Page 2 of 8 results (0.002 seconds)

CVSS: 4.4EPSS: 0%CPEs: 7EXPL: 2

Stack-based buffer overflow in the scan_load_hosts function in ec_scan.c in Ettercap 0.7.5.1 and earlier might allow local users to gain privileges via a Trojan horse hosts list containing a long line. Desbordamiento de búfer basado en pila en la función scan_load_hosts en ec_scan.c en Ettercap v0.7.5.1 y anteriores podría permitir a usuarios locales obetner privilegios a través de una lista de hosts troyanizada conteniendo una línea larga. • https://www.exploit-db.com/exploits/23945 http://secunia.com/advisories/51731 http://www.exploit-db.com/exploits/23945 http://www.securation.com/files/2013/01/ec.patch http://www.securityfocus.com/bid/57175 https://bugs.gentoo.org/show_bug.cgi?id=451198 https://bugzilla.redhat.com/show_bug.cgi?id=894092 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 8%CPEs: 3EXPL: 0

Format string vulnerability in the curses_msg function in the Ncurses interface (ec_curses.c) for Ettercap before 0.7.3 allows remote attackers to execute arbitrary code. • http://ettercap.sourceforge.net/history.php http://secunia.com/advisories/15535 http://secunia.com/advisories/15664 http://secunia.com/advisories/16000 http://securitytracker.com/id?1014084 http://www.debian.org/security/2005/dsa-749 http://www.gentoo.org/security/en/glsa/glsa-200506-07.xml http://www.securityfocus.com/bid/13820 http://www.vupen.com/english/advisories/2005/0670 •

CVSS: 7.5EPSS: 8%CPEs: 1EXPL: 1

Buffer overflow in various decoders in Ettercap 0.6.3.1 and earlier, when running on networks with an MTU greater than 2000, allows remote attackers to execute arbitrary code via large packets. Desbordamiento de búfer en varios decodificadores en Ettercap 0.6.3.1 y anteriores, cuando corren en redes con una MTU (maximun transfer unit) mayor de 2000, permite a atacantes remotos ejecutar código arbitrario mediante paquetes largos. • https://www.exploit-db.com/exploits/21289 http://ettercap.sourceforge.net/index.php?s=history http://marc.info/?l=bugtraq&m=101370874219511&w=2 http://www.iss.net/security_center/static/8200.php http://www.securityfocus.com/bid/4104 •