Total vulnerabilities in the database
Linux 2.4.x allows remote attackers to spoof the bridge Forwarding table via forged packets whose source addresses are the same as the target.
CVSS v2:
No CWE or OWASP classifications available.