296,138
Total vulnerabilities in the database
Linux 2.4.x allows remote attackers to spoof the bridge Forwarding table via forged packets whose source addresses are the same as the target.
CVSS v2:
No CWE or OWASP classifications available.