Логотип exploitDog
bind:CVE-2006-0752
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2006-0752

Количество 4

Количество 4

ubuntu логотип

CVE-2006-0752

почти 20 лет назад

Niels Provos Honeyd before 1.5 replies to certain illegal IP packet fragments that other IP stack implementations would drop, which allows remote attackers to identify IP addresses that are being simulated using honeyd.

CVSS2: 5
EPSS: Низкий
nvd логотип

CVE-2006-0752

почти 20 лет назад

Niels Provos Honeyd before 1.5 replies to certain illegal IP packet fragments that other IP stack implementations would drop, which allows remote attackers to identify IP addresses that are being simulated using honeyd.

CVSS2: 5
EPSS: Низкий
debian логотип

CVE-2006-0752

почти 20 лет назад

Niels Provos Honeyd before 1.5 replies to certain illegal IP packet fr ...

CVSS2: 5
EPSS: Низкий
github логотип

GHSA-pvqh-2jr6-4p32

больше 3 лет назад

Niels Provos Honeyd before 1.5 replies to certain illegal IP packet fragments that other IP stack implementations would drop, which allows remote attackers to identify IP addresses that are being simulated using honeyd.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2006-0752

Niels Provos Honeyd before 1.5 replies to certain illegal IP packet fragments that other IP stack implementations would drop, which allows remote attackers to identify IP addresses that are being simulated using honeyd.

CVSS2: 5
1%
Низкий
почти 20 лет назад
nvd логотип
CVE-2006-0752

Niels Provos Honeyd before 1.5 replies to certain illegal IP packet fragments that other IP stack implementations would drop, which allows remote attackers to identify IP addresses that are being simulated using honeyd.

CVSS2: 5
1%
Низкий
почти 20 лет назад
debian логотип
CVE-2006-0752

Niels Provos Honeyd before 1.5 replies to certain illegal IP packet fr ...

CVSS2: 5
1%
Низкий
почти 20 лет назад
github логотип
GHSA-pvqh-2jr6-4p32

Niels Provos Honeyd before 1.5 replies to certain illegal IP packet fragments that other IP stack implementations would drop, which allows remote attackers to identify IP addresses that are being simulated using honeyd.

1%
Низкий
больше 3 лет назад

Уязвимостей на страницу