cpe:2.3:a:niels_provos:honeyd:0.5:*:*:*:*:*:*:*
Niels Provos Honeyd before 1.5 replies to certain illegal IP packet fragments that other IP stack implementations would drop, which allows remote attackers to identify IP addresses that are being simulated using honeyd.
Max CVSS
5.0
EPSS Score
0.95%
Published
2006-02-18
Updated
2018-10-19
Honeyd before 0.8 replies to TCP packets with the SYN and RST flags set, which allows remote attackers to identify IP addresses that are being simulated by Honeyd.
Max CVSS
5.0
EPSS Score
1.17%
Published
2004-12-31
Updated
2017-07-11
2 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!