2 results (0.004 seconds)

CVSS: 5.0EPSS: 0%CPEs: 10EXPL: 0

18 Feb 2006 — Niels Provos Honeyd before 1.5 replies to certain illegal IP packet fragments that other IP stack implementations would drop, which allows remote attackers to identify IP addresses that are being simulated using honeyd. • http://secunia.com/advisories/18867 •

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0

31 Dec 2004 — Honeyd before 0.8 replies to TCP packets with the SYN and RST flags set, which allows remote attackers to identify IP addresses that are being simulated by Honeyd. • http://marc.info/?l=bugtraq&m=107471181426047&w=2 •