Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown

CVE-2009-0343

Disclosure Date: January 29, 2009 (last updated October 04, 2023)
Niels Provos Systrace 1.6f and earlier on the x86_64 Linux platform allows local users to bypass intended access restrictions by making a 32-bit syscall with a syscall number that corresponds to a policy-compliant 64-bit syscall, related to race conditions that occur in monitoring 64-bit processes.
0
Attacker Value
Unknown

CVE-2009-0342

Disclosure Date: January 29, 2009 (last updated October 04, 2023)
Niels Provos Systrace before 1.6f on the x86_64 Linux platform allows local users to bypass intended access restrictions by making a 64-bit syscall with a syscall number that corresponds to a policy-compliant 32-bit syscall.
0
Attacker Value
Unknown

CVE-2007-1030

Disclosure Date: February 21, 2007 (last updated October 04, 2023)
Niels Provos libevent 1.2 and 1.2a allows remote attackers to cause a denial of service (infinite loop) via a DNS response containing a label pointer that references its own offset.
0
Attacker Value
Unknown

CVE-2006-4292

Disclosure Date: August 22, 2006 (last updated October 04, 2023)
Unspecified vulnerability in Niels Provos Honeyd before 1.5b allows remote attackers to cause a denial of service (application crash) via certain Address Resolution Protocol (ARP) packets.
0
Attacker Value
Unknown

CVE-2006-0752

Disclosure Date: February 18, 2006 (last updated February 22, 2025)
Niels Provos Honeyd before 1.5 replies to certain illegal IP packet fragments that other IP stack implementations would drop, which allows remote attackers to identify IP addresses that are being simulated using honeyd.
0
Attacker Value
Unknown

CVE-2004-2095

Disclosure Date: December 31, 2004 (last updated February 22, 2025)
Honeyd before 0.8 replies to TCP packets with the SYN and RST flags set, which allows remote attackers to identify IP addresses that are being simulated by Honeyd.
0