Description
HoneyPress through 2016-09-27 can be fingerprinted by attackers because of the ingrained unique www.atxsec.com and ayylmao.wpengine.com hostnames within the fake WordPress templates. This allows attackers to discover and avoid this honeypot system.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-3303 | HoneyPress through 2016-09-27 can be fingerprinted by attackers because of the ingrained unique www.atxsec.com and ayylmao.wpengine.com hostnames within the fake WordPress templates. This allows attackers to discover and avoid this honeypot system. |
References
| Link | Providers |
|---|---|
| https://github.com/dustyfresh/HoneyPress/issues/1 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T22:55:41.118Z
Reserved: 2019-05-01T00:00:00.000Z
Link: CVE-2019-11633
No data.
Status : Modified
Published: 2019-05-01T14:29:00.623
Modified: 2024-11-21T04:21:29.833
Link: CVE-2019-11633
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD