Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.150543
Categoría:Policy
Título:Linux: Get iptables and ip6tables (KB)
Resumen:Iptables is used to set up, maintain, and inspect the tables of;IP packet filter rules in the Linux kernel. Several different tables may be defined. Each table;contains a number of built-in chains and may also contain user-defined chains.;;Ip6tables is used to set up, maintain, and inspect the tables of IPv6 packet filter rules in the;Linux kernel. Several different tables may be defined. Each table contains a number of built-in;chains and may also contain user-defined chains.;;Each chain is a list of rules which can match a set of packets. Each rule specifies what to do with;a packet that matches. This is called a 'target', which may be a jump to a user-defined chain in the;same table.;;Note: This script only stores information for other Policy Controls.
Descripción:Summary:
Iptables is used to set up, maintain, and inspect the tables of
IP packet filter rules in the Linux kernel. Several different tables may be defined. Each table
contains a number of built-in chains and may also contain user-defined chains.

Ip6tables is used to set up, maintain, and inspect the tables of IPv6 packet filter rules in the
Linux kernel. Several different tables may be defined. Each table contains a number of built-in
chains and may also contain user-defined chains.

Each chain is a list of rules which can match a set of packets. Each rule specifies what to do with
a packet that matches. This is called a 'target', which may be a jump to a user-defined chain in the
same table.

Note: This script only stores information for other Policy Controls.

CVSS Score:
0.0

CVSS Vector:
AV:L/AC:H/Au:S/C:N/I:N/A:N

CopyrightCopyright (C) 2021 Greenbone Networks GmbH

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.