Dnsmasq version 2.72 does not properly check the return value of the setup_reply() function called during a tcp connection (by the tcp_request() function). This return value is then used as a size argument in a function which writes data on the client's connection. This may lead, upon successful exploitation, to reading the heap memory of dnsmasq.
15ce37ec8c0427813ec7b2856b386f96b7f86c6dd544e1d7626c85e4d9919940
Ettercap versions 0.8.0 and 0.8.1 suffers from multiple denial of service vulnerabilities.
c2d3c37bbcf2c09b4172044c3ddf17cecc9c546ea8ab8c937287a9c6a36c57e6
Ettercap versions 8.0 and 8.1 suffer from code execution and denial of service vulnerabilities.
c3b781745f88cbd862cea63d2dda4901f96f9929928278c03b1c679d2601df98
Aircrack-ng version 1.2 Beta 3 suffers from code execution, denial of service, and privilege escalation vulnerabilities.
f3e7c8a63cbec61d5c78827efb02d49d9d05689624c2f7561f5febd98b07fd60