Vendor
Niels Provos
Products
3
CVEs
7
Across products
43
Status
Private
Products
3- 23 CVEs
- 18 CVEs
- 2 CVEs
Recent CVEs
7| CVE | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2009-0343 | 0.03 | — | 0.00 | Jan 29, 2009 | Niels Provos Systrace 1.6f and earlier on the x86_64 Linux platform allows local users to bypass intended access restrictions by making a 32-bit syscall with a syscall number that corresponds to a policy-compliant 64-bit syscall, related to race conditions that occur in monitoring 64-bit processes. | ||
| CVE-2007-4305 | 0.03 | — | 0.00 | Aug 13, 2007 | Multiple race conditions in the (1) Sudo monitor mode and (2) Sysjail policies in Systrace on NetBSD and OpenBSD allow local users to defeat system call interposition, and consequently bypass access control policy and auditing. | ||
| CVE-2009-0342 | 0.00 | — | 0.00 | Jan 29, 2009 | Niels Provos Systrace before 1.6f on the x86_64 Linux platform allows local users to bypass intended access restrictions by making a 64-bit syscall with a syscall number that corresponds to a policy-compliant 32-bit syscall. | ||
| CVE-2007-1030 | 0.00 | — | 0.02 | Feb 21, 2007 | Niels Provos libevent 1.2 and 1.2a allows remote attackers to cause a denial of service (infinite loop) via a DNS response containing a label pointer that references its own offset. | ||
| CVE-2006-4292 | 0.00 | — | 0.01 | Aug 22, 2006 | Unspecified vulnerability in Niels Provos Honeyd before 1.5b allows remote attackers to cause a denial of service (application crash) via certain Address Resolution Protocol (ARP) packets. | ||
| CVE-2006-0752 | 0.00 | — | 0.01 | Feb 18, 2006 | Niels Provos Honeyd before 1.5 replies to certain illegal IP packet fragments that other IP stack implementations would drop, which allows remote attackers to identify IP addresses that are being simulated using honeyd. | ||
| CVE-2004-2095 | 0.00 | — | 0.01 | Dec 31, 2004 | Honeyd before 0.8 replies to TCP packets with the SYN and RST flags set, which allows remote attackers to identify IP addresses that are being simulated by Honeyd. |