating system (RTOS) 6.2.0 set insecure permissions for the files (1) /sbin/io-audio by OS Update Patch A, (2) /bin/shutdown, (3) /sbin/fs-pkg, and (4) phshutdown by QNX experimental patches, (5) cpim, (6) vpim, (7) phrelaycfg, and (8)...
Qnx Rtos 6.2
Qnx Rtos 6.2a
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48693
CVE-2024-30851
CVE-2024-34460
CVE-2024-2887
local
CVE-2024-27956
remote code execution
CVE-2024-34475
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started