296,733
Total vulnerabilities in the database
Process table attack in Unix systems allows a remote attacker to perform a denial of service by filling a machine's process tables through multiple connections to network services.
| Software | From | Fixed in |
|---|---|---|
| unix / unix | - | - |