Логотип exploitDog
bind:CVE-2020-10136
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-10136

Количество 4

Количество 4

redhat логотип

CVE-2020-10136

больше 5 лет назад

IP-in-IP protocol specifies IP Encapsulation within IP standard (RFC 2003, STD 1) that decapsulate and route IP-in-IP traffic is vulnerable to spoofing, access-control bypass and other unexpected behavior due to the lack of validation to verify network packets before decapsulation and routing.

CVSS3: 7.5
EPSS: Средний
nvd логотип

CVE-2020-10136

больше 5 лет назад

IP-in-IP protocol specifies IP Encapsulation within IP standard (RFC 2003, STD 1) that decapsulate and route IP-in-IP traffic is vulnerable to spoofing, access-control bypass and other unexpected behavior due to the lack of validation to verify network packets before decapsulation and routing.

CVSS3: 5.3
EPSS: Средний
github логотип

GHSA-8gxc-83hw-9578

больше 3 лет назад

Multiple products that implement the IP Encapsulation within IP standard (RFC 2003, STD 1) decapsulate and route IP-in-IP traffic without any validation, which could allow an unauthenticated remote attacker to route arbitrary traffic via an exposed network interface and lead to spoofing, access control bypass, and other unexpected network behaviors.

CVSS3: 5.3
EPSS: Средний
fstec логотип

BDU:2020-03348

больше 5 лет назад

Уязвимость операционной системы Cisco NX-OS, связанная с обходом аутентификации посредством спуфинга, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2020-10136

IP-in-IP protocol specifies IP Encapsulation within IP standard (RFC 2003, STD 1) that decapsulate and route IP-in-IP traffic is vulnerable to spoofing, access-control bypass and other unexpected behavior due to the lack of validation to verify network packets before decapsulation and routing.

CVSS3: 7.5
24%
Средний
больше 5 лет назад
nvd логотип
CVE-2020-10136

IP-in-IP protocol specifies IP Encapsulation within IP standard (RFC 2003, STD 1) that decapsulate and route IP-in-IP traffic is vulnerable to spoofing, access-control bypass and other unexpected behavior due to the lack of validation to verify network packets before decapsulation and routing.

CVSS3: 5.3
24%
Средний
больше 5 лет назад
github логотип
GHSA-8gxc-83hw-9578

Multiple products that implement the IP Encapsulation within IP standard (RFC 2003, STD 1) decapsulate and route IP-in-IP traffic without any validation, which could allow an unauthenticated remote attacker to route arbitrary traffic via an exposed network interface and lead to spoofing, access control bypass, and other unexpected network behaviors.

CVSS3: 5.3
24%
Средний
больше 3 лет назад
fstec логотип
BDU:2020-03348

Уязвимость операционной системы Cisco NX-OS, связанная с обходом аутентификации посредством спуфинга, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
24%
Средний
больше 5 лет назад

Уязвимостей на страницу