Search Results (38 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2006-0618 1 Qnx 1 Neutrino Rtos 2026-04-16 N/A
Format string vulnerability in fontsleuth in QNX Neutrino RTOS 6.3.0 allows local users to execute arbitrary code via format string specifiers in the zeroth argument (program name).
CVE-2006-0619 1 Qnx 1 Rtos 2026-04-16 N/A
Multiple stack-based buffer overflows in QNX Neutrino RTOS 6.3.0 allow local users to execute arbitrary code via long (1) ABLPATH or (2) ABLANG environment variables in the libAP library (libAp.so.2) or (3) a long PHOTON_PATH environment variable to the setitem function in the libph library.
CVE-2006-0620 1 Qnx 1 Rtos 2026-04-16 N/A
Race condition in phfont in QNX Neutrino RTOS 6.2.1 allows local users to execute arbitrary code via unspecified manipulations of the PHFONT and PHOTON2_PATH environment variables.
CVE-2006-0621 1 Qnx 1 Rtos 2026-04-16 N/A
Multiple buffer overflows in QNX Neutrino RTOS 6.2.0 allow local users to execute arbitrary code via a long first argument to the (1) su or (2) passwd commands.
CVE-2006-0622 1 Qnx 1 Rtos 2026-04-16 N/A
QNX Neutrino RTOS 6.3.0 allows local users to cause a denial of service (hang) by supplying a "break *0xb032d59f" command to gdb.
CVE-2006-0623 1 Qnx 1 Rtos 2026-04-16 N/A
QNX Neutrino RTOS 6.3.0 ships /etc/rc.d/rc.local with world-writable permissions, which allows local users to modify the file and execute arbitrary code at system startup.
CVE-2005-3928 1 Qnx 1 Rtos 2026-04-16 N/A
Buffer overflow in phgrafx in QNX 6.2.1 and 6.3.0 allows local users to execute arbitrary code via a long command line argument.
CVE-2002-1239 1 Qnx 1 Rtos 2026-04-16 N/A
QNX Neutrino RTOS 6.2.0 uses the PATH environment variable to find and execute the cp program while operating at raised privileges, which allows local users to gain privileges by modifying the PATH to point to a malicious cp program.
CVE-2002-2407 1 Qnx 1 Rtos 2026-04-16 N/A
Certain patches for QNX Neutrino realtime operating system (RTOS) 6.2.0 set insecure permissions for the files (1) /sbin/io-audio by OS Update Patch A, (2) /bin/shutdown, (3) /sbin/fs-pkg, and (4) phshutdown by QNX experimental patches, (5) cpim, (6) vpim, (7) phrelaycfg, and (8) columns, (9) othello, (10) peg, (11) solitaire, and (12) vpoker in the games pack 2.0.3, which allows local users to gain privileges by modifying the files before permissions are changed.
CVE-2004-1681 1 Qnx 2 Photon Microgui, Rtp 2026-04-16 N/A
Multiple buffer overflows in (1) phrelay-cfg, (2) phlocale, (3) pkg-installer, or (4) input-cfg in QNX Photon microGUI for QNX RTP 6.1 allow local users to gain privileges via a long -s (server) command line parameter.
CVE-2000-0250 1 Qnx 1 Qnx 2026-04-16 N/A
The crypt function in QNX uses weak encryption, which allows local users to decrypt passwords.
CVE-2025-27077 2 Qnx, Qualcomm 56 Qnx, Qam8255p, Qam8255p Firmware and 53 more 2026-02-26 7.8 High
Memory corruption while processing message in guest VM.
CVE-2025-47315 2 Qnx, Qualcomm 56 Qnx, Qam8255p, Qam8255p Firmware and 53 more 2026-02-26 7.8 High
Memory corruption while handling repeated memory unmap requests from guest VM.
CVE-2025-47347 2 Qnx, Qualcomm 76 Qnx, Qam8255p, Qam8255p Firmware and 73 more 2026-02-26 7.8 High
Memory corruption while processing control commands in the virtual memory management interface.
CVE-2025-47360 2 Qnx, Qualcomm 72 Qnx, Qam8255p, Qam8255p Firmware and 69 more 2026-02-26 7.8 High
Memory corruption while processing client message during device management.
CVE-2025-47361 2 Qnx, Qualcomm 58 Qnx, Qam8255p, Qam8255p Firmware and 55 more 2026-02-26 7.8 High
Memory corruption when triggering a subsystem crash with an out-of-range identifier.
CVE-2025-47362 2 Qnx, Qualcomm 78 Qnx, Msm8996au, Msm8996au Firmware and 75 more 2025-11-05 6.1 Medium
Information disclosure while processing message from client with invalid payload.
CVE-2011-4060 1 Qnx 1 Neutrino Rtos 2025-04-11 N/A
The runtime linker in QNX Neutrino RTOS 6.5.0 before Service Pack 1 does not properly clear the LD_DEBUG_OUTPUT and LD_DEBUG environment variables when a program is spawned from a setuid program, which allows local users to overwrite files via a symlink attack.