Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mtr mtr 0.41 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2002-0497
Buffer overflow in mtr 0.46 and previous versions, when installed setuid root, allows local users to access a raw socket via a long MTR_OPTIONS environment variable.
Mtr Mtr 0.41
NA
CVE-2008-2357
Stack-based buffer overflow in the split_redraw function in split.c in mtr prior to 0.73, when invoked with the -p (aka --split) option, allows remote malicious users to execute arbitrary code via a crafted DNS PTR record. NOTE: it could be argued that this is a vulnerability in ...
Matt Kimball And Roger Wolff Mtr 0.22
Matt Kimball And Roger Wolff Mtr 0.23
Matt Kimball And Roger Wolff Mtr 0.30
Matt Kimball And Roger Wolff Mtr 0.31
Matt Kimball And Roger Wolff Mtr 0.39
Matt Kimball And Roger Wolff Mtr 0.40
Matt Kimball And Roger Wolff Mtr 0.47
Matt Kimball And Roger Wolff Mtr 0.48
Matt Kimball And Roger Wolff Mtr 0.55
Matt Kimball And Roger Wolff Mtr 0.56
Matt Kimball And Roger Wolff Mtr 0.64
Matt Kimball And Roger Wolff Mtr 0.65
Matt Kimball And Roger Wolff Mtr
Matt Kimball And Roger Wolff Mtr 0.26
Matt Kimball And Roger Wolff Mtr 0.27
Matt Kimball And Roger Wolff Mtr 0.34
Matt Kimball And Roger Wolff Mtr 0.35
Matt Kimball And Roger Wolff Mtr 0.43
Matt Kimball And Roger Wolff Mtr 0.44
Matt Kimball And Roger Wolff Mtr 0.51
Matt Kimball And Roger Wolff Mtr 0.52
Matt Kimball And Roger Wolff Mtr 0.59
NA
CVE-2000-0172
The mtr program only uses a seteuid call when attempting to drop privileges, which could allow local users to gain root privileges.
Matt Kimball And Roger Wolff Mtr 0.41
Matt Kimball And Roger Wolff Mtr 0.28
Turbolinux Turbolinux 3.5b2
Turbolinux Turbolinux 4.2
Turbolinux Turbolinux 6.0.2
Turbolinux Turbolinux 4.4
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-20065
open redirect
CVE-2024-1086
path traversal
CVE-2024-29825
XXE
CVE-2024-29822
CVE-2024-20696
CVE-2024-3564
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started