Количество 3
Количество 3
CVE-2006-6263
Teredo clients, when source routing is enabled, recognize a Routing header in an encapsulated IPv6 packet and send the packet to the next hop, which might allow remote attackers to bypass policies of certain Internet gateways that drop all source-routed packets.
CVE-2006-6263
Teredo clients, when source routing is enabled, recognize a Routing he ...
GHSA-399j-46mc-wxhx
Teredo clients, when source routing is enabled, recognize a Routing header in an encapsulated IPv6 packet and send the packet to the next hop, which might allow remote attackers to bypass policies of certain Internet gateways that drop all source-routed packets.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2006-6263 Teredo clients, when source routing is enabled, recognize a Routing header in an encapsulated IPv6 packet and send the packet to the next hop, which might allow remote attackers to bypass policies of certain Internet gateways that drop all source-routed packets. | CVSS2: 6.8 | 10% Средний | около 19 лет назад | |
CVE-2006-6263 Teredo clients, when source routing is enabled, recognize a Routing he ... | CVSS2: 6.8 | 10% Средний | около 19 лет назад | |
GHSA-399j-46mc-wxhx Teredo clients, when source routing is enabled, recognize a Routing header in an encapsulated IPv6 packet and send the packet to the next hop, which might allow remote attackers to bypass policies of certain Internet gateways that drop all source-routed packets. | 10% Средний | почти 4 года назад |
Уязвимостей на страницу