296,747
Total vulnerabilities in the database
The PMTU discovery procedure used by HP-UX 10.30 and 11.00 for determining the optimum MTU generates large amounts of traffic in response to small packets, allowing remote attackers to cause the system to be used as a packet amplifier.
| Software | From | Fixed in |
|---|---|---|
| hp / hp-ux | 10.30 | 10.30.x |
| hp / hp-ux | 11.00 | 11.00.x |