A flaw in IP-in-IP protocol allows unauthenticated attacker to route network traffic, leading to spoofing and access control bypasses
Reporter | Title | Published | Views | Family All 26 |
---|---|---|---|---|
![]() | Internet Bug Bounty: IP-in-IP protocol routes arbitrary traffic by default - CVE-2020-10136 | 8 Jun 202015:56 | – | hackerone |
![]() | Cisco NX-OS Software Unexpected IP in IP Packet Processing Vulnerability | 1 Jun 202016:00 | – | cisco |
![]() | K44453423 : IP-in-IP Packet Processing vulnerability CVE-2020-10136 | 1 Jul 202000:00 | – | f5 |
![]() | K000150185: TCP/IP protocol vulnerabilities CVE-2024-7595, CVE-2024-7596, CVE-2025-23018, and CVE-2025-23019 | 28 Feb 202500:00 | – | f5 |
![]() | CVE-2020-10136 | 2 Jun 202009:15 | – | nvd |
![]() | CVE-2024-7595 | 5 Feb 202518:15 | – | nvd |
![]() | CVE-2024-7596 | 5 Feb 202518:15 | – | nvd |
![]() | CVE-2025-23018 | 14 Jan 202520:15 | – | nvd |
![]() | Cisco NX-OS Software Unexpected IP in IP Packet Processing Vulnerability (cisco-sa-nxos-ipip-dos-kCT9X4) | 5 Jun 202000:00 | – | nessus |
![]() | Cisco NX-OS Software Unexpected IP in IP Packet Processing (CVE-2020-10136) | 25 Jul 202300:00 | – | nessus |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo