Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
qnx neutrino rtos 6.2.0 vulnerabilities and exploits
(subscribe to this query)
3.5
CVSSv2
CVE-2002-2409
Photon microGUI in QNX Neutrino realtime operating system (RTOS) 6.1.0 and 6.2.0 allows malicious users to read user clipboard information via a direct request to the 1.TEXT file in a directory whose name is a hex-encoded user ID.
Qnx Neutrino Rtos 6.2.0
Qnx Photon Microgui
Qnx Neutrino Rtos 6.1.0
7.2
CVSSv2
CVE-2006-0621
Multiple buffer overflows in QNX Neutrino RTOS 6.2.0 allow local users to execute arbitrary code via a long first argument to the (1) su or (2) passwd commands.
Qnx Rtos 6.2.0
7.2
CVSSv2
CVE-2002-1239
QNX Neutrino RTOS 6.2.0 uses the PATH environment variable to find and execute the cp program while operating at raised privileges, which allows local users to gain privileges by modifying the PATH to point to a malicious cp program.
Qnx Rtos 6.2.0
1 EDB exploit
6.9
CVSSv2
CVE-2002-2407
Certain patches for QNX Neutrino realtime operating system (RTOS) 6.2.0 set insecure permissions for the files (1) /sbin/io-audio by OS Update Patch A, (2) /bin/shutdown, (3) /sbin/fs-pkg, and (4) phshutdown by QNX experimental patches, (5) cpim, (6) vpim, (7) phrelaycfg, and (8)...
Qnx Rtos 6.2
Qnx Rtos 6.2a
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2024-5274
CVE-2020-17519
CVE-2024-35340
CVE-2021-47558
local
XML injection
CVE-2021-47519
CVE-2021-47543
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started