Total vulnerabilities in the database
The ARP protocol allows any host to spoof ARP replies and poison the ARP cache to conduct IP address spoofing or a denial of service.
CVSS v2:
No CWE or OWASP classifications available.