Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2004-2095
Honeyd before 0.8 replies to TCP packets with the SYN and RST flags set, which allows remote attackers to identify IP addresses that are being simulated by Honeyd.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.006
EPSS Ranking
69.4%
CVSS Severity
CVSS v2 Score
5.0
References
http://marc.info/?l=bugtraq&m=107471181426047&w=2
http://marc.info/?l=bugtraq&m=107473095118505&w=2
http://secunia.com/advisories/10694
http://secunia.com/advisories/10695
http://www.osvdb.org/3690
http://www.securityfocus.com/bid/9464
http://www.securitytracker.com/id?1008818
https://exchange.xforce.ibmcloud.com/vulnerabilities/14905
http://marc.info/?l=bugtraq&m=107471181426047&w=2
http://marc.info/?l=bugtraq&m=107473095118505&w=2
http://secunia.com/advisories/10694
http://secunia.com/advisories/10695
http://www.osvdb.org/3690
http://www.securityfocus.com/bid/9464
http://www.securitytracker.com/id?1008818
https://exchange.xforce.ibmcloud.com/vulnerabilities/14905
Products affected by CVE-2004-2095
Niels Provos
»
Honeyd
»
Version:
0.5
cpe:2.3:a:niels_provos:honeyd:0.5
Niels Provos
»
Honeyd
»
Version:
0.6
cpe:2.3:a:niels_provos:honeyd:0.6
Niels Provos
»
Honeyd
»
Version:
0.6a
cpe:2.3:a:niels_provos:honeyd:0.6a
Niels Provos
»
Honeyd
»
Version:
0.7
cpe:2.3:a:niels_provos:honeyd:0.7
Niels Provos
»
Honeyd
»
Version:
0.7a
cpe:2.3:a:niels_provos:honeyd:0.7a
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved