Количество 3
Количество 3
CVE-2006-6263
Teredo clients, when source routing is enabled, recognize a Routing header in an encapsulated IPv6 packet and send the packet to the next hop, which might allow remote attackers to bypass policies of certain Internet gateways that drop all source-routed packets.
CVE-2006-6263
Teredo clients, when source routing is enabled, recognize a Routing he ...
GHSA-399j-46mc-wxhx
Teredo clients, when source routing is enabled, recognize a Routing header in an encapsulated IPv6 packet and send the packet to the next hop, which might allow remote attackers to bypass policies of certain Internet gateways that drop all source-routed packets.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2006-6263 Teredo clients, when source routing is enabled, recognize a Routing header in an encapsulated IPv6 packet and send the packet to the next hop, which might allow remote attackers to bypass policies of certain Internet gateways that drop all source-routed packets. | CVSS2: 6.8 | 10% Низкий | почти 19 лет назад | |
CVE-2006-6263 Teredo clients, when source routing is enabled, recognize a Routing he ... | CVSS2: 6.8 | 10% Низкий | почти 19 лет назад | |
GHSA-399j-46mc-wxhx Teredo clients, when source routing is enabled, recognize a Routing header in an encapsulated IPv6 packet and send the packet to the next hop, which might allow remote attackers to bypass policies of certain Internet gateways that drop all source-routed packets. | 10% Низкий | больше 3 лет назад |
Уязвимостей на страницу