Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
teredo vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-6264
Teredo creates trusted peer entries for arbitrary incoming source Teredo addresses, even if the low 32 bits represent an intranet address, which might allow remote malicious users to send IPv4 traffic to intranet hosts that use non-RFC1918 addresses, bypassing IPv4 ingress filter...
Microsoft Teredo
NA
CVE-2006-6265
Teredo clients, when located behind a restricted NAT, allow remote malicious users to establish an inbound connection without the guessing required to find a port mapping for a traditional restricted NAT client, by (1) using the client port number contained in the Teredo address ...
Microsoft Teredo
NA
CVE-2006-6266
Teredo clients, when following item 6 of RFC4380 section 5.2.3, start direct IPv6 connectivity tests (aka ping tests) in response to packets from non-Teredo source addresses, which might allow remote malicious users to induce Teredo clients to send packets to third parties.
Microsoft Teredo
NA
CVE-2006-6263
Teredo clients, when source routing is enabled, recognize a Routing header in an encapsulated IPv6 packet and send the packet to the next hop, which might allow remote malicious users to bypass policies of certain Internet gateways that drop all source-routed packets.
Microsoft Teredo
NA
CVE-2007-3038
The Teredo interface in Microsoft Windows Vista and Vista x64 Edition does not properly handle certain network traffic, which allows remote malicious users to bypass firewall blocking rules and obtain sensitive information via crafted IPv6 traffic, aka "Windows Vista Firewal...
Microsoft Windows Vista
NA
CVE-2007-1535
Microsoft Windows Vista establishes a Teredo address without user action upon connection to the Internet, contrary to documentation that Teredo is inactive without user action, which increases the attack surface and allows remote malicious users to communicate via Teredo.
Microsoft Windows Vista
NA
CVE-2006-6858
Miredo 0.9.8 up to and including 1.0.5 does not properly authenticate a Teredo bubble during UDP hole punching with HMAC-MD5-64 hashing, which allows remote malicious users to impersonate an arbitrary Teredo client.
Miredo Miredo 0.9.8
Miredo Miredo
Miredo Miredo 1.0.3
Miredo Miredo 1.0.4
NA
CVE-2007-1533
The Teredo implementation in Microsoft Windows Vista uses the same nonce for communication with different UDP ports within a solicitation session, which makes it easier for remote malicious users to spoof the nonce through brute force attacks.
Microsoft Windows Vista
NA
CVE-2015-0639
The Common Flow Table (CFT) feature in Cisco IOS XE 3.6 and 3.7 prior to 3.7.1S, 3.8 prior to 3.8.0S, 3.9 prior to 3.9.0S, 3.10 prior to 3.10.0S, 3.11 prior to 3.11.0S, 3.12 prior to 3.12.0S, 3.13 prior to 3.13.0S, 3.14 prior to 3.14.0S, and 3.15 prior to 3.15.0S, when MMON or NB...
Cisco Ios Xe 3.7s.1
Cisco Ios Xe 3.7s.3
Cisco Ios Xe 3.6s.0
Cisco Ios Xe 3.6s.1
Cisco Ios Xe 3.6s.2
Cisco Ios Xe 3.7s
Cisco Ios Xe 3.7s.4
Cisco Ios Xe 3.7s.5
Cisco Ios Xe 3.6s
Cisco Ios Xe 3.7s.0
Cisco Ios Xe 3.7s.2
NA
CVE-2015-0640
The high-speed logging (HSL) feature in Cisco IOS XE 2.x and 3.x prior to 3.10.4S, 3.11 prior to 3.11.3S, 3.12 prior to 3.12.1S, 3.13 prior to 3.13.0S, 3.14 prior to 3.14.0S, and 3.15 prior to 3.15.0S allows remote malicious users to cause a denial of service (device reload) via ...
Cisco Ios Xe 3.1s.1
Cisco Ios Xe 3.1s.3
Cisco Ios Xe 3.5s
Cisco Ios Xe 3.5s.0
Cisco Ios Xe 3.7s.0
Cisco Ios Xe 3.7s.2
Cisco Ios Xe 3.9s.1
Cisco Ios Xe 3.10s.0
Cisco Ios Xe 3.12s.0
Cisco Ios Xe 3.10s.3
Cisco Ios Xe 3.1s.5
Cisco Ios Xe 3.2s.3
Cisco Ios Xe 3.2s.1
Cisco Ios Xe 3.2s.2
Cisco Ios Xe 3.3s.1
Cisco Ios Xe 3.3s.2
Cisco Ios Xe 3.7s.3
Cisco Ios Xe 3.7s.4
Cisco Ios Xe 3.8s
Cisco Ios Xe 3.8s.0
Cisco Ios Xe 3.8s.1
Cisco Ios Xe 3.7s.6
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
hardcoded
arbitrary code
CVE-2024-2404
CVE-2024-21111
CVE-2024-28627
CVE-2024-4073
information disclosure
CVE-2024-32780
CVE-2024-4040
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »