Vulnerability Database

326,895

Total vulnerabilities in the database

CVE-2006-2410

raydium_network_netcall_exec function in network.c in Raydium SVN revision 312 and earlier allows remote attackers to cause a denial of service (application crash) via a packet of type 0xFF, which causes a null dereference.

  • Published: May 16, 2006
  • Updated: Nov 9, 2025
  • CVE: CVE-2006-2410
  • Severity: Medium
  • Exploit:

CVSS v2:

  • Severity: Medium
  • Score: 5
  • AV:N/AC:L/Au:N/C:N/I:N/A:P

No CWE or OWASP classifications available.

Software From Fixed in
raydium / raydium svn_revision_291 svn_revision_291.x
raydium / raydium svn_revision_304 svn_revision_304.x
raydium / raydium svn_revision_303 svn_revision_303.x
raydium / raydium svn_revision_295 svn_revision_295.x
raydium / raydium svn_revision_284 svn_revision_284.x
raydium / raydium svn_revision_298 svn_revision_298.x
raydium / raydium svn_revision_294 svn_revision_294.x
raydium / raydium svn_revision_309 svn_revision_309.x
raydium / raydium svn_revision_283 svn_revision_283.x
raydium / raydium svn_revision_285 svn_revision_285.x
raydium / raydium svn_revision_288 svn_revision_288.x
raydium / raydium svn_revision_292 svn_revision_292.x
raydium / raydium svn_revision_311 svn_revision_311.x
raydium / raydium svn_revision_308 svn_revision_308.x
raydium / raydium svn_revision_297 svn_revision_297.x
raydium / raydium svn_revision_287 svn_revision_287.x
raydium / raydium svn_revision_312 svn_revision_312.x
raydium / raydium svn_revision_305 svn_revision_305.x
raydium / raydium svn_revision_299 svn_revision_299.x
raydium / raydium svn_revision_296 svn_revision_296.x
raydium / raydium svn_revision_302 svn_revision_302.x
raydium / raydium svn_revision_310 svn_revision_310.x
raydium / raydium svn_revision_300 svn_revision_300.x
raydium / raydium svn_revision_290 svn_revision_290.x
raydium / raydium svn_revision_306 svn_revision_306.x
raydium / raydium svn_revision_293 svn_revision_293.x
raydium / raydium svn_revision_301 svn_revision_301.x
raydium / raydium svn_revision_307 svn_revision_307.x
raydium / raydium svn_revision_289 svn_revision_289.x
raydium / raydium svn_revision_286 svn_revision_286.x

Frequently Asked Questions

A security vulnerability is a weakness in software, hardware, or configuration that can be exploited to compromise confidentiality, integrity, or availability. Many vulnerabilities are tracked as CVEs (Common Vulnerabilities and Exposures), which provide a standardized identifier so teams can coordinate patching, mitigation, and risk assessment across tools and vendors.

CVSS (Common Vulnerability Scoring System) estimates technical severity, but it doesn't automatically equal business risk. Prioritize using context like internet exposure, affected asset criticality, known exploitation (proof-of-concept or in-the-wild), and whether compensating controls exist. A "Medium" CVSS on an exposed, production system can be more urgent than a "Critical" on an isolated, non-production host.

A vulnerability is the underlying weakness. An exploit is the method or code used to take advantage of it. A zero-day is a vulnerability that is unknown to the vendor or has no publicly available fix when attackers begin using it. In practice, risk increases sharply when exploitation becomes reliable or widespread.

Recurring findings usually come from incomplete Asset Discovery, inconsistent patch management, inherited images, and configuration drift. In modern environments, you also need to watch the software supply chain: dependencies, containers, build pipelines, and third-party services can reintroduce the same weakness even after you patch a single host. Unknown or unmanaged assets (often called Shadow IT) are a common reason the same issues resurface.

Use a simple, repeatable triage model: focus first on externally exposed assets, high-value systems (identity, VPN, email, production), vulnerabilities with known exploits, and issues that enable remote code execution or privilege escalation. Then enforce patch SLAs and track progress using consistent metrics so remediation is steady, not reactive.

SynScan combines attack surface monitoring and continuous security auditing to keep your inventory current, flag high-impact vulnerabilities early, and help you turn raw findings into a practical remediation plan.