296,733
Total vulnerabilities in the database
In Linux before version 2.0.36, remote attackers can spoof a TCP connection and pass data to the application layer before fully establishing the connection.
| Software | From | Fixed in |
|---|---|---|
| linux / linux_kernel | 2.0.30 | 2.0.30.x |
| linux / linux_kernel | 2.0.37 | 2.0.37.x |
| linux / linux_kernel | 2.0.36 | 2.0.36.x |
| linux / linux_kernel | 2.0.35 | 2.0.35.x |