Логотип exploitDog
bind:CVE-2006-6263
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2006-6263

Количество 3

Количество 3

nvd логотип

CVE-2006-6263

почти 19 лет назад

Teredo clients, when source routing is enabled, recognize a Routing header in an encapsulated IPv6 packet and send the packet to the next hop, which might allow remote attackers to bypass policies of certain Internet gateways that drop all source-routed packets.

CVSS2: 6.8
EPSS: Низкий
debian логотип

CVE-2006-6263

почти 19 лет назад

Teredo clients, when source routing is enabled, recognize a Routing he ...

CVSS2: 6.8
EPSS: Низкий
github логотип

GHSA-399j-46mc-wxhx

больше 3 лет назад

Teredo clients, when source routing is enabled, recognize a Routing header in an encapsulated IPv6 packet and send the packet to the next hop, which might allow remote attackers to bypass policies of certain Internet gateways that drop all source-routed packets.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2006-6263

Teredo clients, when source routing is enabled, recognize a Routing header in an encapsulated IPv6 packet and send the packet to the next hop, which might allow remote attackers to bypass policies of certain Internet gateways that drop all source-routed packets.

CVSS2: 6.8
10%
Низкий
почти 19 лет назад
debian логотип
CVE-2006-6263

Teredo clients, when source routing is enabled, recognize a Routing he ...

CVSS2: 6.8
10%
Низкий
почти 19 лет назад
github логотип
GHSA-399j-46mc-wxhx

Teredo clients, when source routing is enabled, recognize a Routing header in an encapsulated IPv6 packet and send the packet to the next hop, which might allow remote attackers to bypass policies of certain Internet gateways that drop all source-routed packets.

10%
Низкий
больше 3 лет назад

Уязвимостей на страницу