Total vulnerabilities in the database
Listening TCP ports are sequentially allocated, allowing spoofing attacks.
Software | From | Fixed in |
---|---|---|
netbsd / netbsd | 2.0.4 | 2.0.4.x |
microsoft / windows_nt | - | - |
freebsd / freebsd | 6.2-stable | 6.2-stable.x |
linux / linux_kernel | 2.6.20.1 | 2.6.20.1.x |