2023-10-10 16:00:28 +00:00
{
"id" : "CVE-2023-44487" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2023-10-10T14:15:10.883" ,
2023-10-29 09:06:41 +00:00
"lastModified" : "2023-10-29T04:15:10.827" ,
"vulnStatus" : "Undergoing Analysis" ,
2023-10-11 02:00:28 +00:00
"cisaExploitAdd" : "2023-10-10" ,
"cisaActionDue" : "2023-10-31" ,
"cisaRequiredAction" : "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable." ,
"cisaVulnerabilityName" : "HTTP/2 Rapid Reset Attack Vulnerability" ,
2023-10-10 16:00:28 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023."
2023-10-11 22:00:28 +00:00
} ,
{
"lang" : "es" ,
"value" : "El protocolo HTTP/2 permite una denegaci\u00f3n de servicio (consumo de recursos del servidor) porque la cancelaci\u00f3n de solicitudes puede restablecer muchas transmisiones r\u00e1pidamente, como explot\u00f3 salvajemente entre agosto y octubre de 2023."
2023-10-10 16:00:28 +00:00
}
] ,
2023-10-13 20:00:27 +00:00
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 7.5 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 3.6
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-400"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ietf:http:2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D5200E35-222B-42E0-83E0-5B702684D992"
}
]
}
]
2023-10-29 09:06:41 +00:00
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:nghttp2:nghttp2:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.57.0" ,
"matchCriteriaId" : "C3BDC297-F023-4E87-8518-B84CCF9DD6A8"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netty:netty:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "4.1.100" ,
"matchCriteriaId" : "D12D5257-7ED2-400F-9EF7-40E0D3650C2B"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:envoyproxy:envoy:1.24.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1B058776-B5B7-4079-B0AF-23F40926DCEC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:envoyproxy:envoy:1.25.9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6D565975-EFD9-467C-B6E3-1866A4EF17A4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:envoyproxy:envoy:1.26.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6D487271-1B5E-4F16-B0CB-A7B8908935C6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:envoyproxy:envoy:1.27.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BA6ED627-EFB3-4BDD-8ECC-C5947A1470B2"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "9.4.53" ,
"matchCriteriaId" : "A4A6F189-6C43-462D-85C9-B0EBDA8A4683"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "10.0.0" ,
"versionEndExcluding" : "10.0.17" ,
"matchCriteriaId" : "C993C920-85C0-4181-A95E-5D965A670738"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "11.0.0" ,
"versionEndExcluding" : "11.0.17" ,
"matchCriteriaId" : "08E79A8E-E12C-498F-AF4F-1AAA7135661E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "12.0.0" ,
"versionEndExcluding" : "12.0.2" ,
"matchCriteriaId" : "F138D800-9A3B-4C76-8A3C-4793083A1517"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:caddyserver:caddy:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "2.7.5" ,
"matchCriteriaId" : "6341DDDA-AD27-4087-9D59-0A212F0037B4"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.20.10" ,
"matchCriteriaId" : "328120E4-C031-44B4-9BE5-03B0CDAA066F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "1.21.0" ,
"versionEndExcluding" : "1.21.3" ,
"matchCriteriaId" : "5FD9AB15-E5F6-4DBC-9EC7-D0ABA705802A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:golang:http2:*:*:*:*:*:go:*:*" ,
"versionEndExcluding" : "0.17.0" ,
"matchCriteriaId" : "D7D2F801-6F65-4705-BCB9-D057EA54A707"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:golang:networking:*:*:*:*:*:go:*:*" ,
"versionEndExcluding" : "0.17.0" ,
"matchCriteriaId" : "801F25DA-F38C-4452-8E90-235A3B1A5FF0"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.1.0" ,
"versionEndIncluding" : "13.1.5" ,
"matchCriteriaId" : "D93F04AD-DF14-48AB-9F13-8B2E491CF42E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.1.0" ,
"versionEndIncluding" : "14.1.5" ,
"matchCriteriaId" : "7522C760-7E07-406F-BF50-5656D5723C4F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.1.0" ,
"versionEndIncluding" : "15.1.10" ,
"matchCriteriaId" : "3A7F605E-EB10-40FB-98D6-7E3A95E310BC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.1.0" ,
"versionEndIncluding" : "16.1.4" ,
"matchCriteriaId" : "783E62F2-F867-48F1-B123-D1227C970674"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0A8D90B7-A1AF-4EFB-B688-1563D81E5C6D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.1.0" ,
"versionEndIncluding" : "13.1.5" ,
"matchCriteriaId" : "6603ED6A-3366-4572-AFCD-B3D4B1EC7606"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.1.0" ,
"versionEndIncluding" : "14.1.5" ,
"matchCriteriaId" : "88978E38-81D3-4EFE-8525-A300B101FA69"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.1.0" ,
"versionEndIncluding" : "15.1.10" ,
"matchCriteriaId" : "0510296F-92D7-4388-AE3A-0D9799C2FC4D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.1.0" ,
"versionEndIncluding" : "16.1.4" ,
"matchCriteriaId" : "D7698D6C-B1F7-43C1-BBA6-88E956356B3D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1A1CC91B-6920-4AF0-9EDD-DD3189E78F4D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.1.0" ,
"versionEndIncluding" : "13.1.5" ,
"matchCriteriaId" : "05E452AA-A520-4CBE-8767-147772B69194"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.1.0" ,
"versionEndIncluding" : "14.1.5" ,
"matchCriteriaId" : "596FC5D5-7329-4E39-841E-CAE937C02219"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.1.0" ,
"versionEndIncluding" : "15.1.10" ,
"matchCriteriaId" : "B3C7A168-F370-441E-8790-73014BCEC39F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.1.0" ,
"versionEndIncluding" : "16.1.4" ,
"matchCriteriaId" : "CF16FD01-7704-40AB-ACB2-80A883804D22"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1769D69A-CB59-46B1-89B3-FB97DC6DEB9B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.1.0" ,
"versionEndIncluding" : "13.1.5" ,
"matchCriteriaId" : "9167FEC1-2C37-4946-9657-B4E69301FB24"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.1.0" ,
"versionEndIncluding" : "14.1.5" ,
"matchCriteriaId" : "7B4B3442-E0C0-48CD-87AD-060E15C9801E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.1.0" ,
"versionEndIncluding" : "15.1.10" ,
"matchCriteriaId" : "8FA85EC1-D91A-49DD-949B-2AF7AC813CA5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.1.0" ,
"versionEndIncluding" : "16.1.4" ,
"matchCriteriaId" : "20662BB0-4C3D-4CF0-B068-3555C65DD06C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "59203EBF-C52A-45A1-B8DF-00E17E3EFB51"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.1.0" ,
"versionEndIncluding" : "13.1.5" ,
"matchCriteriaId" : "7EC2324D-EC8B-41DF-88A7-819E53AAD0FC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.1.0" ,
"versionEndIncluding" : "14.1.5" ,
"matchCriteriaId" : "9B88F9D1-B54B-40C7-A18A-26C4A071D7EC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.1.0" ,
"versionEndIncluding" : "15.1.10" ,
"matchCriteriaId" : "C8F39403-C259-4D6F-9E9A-53671017EEDB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.1.0" ,
"versionEndIncluding" : "16.1.4" ,
"matchCriteriaId" : "220F2D38-FA82-45EF-B957-7678C9FEDBC1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5C698C1C-A3DD-46E2-B05A-12F2604E7F85"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.1.0" ,
"versionEndIncluding" : "13.1.5" ,
"matchCriteriaId" : "922AA845-530A-4B4B-9976-4CBC30C8A324"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.1.0" ,
"versionEndIncluding" : "14.1.5" ,
"matchCriteriaId" : "F938EB43-8373-47EB-B269-C6DF058A9244"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.1.0" ,
"versionEndIncluding" : "15.1.10" ,
"matchCriteriaId" : "1771493E-ACAA-477F-8AB4-25DB12F6AD6E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.1.0" ,
"versionEndIncluding" : "16.1.4" ,
"matchCriteriaId" : "5E86F3D5-65A4-48CE-A6A2-736BBB88E3F8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "87670A74-34FE-45DF-A725-25B804C845B3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.1.0" ,
"versionEndIncluding" : "13.1.5" ,
"matchCriteriaId" : "C7E422F6-C4C2-43AC-B137-0997B5739030"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.1.0" ,
"versionEndIncluding" : "14.1.5" ,
"matchCriteriaId" : "CC3F710F-DBCB-4976-9719-CF063DA22377"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.1.0" ,
"versionEndIncluding" : "15.1.10" ,
"matchCriteriaId" : "4B9B76A1-7C5A-453F-A4ED-F1A81BCEBEB5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.1.0" ,
"versionEndIncluding" : "16.1.4" ,
"matchCriteriaId" : "88EDFCD9-775C-48FA-9CDA-2B04DA8D0612"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "67DB21AE-DF53-442D-B492-C4ED9A20B105"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.1.0" ,
"versionEndIncluding" : "13.1.5" ,
"matchCriteriaId" : "4C9FCBCB-9CE0-49E7-85C8-69E71D211912"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.1.0" ,
"versionEndIncluding" : "14.1.5" ,
"matchCriteriaId" : "112DFA85-90AD-478D-BD70-8C7C0C074F1B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.1.0" ,
"versionEndIncluding" : "15.1.10" ,
"matchCriteriaId" : "DB704A1C-D8B7-48BB-A15A-C14DB591FE4A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.1.0" ,
"versionEndIncluding" : "16.1.4" ,
"matchCriteriaId" : "21D51D9F-2840-4DEA-A007-D20111A1745C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7BC1D037-74D2-4F92-89AD-C90F6CBF440B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.1.0" ,
"versionEndIncluding" : "13.1.5" ,
"matchCriteriaId" : "CAEF3EA4-7D5A-4B44-9CE3-258AEC745866"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.1.0" ,
"versionEndIncluding" : "14.1.5" ,
"matchCriteriaId" : "2FBCE2D1-9D93-415D-AB2C-2060307C305A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.1.0" ,
"versionEndIncluding" : "15.1.10" ,
"matchCriteriaId" : "8070B469-8CC4-4D2F-97D7-12D0ABB963C1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.1.0" ,
"versionEndIncluding" : "16.1.4" ,
"matchCriteriaId" : "A326597E-725D-45DE-BEF7-2ED92137B253"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7B235A78-649B-46C5-B24B-AB485A884654"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.1.0" ,
"versionEndIncluding" : "13.1.5" ,
"matchCriteriaId" : "08B25AAB-A98C-4F89-9131-29E3A8C0ED23"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.1.0" ,
"versionEndIncluding" : "14.1.5" ,
"matchCriteriaId" : "ED9B976A-D3AD-4445-BF8A-067C3EBDFBB0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.1.0" ,
"versionEndIncluding" : "15.1.10" ,
"matchCriteriaId" : "98D2CE1E-DED0-470A-AA78-C78EF769C38E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.1.0" ,
"versionEndIncluding" : "16.1.4" ,
"matchCriteriaId" : "C966FABA-7199-4F0D-AB8C-4590FE9D2FFF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "84D00768-E71B-4FF7-A7BF-F2C8CFBC900D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.1.0" ,
"versionEndIncluding" : "13.1.5" ,
"matchCriteriaId" : "E3D2ABA3-D4A9-4267-B0DF-7C3BBEEAEB66"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.1.0" ,
"versionEndIncluding" : "14.1.5" ,
"matchCriteriaId" : "BC36311E-BB00-4750-85C8-51F5A2604F07"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.1.0" ,
"versionEndIncluding" : "15.1.10" ,
"matchCriteriaId" : "A65D357E-4B40-42EC-9AAA-2B6CEF78C401"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.1.0" ,
"versionEndIncluding" : "16.1.4" ,
"matchCriteriaId" : "D7EF9865-FE65-4DFB-BF21-62FBCE65FF1C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "ABBD10E8-6054-408F-9687-B9BF6375CA09"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.1.0" ,
"versionEndIncluding" : "13.1.5" ,
"matchCriteriaId" : "E6018B01-048C-43BB-A78D-66910ED60CA9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.1.0" ,
"versionEndIncluding" : "14.1.5" ,
"matchCriteriaId" : "3A6A5686-5A8B-45D5-9165-BC99D2CCAC47"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.1.0" ,
"versionEndIncluding" : "15.1.10" ,
"matchCriteriaId" : "5D2A121F-5BD2-4263-8ED3-1DDE25B5C306"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.1.0" ,
"versionEndIncluding" : "16.1.4" ,
"matchCriteriaId" : "0A4F7BAD-3EDD-4DE0-AAB7-DE5ACA34DD79"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "83794B04-87E2-4CA9-81F5-BB820D0F5395"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.1.0" ,
"versionEndIncluding" : "13.1.5" ,
"matchCriteriaId" : "D9EC2237-117F-43BD-ADEC-516CF72E04EF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.1.0" ,
"versionEndIncluding" : "14.1.5" ,
"matchCriteriaId" : "F70D4B6F-65CF-48F4-9A07-072DFBCE53D9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.1.0" ,
"versionEndIncluding" : "15.1.10" ,
"matchCriteriaId" : "29563719-1AF2-4BB8-8CCA-A0869F87795D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.1.0" ,
"versionEndIncluding" : "16.1.4" ,
"matchCriteriaId" : "D24815DD-579A-46D1-B9F2-3BB2C56BC54D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0A6E7035-3299-474F-8F67-945EA9A059D0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.1.0" ,
"versionEndIncluding" : "13.1.5" ,
"matchCriteriaId" : "0360F76D-E75E-4B05-A294-B47012323ED9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.1.0" ,
"versionEndIncluding" : "14.1.5" ,
"matchCriteriaId" : "7A4607BF-41AC-4E84-A110-74E085FF0445"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.1.0" ,
"versionEndIncluding" : "15.1.10" ,
"matchCriteriaId" : "441CC945-7CA3-49C0-AE10-94725301E31D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.1.0" ,
"versionEndIncluding" : "16.1.4" ,
"matchCriteriaId" : "46BA8E8A-6ED5-4FB2-8BBC-586AA031085A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "56FB92F7-FF1E-425D-A5AB-9D9FB0BB9450"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "969C4F14-F6D6-46D6-B348-FC1463877680"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "1.5.0" ,
"versionEndIncluding" : "1.8.2" ,
"matchCriteriaId" : "41AD5040-1250-45F5-AB63-63F333D49BCC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.1.0" ,
"versionEndIncluding" : "13.1.5" ,
"matchCriteriaId" : "8257AA59-C14D-4EC1-B22C-DFBB92CBC297"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.1.0" ,
"versionEndIncluding" : "14.1.5" ,
"matchCriteriaId" : "37DB32BB-F4BA-4FB5-94B1-55C3F06749CF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.1.0" ,
"versionEndIncluding" : "15.1.10" ,
"matchCriteriaId" : "FFF5007E-761C-4697-8D34-C064DF0ABE8D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.1.0" ,
"versionEndIncluding" : "16.1.4" ,
"matchCriteriaId" : "910441D3-90EF-4375-B007-D51120A60AB2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "667EB77B-DA13-4BA4-9371-EE3F3A109F38"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.1.0" ,
"versionEndIncluding" : "13.1.5" ,
"matchCriteriaId" : "8A6F9699-A485-4614-8F38-5A556D31617E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.1.0" ,
"versionEndIncluding" : "14.1.5" ,
"matchCriteriaId" : "5A90F547-97A2-41EC-9FDF-25F869F0FA38"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.1.0" ,
"versionEndIncluding" : "15.1.10" ,
"matchCriteriaId" : "E76E1B82-F1DC-4366-B388-DBDF16C586A0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.1.0" ,
"versionEndIncluding" : "16.1.4" ,
"matchCriteriaId" : "660137F4-15A1-42D1-BBAC-99A1D5BB398B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C446827A-1F71-4FAD-9422-580642D26AD1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.1.0" ,
"versionEndIncluding" : "13.1.5" ,
"matchCriteriaId" : "1932D32D-0E4B-4BBD-816F-6D47AB2E2F04"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.1.0" ,
"versionEndIncluding" : "14.1.5" ,
"matchCriteriaId" : "D47B7691-A95B-45C0-BAB4-27E047F3C379"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.1.0" ,
"versionEndIncluding" : "15.1.10" ,
"matchCriteriaId" : "2CD1637D-0E42-4928-867A-BA0FDB6E8462"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.1.0" ,
"versionEndIncluding" : "16.1.4" ,
"matchCriteriaId" : "3A599F90-F66B-4DF0-AD7D-D234F328BD59"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3D1B2000-C3FE-4B4C-885A-A5076EB164E1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.1.0" ,
"versionEndIncluding" : "13.1.5" ,
"matchCriteriaId" : "5326759A-AFB0-4A15-B4E9-3C9A2E5DB32A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.1.0" ,
"versionEndIncluding" : "14.1.5" ,
"matchCriteriaId" : "57D92D05-C67D-437E-88F3-DCC3F6B0ED2F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.1.0" ,
"versionEndIncluding" : "15.1.10" ,
"matchCriteriaId" : "ECCB8C30-861E-4E48-A5F5-30EE523C1FB6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.1.0" ,
"versionEndIncluding" : "16.1.4" ,
"matchCriteriaId" : "F5FEAD2A-3A58-432E-BEBB-6E3FDE24395F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8AB23AE6-245E-43D6-B832-933F8259F937"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "1.9.5" ,
"versionEndIncluding" : "1.25.2" ,
"matchCriteriaId" : "1188B4A9-2684-413C-83D1-E91C75AE0FCF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "2.0.0" ,
"versionEndIncluding" : "2.4.2" ,
"matchCriteriaId" : "3337609D-5291-4A52-BC6A-6A8D4E60EB20"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "3.0.0" ,
"versionEndIncluding" : "3.3.0" ,
"matchCriteriaId" : "6CF0ABD9-EB28-4966-8C31-EED7AFBF1527"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "r25" ,
"versionEndExcluding" : "r29" ,
"matchCriteriaId" : "F291CB34-47A4-425A-A200-087CC295AEC8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "5892B558-EC3A-43FF-A1D5-B2D9F70796F0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "96BF2B19-52C7-4051-BA58-CAE6F912B72F"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "8.5.0" ,
"versionEndIncluding" : "8.5.93" ,
"matchCriteriaId" : "ABD26B48-CC80-4FAE-BD3D-78DE4C80C92B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "9.0.0" ,
"versionEndIncluding" : "9.0.80" ,
"matchCriteriaId" : "F3EC20B6-B2AB-41F5-9BF9-D16C1FE67C34"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "10.1.0" ,
"versionEndIncluding" : "10.1.13" ,
"matchCriteriaId" : "0765CC3D-AB1A-4147-8900-EF4C105321F2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:tomcat:11.0.0:milestone1:*:*:*:*:*:*" ,
"matchCriteriaId" : "D1AA7FF6-E8E7-4BF6-983E-0A99B0183008"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:tomcat:11.0.0:milestone10:*:*:*:*:*:*" ,
"matchCriteriaId" : "57088BDD-A136-45EF-A8A1-2EBF79CEC2CE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:tomcat:11.0.0:milestone11:*:*:*:*:*:*" ,
"matchCriteriaId" : "B32D1D7A-A04F-444E-8F45-BB9A9E4B0199"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:tomcat:11.0.0:milestone2:*:*:*:*:*:*" ,
"matchCriteriaId" : "2AAD52CE-94F5-4F98-A027-9A7E68818CB6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:tomcat:11.0.0:milestone3:*:*:*:*:*:*" ,
"matchCriteriaId" : "F1F981F5-035A-4EDD-8A9F-481EE8BC7FF7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:tomcat:11.0.0:milestone4:*:*:*:*:*:*" ,
"matchCriteriaId" : "03A171AF-2EC8-4422-912C-547CDB58CAAA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:tomcat:11.0.0:milestone5:*:*:*:*:*:*" ,
"matchCriteriaId" : "538E68C4-0BA4-495F-AEF8-4EF6EE7963CF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:tomcat:11.0.0:milestone6:*:*:*:*:*:*" ,
"matchCriteriaId" : "49350A6E-5E1D-45B2-A874-3B8601B3ADCC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:tomcat:11.0.0:milestone7:*:*:*:*:*:*" ,
"matchCriteriaId" : "5F50942F-DF54-46C0-8371-9A476DD3EEA3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:tomcat:11.0.0:milestone8:*:*:*:*:*:*" ,
"matchCriteriaId" : "D12C2C95-B79F-4AA4-8CE3-99A3EE7991AB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:tomcat:11.0.0:milestone9:*:*:*:*:*:*" ,
"matchCriteriaId" : "98792138-DD56-42DF-9612-3BDC65EEC117"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:swiftnio_http\\/2:*:*:*:*:*:swift:*:*" ,
"versionEndExcluding" : "1.28.0" ,
"matchCriteriaId" : "08190072-3880-4EF5-B642-BA053090D95B"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:grpc:grpc:*:*:*:*:*:go:*:*" ,
"versionEndExcluding" : "1.56.3" ,
"matchCriteriaId" : "5F4CDEA9-CB47-4881-B096-DA896E2364F3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:grpc:grpc:*:*:*:*:*:go:*:*" ,
"versionStartIncluding" : "1.58.0" ,
"versionEndExcluding" : "1.58.3" ,
"matchCriteriaId" : "DD868DDF-C889-4F36-B5E6-68B6D9EA48CC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:grpc:grpc:1.57.0:-:*:*:*:go:*:*" ,
"matchCriteriaId" : "FBD991E2-DB5A-4AAD-95BA-4B5ACB811C96"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "6.0.0" ,
"versionEndExcluding" : "6.0.23" ,
"matchCriteriaId" : "4496821E-BD55-4F31-AD9C-A3D66CBBD6BD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "7.0.0" ,
"versionEndExcluding" : "7.0.12" ,
"matchCriteriaId" : "8DF7ECF6-178D-433C-AA21-BAE9EF248F37"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "6.0.0" ,
"versionEndExcluding" : "6.0.23" ,
"matchCriteriaId" : "1C3418F4-B8BF-4666-BB39-C188AB01F45C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "7.0.0" ,
"versionEndExcluding" : "7.0.12" ,
"matchCriteriaId" : "1278DD1C-EFA9-4316-AD32-24C1B1FB0CEA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:microsoft:azure_kubernetes_service:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "2023-10-08" ,
"matchCriteriaId" : "3BDFB0FF-0F4A-4B7B-94E8-ED72A8106314"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.0" ,
"versionEndExcluding" : "17.2.20" ,
"matchCriteriaId" : "16A8F269-E07E-402F-BFD5-60F3988A5EAF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.4" ,
"versionEndExcluding" : "17.4.12" ,
"matchCriteriaId" : "C4B2B972-69E2-4D21-9A7C-B2AFF1D89EB8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.6" ,
"versionEndExcluding" : "17.6.8" ,
"matchCriteriaId" : "DA5834D4-F52F-41C0-AA11-C974FFEEA063"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.7" ,
"versionEndExcluding" : "17.7.5" ,
"matchCriteriaId" : "2166106F-ACD6-4C7B-B0CC-977B83CC5F73"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*" ,
"versionEndExcluding" : "10.0.14393.6351" ,
"matchCriteriaId" : "4CD49C41-6D90-47D3-AB4F-4A74169D3A8F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*" ,
"versionEndExcluding" : "10.0.14393.6351" ,
"matchCriteriaId" : "BAEFEE13-9CD7-46A2-8AF6-0A33C79C05F1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "10.0.17763.4974" ,
"matchCriteriaId" : "E500D59C-6597-45E9-A57B-BE26C0C231D3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "10.0.19044.3570" ,
"matchCriteriaId" : "C9F9A643-90C6-489C-98A0-D2739CE72F86"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "10.0.19045.3570" ,
"matchCriteriaId" : "1814619C-ED07-49E0-A50A-E28D824D43BC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "10.0.22000.2538" ,
"matchCriteriaId" : "100A27D3-87B0-4E72-83F6-7605E3F35E63"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "10.0.22621.2428" ,
"matchCriteriaId" : "C6A36795-0238-45C9-ABE6-3DCCF751915B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DB79EE26-FC32-417D-A49C-A1A63165A968"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*" ,
"versionStartIncluding" : "18.0.0" ,
"versionEndExcluding" : "18.18.2" ,
"matchCriteriaId" : "C61F0294-5C7E-4DB2-8905-B85D0782F35F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "20.0.0" ,
"versionEndExcluding" : "20.8.1" ,
"matchCriteriaId" : "69843DE4-4721-4F0A-A9B7-0F6DF5AAA388"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:microsoft:cbl-mariner:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "2023-10-11" ,
"matchCriteriaId" : "B25279EF-C406-4133-99ED-0492703E0A4E"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:dena:h2o:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "2023-10-10" ,
"matchCriteriaId" : "9FFFF84B-F35C-43DE-959A-A5D10C3AE9F5"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:facebook:proxygen:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "2023.10.16.00" ,
"matchCriteriaId" : "9DCE8C89-7C22-48CA-AF22-B34C8AA2CB8C"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:apisix:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "3.6.1" ,
"matchCriteriaId" : "EDEB508E-0EBD-4450-9074-983DDF568AB4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "8.0.0" ,
"versionEndExcluding" : "8.1.9" ,
"matchCriteriaId" : "93A1A748-6C71-4191-8A16-A93E94E2CDE4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "9.0.0" ,
"versionEndExcluding" : "9.2.3" ,
"matchCriteriaId" : "4E4BCAF6-B246-41EC-9EE1-24296BFC4F5A"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:amazon:opensearch_data_prepper:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "2.5.0" ,
"matchCriteriaId" : "6F70360D-6214-46BA-AF82-6AB01E13E4E9"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FA6FEEC2-9F11-4643-8827-749718254FED"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:kazu-yamamoto:http2:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "4.2.2" ,
"matchCriteriaId" : "E2DA759E-1AF8-49D3-A3FC-1B426C13CA82"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.17.6" ,
"matchCriteriaId" : "28BE6F7B-AE66-4C8A-AAFA-F1262671E9BF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "1.18.0" ,
"versionEndExcluding" : "1.18.3" ,
"matchCriteriaId" : "F0C8E760-C8D2-483A-BBD4-6A6D292A3874"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "1.19.0" ,
"versionEndExcluding" : "1.19.1" ,
"matchCriteriaId" : "5D0F78BB-6A05-4C97-A8DB-E731B6CC8CC7"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:varnish_cache_project:varnish_cache:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "2023-10-10" ,
"matchCriteriaId" : "050AE218-3871-44D6-94DA-12D84C2093CB"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "2.10.5" ,
"matchCriteriaId" : "B36BFFB0-C0EC-4926-A1DB-0B711C846A68"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:traefik:traefik:3.0.0:beta1:*:*:*:*:*:*" ,
"matchCriteriaId" : "376EAF9B-E994-4268-9704-0A45EA30270F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:traefik:traefik:3.0.0:beta2:*:*:*:*:*:*" ,
"matchCriteriaId" : "F3D08335-C291-4623-B80C-3B14C4D1FA32"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:traefik:traefik:3.0.0:beta3:*:*:*:*:*:*" ,
"matchCriteriaId" : "21033CEE-CEF5-4B0D-A565-4A6FC764AA6D"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:projectcontour:contour:*:*:*:*:*:kubernetes:*:*" ,
"versionEndExcluding" : "2023-10-11" ,
"matchCriteriaId" : "FC4C66B1-42C0-495D-AE63-2889DE0BED84"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:linkerd:linkerd:*:*:*:*:stable:kubernetes:*:*" ,
"versionStartIncluding" : "2.12.0" ,
"versionEndIncluding" : "2.12.5" ,
"matchCriteriaId" : "8633E263-F066-4DD8-A734-90207207A873"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:linkerd:linkerd:2.13.0:*:*:*:stable:kubernetes:*:*" ,
"matchCriteriaId" : "34A23BD9-A0F4-4D85-8011-EAC93C29B4E8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:linkerd:linkerd:2.13.1:*:*:*:stable:kubernetes:*:*" ,
"matchCriteriaId" : "27ED3533-A795-422F-B923-68BE071DC00D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:linkerd:linkerd:2.14.0:*:*:*:stable:kubernetes:*:*" ,
"matchCriteriaId" : "45F7E352-3208-4188-A5B1-906E00DF9896"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:linkerd:linkerd:2.14.1:*:*:*:stable:kubernetes:*:*" ,
"matchCriteriaId" : "DF89A8AD-66FE-439A-B732-CAAB304D765B"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:linecorp:armeria:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.26.0" ,
"matchCriteriaId" : "A400C637-AF18-4BEE-B57C-145261B65DEC"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "653A5B08-0D02-4362-A8B1-D00B24C6C6F2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4B0E6B4B-BAA6-474E-A18C-72C9719CEC1F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F0FD736A-8730-446A-BA3A-7B608DB62B0E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F4C504B6-3902-46E2-82B7-48AEC9CDD48D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7B4BE2D6-43C3-4065-A213-5DB1325DC78F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1D54F5AE-61EC-4434-9D5F-9394A3979894"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CE29B9D6-63DC-4779-ACE8-4E51E6A0AF37"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4E37E1B3-6F68-4502-85D6-68333643BDFF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6D5A7736-A403-4617-8790-18E46CB74DA6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "33F13B03-69BF-4A8B-A0A0-7F47FD857461"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9393119E-F018-463F-9548-60436F104195"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DC45EE1E-2365-42D4-9D55-92FA24E5ED3A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E567CD9F-5A43-4D25-B911-B5D0440698F4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "68146098-58F8-417E-B165-5182527117C4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CB4D6790-63E5-4043-B8BE-B489D649061D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "78698F40-0777-4990-822D-02E1B5D0E2C0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B87C8AD3-8878-4546-86C2-BF411876648C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EF03BDE8-602D-4DEE-BA5B-5B20FDF47741"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A58966CB-36AF-4E64-AB39-BE3A0753E155"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "585BC540-073B-425B-B664-5EA4C00AFED6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9B453CF7-9AA6-4B94-A003-BF7AE0B82F53"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CD354E32-A8B0-484C-B4C6-9FBCD3430D2D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B142ACCC-F7A9-4A3B-BE60-0D6691D5058D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "72A54BDA-311C-413B-8E4D-388AD65A170A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A305F012-544E-4245-9D69-1C8CD37748B1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B40CCE4F-EA2C-453D-BB76-6388767E5C6D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EF93A27E-AA2B-4C2E-9B8D-FE7267847326"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2B12A3A8-6456-481A-A0C9-524543FCC149"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3C2E7E3C-A507-4AB2-97E5-4944D8775CF7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4E22EBF9-AA0D-4712-9D69-DD97679CE835"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "941B114C-FBD7-42FF-B1D8-4EA30E99102C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "339CFB34-A795-49F9-BF6D-A00F3A1A4F63"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8D044DBE-6F5A-4C53-828E-7B1A570CACFF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E23FA47F-B967-44AD-AB76-1BB2CAD3CA5B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*" ,
"matchCriteriaId" : "65203CA1-5225-4E55-A187-6454C091F532"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7BF8EFFB-5686-4F28-A68F-1A8854E098CE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "932D137F-528B-4526-9A89-CD59FA1AB0FE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5DA9B2E2-958B-478D-87D6-E5CDDCD44315"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B3F5FF1E-5DA3-4EC3-B41A-A362BDFC4C69"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "99B8A88B-0B31-4CFF-AFD7-C9D3DDD5790D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "97321212-0E07-4CC2-A917-7B5F61AB9A5A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DF390236-3259-4C8F-891C-62ACC4386CD1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C0AAA300-691A-4957-8B69-F6888CC971B1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "45937289-2D64-47CB-A750-5B4F0D4664A0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B129311C-EB4B-4041-B85C-44D5E53FCAA3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F1AB54DB-3FB4-41CB-88ED-1400FD22AB85"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "77675CB7-67D7-44E9-B7FF-D224B3341AA5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A76A2BCE-4AAE-46D7-93D6-2EDE0FC83145"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9C877879-B84B-471C-80CF-0656521CA8AB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DCC81071-B46D-4F5D-AC25-B4A4CCC20C73"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4B3000D2-35DF-4A93-9FC0-1AD3AB8349B8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E315FC5C-FF19-43C9-A58A-CF2A5FF13824"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "20A6B40D-F991-4712-8E30-5FE008505CB7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B1987BDA-0113-4603-B9BE-76647EB043F2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D482A3D2-6E9B-42BA-9926-35E5BDD5F3BF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "848C92A9-0677-442B-8D52-A448F2019903"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6F564701-EDC1-43CF-BB9F-287D6992C6CB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "12B0CF2B-D1E1-4E20-846E-6F0D873499A9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9EFEC7CA-8DDA-48A6-A7B6-1F1D14792890"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E8885C2C-7FB8-40CA-BCB9-B48C50BF2499"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9D88B140-D2A1-4A0A-A2E9-1A3B50C295AD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F4CFF558-3C47-480D-A2F0-BABF26042943"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7F6FB57C-2BC7-487C-96DD-132683AEB35D"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:service_telemetry_framework:1.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A903C3AD-2D25-45B5-BF4A-A5BEB2286627"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F4CFF558-3C47-480D-A2F0-BABF26042943"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:astra_control_center:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EC5EBD2A-32A3-46D5-B155-B44DCB7F6902"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:akka:http_server:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "10.5.3" ,
"matchCriteriaId" : "C2792650-851F-4820-B003-06A4BEA092D7"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:konghq:kong_gateway:*:*:*:*:enterprise:*:*:*" ,
"versionEndExcluding" : "3.4.2" ,
"matchCriteriaId" : "9F6B63B9-F4C9-4A3F-9310-E0918E1070D1"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*" ,
"versionEndIncluding" : "2.414.2" ,
"matchCriteriaId" : "E6FF5F80-A991-43D4-B49F-D843E2BC5798"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*" ,
"versionEndIncluding" : "2.427" ,
"matchCriteriaId" : "54D25DA9-12D0-4F14-83E6-C69D0293AAB9"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "9.4.0" ,
"matchCriteriaId" : "8E1AFFB9-C717-4727-B0C9-5A0C281710E2"
}
]
}
]
2023-10-13 20:00:27 +00:00
}
] ,
2023-10-10 16:00:28 +00:00
"references" : [
2023-10-13 20:00:27 +00:00
{
"url" : "http://www.openwall.com/lists/oss-security/2023/10/13/4" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
2023-10-13 22:00:27 +00:00
{
"url" : "http://www.openwall.com/lists/oss-security/2023/10/13/9" ,
2023-10-29 09:06:41 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2023/10/18/4" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2023/10/18/8" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2023/10/19/6" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2023/10/20/8" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List"
]
2023-10-13 22:00:27 +00:00
} ,
2023-10-11 22:00:28 +00:00
{
"url" : "https://access.redhat.com/security/cve/cve-2023-44487" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
2023-10-11 22:00:28 +00:00
} ,
2023-10-14 02:00:28 +00:00
{
"url" : "https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/" ,
2023-10-29 09:06:41 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Press/Media Coverage" ,
"Third Party Advisory"
]
2023-10-14 02:00:28 +00:00
} ,
2023-10-10 16:00:28 +00:00
{
"url" : "https://aws.amazon.com/security/security-bulletins/AWS-2023-011/" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
2023-10-10 16:00:28 +00:00
} ,
{
"url" : "https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Technical Description" ,
"Vendor Advisory"
]
2023-10-10 16:00:28 +00:00
} ,
{
"url" : "https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
2023-10-10 16:00:28 +00:00
} ,
2023-10-11 23:55:28 +00:00
{
"url" : "https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
2023-10-11 23:55:28 +00:00
} ,
2023-10-11 02:00:28 +00:00
{
"url" : "https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Press/Media Coverage"
2023-10-13 20:00:27 +00:00
]
2023-10-11 02:00:28 +00:00
} ,
2023-10-11 22:00:28 +00:00
{
"url" : "https://blog.vespa.ai/cve-2023-44487/" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
2023-10-11 22:00:28 +00:00
} ,
2023-10-10 20:00:29 +00:00
{
"url" : "https://bugzilla.proxmox.com/show_bug.cgi?id=4988" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Issue Tracking"
]
2023-10-10 20:00:29 +00:00
} ,
2023-10-11 22:00:28 +00:00
{
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2242803" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Issue Tracking" ,
"Vendor Advisory"
]
2023-10-11 22:00:28 +00:00
} ,
{
"url" : "https://bugzilla.suse.com/show_bug.cgi?id=1216123" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Issue Tracking" ,
"Vendor Advisory"
2023-10-13 20:00:27 +00:00
]
2023-10-11 22:00:28 +00:00
} ,
2023-10-10 20:00:29 +00:00
{
"url" : "https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Mailing List" ,
2023-10-13 20:00:27 +00:00
"Patch"
]
2023-10-10 20:00:29 +00:00
} ,
2023-10-10 16:00:28 +00:00
{
"url" : "https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Technical Description" ,
"Vendor Advisory"
]
2023-10-10 16:00:28 +00:00
} ,
{
"url" : "https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Technical Description" ,
"Vendor Advisory"
]
2023-10-10 16:00:28 +00:00
} ,
2023-10-11 22:00:28 +00:00
{
"url" : "https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
2023-10-11 22:00:28 +00:00
} ,
2023-10-10 20:00:29 +00:00
{
"url" : "https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Technical Description" ,
2023-10-29 09:06:41 +00:00
"Third Party Advisory"
2023-10-13 20:00:27 +00:00
]
2023-10-10 20:00:29 +00:00
} ,
2023-10-10 16:00:28 +00:00
{
"url" : "https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
2023-10-10 16:00:28 +00:00
} ,
2023-10-10 20:00:29 +00:00
{
"url" : "https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Third Party Advisory"
2023-10-13 20:00:27 +00:00
]
2023-10-10 20:00:29 +00:00
} ,
2023-10-12 20:00:28 +00:00
{
"url" : "https://github.com/Azure/AKS/issues/3947" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Issue Tracking" ,
"Vendor Advisory"
]
2023-10-12 20:00:28 +00:00
} ,
{
"url" : "https://github.com/Kong/kong/discussions/11741" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Issue Tracking" ,
"Vendor Advisory"
]
2023-10-12 20:00:28 +00:00
} ,
2023-10-11 22:00:28 +00:00
{
"url" : "https://github.com/advisories/GHSA-qppj-fm5r-hxr3" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
2023-10-11 22:00:28 +00:00
} ,
2023-10-10 20:00:29 +00:00
{
"url" : "https://github.com/advisories/GHSA-vx74-f528-fxqg" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Mitigation" ,
"Patch" ,
2023-10-13 20:00:27 +00:00
"Vendor Advisory"
]
2023-10-10 20:00:29 +00:00
} ,
2023-10-11 02:00:28 +00:00
{
"url" : "https://github.com/advisories/GHSA-xpw8-rcwv-8f8p" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Patch" ,
2023-10-13 20:00:27 +00:00
"Vendor Advisory"
]
2023-10-11 02:00:28 +00:00
} ,
2023-10-12 20:00:28 +00:00
{
"url" : "https://github.com/akka/akka-http/issues/4323" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Issue Tracking" ,
"Vendor Advisory"
]
2023-10-12 20:00:28 +00:00
} ,
2023-10-10 16:00:28 +00:00
{
"url" : "https://github.com/alibaba/tengine/issues/1872" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Issue Tracking" ,
2023-10-13 20:00:27 +00:00
"Vendor Advisory"
]
2023-10-10 16:00:28 +00:00
} ,
2023-10-12 20:00:28 +00:00
{
"url" : "https://github.com/apache/apisix/issues/10320" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Issue Tracking" ,
"Vendor Advisory"
]
2023-10-12 20:00:28 +00:00
} ,
2023-10-11 22:00:28 +00:00
{
"url" : "https://github.com/apache/httpd-site/pull/10" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Issue Tracking" ,
"Vendor Advisory"
]
2023-10-11 22:00:28 +00:00
} ,
2023-10-11 06:00:28 +00:00
{
"url" : "https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Product"
2023-10-13 20:00:27 +00:00
]
2023-10-11 06:00:28 +00:00
} ,
2023-10-10 16:00:28 +00:00
{
"url" : "https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Product"
2023-10-13 20:00:27 +00:00
]
2023-10-10 16:00:28 +00:00
} ,
2023-10-10 20:00:29 +00:00
{
"url" : "https://github.com/apache/trafficserver/pull/10564" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Patch" ,
2023-10-13 20:00:27 +00:00
"Vendor Advisory"
]
2023-10-10 20:00:29 +00:00
} ,
2023-10-12 20:00:28 +00:00
{
"url" : "https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
2023-10-12 20:00:28 +00:00
} ,
2023-10-10 16:00:28 +00:00
{
"url" : "https://github.com/bcdannyboy/CVE-2023-44487" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Third Party Advisory"
2023-10-13 20:00:27 +00:00
]
2023-10-10 16:00:28 +00:00
} ,
{
"url" : "https://github.com/caddyserver/caddy/issues/5877" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Issue Tracking" ,
2023-10-13 20:00:27 +00:00
"Vendor Advisory"
]
2023-10-10 16:00:28 +00:00
} ,
2023-10-13 02:00:28 +00:00
{
"url" : "https://github.com/caddyserver/caddy/releases/tag/v2.7.5" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Release Notes"
2023-10-13 20:00:27 +00:00
]
2023-10-13 02:00:28 +00:00
} ,
2023-10-10 20:00:29 +00:00
{
"url" : "https://github.com/dotnet/announcements/issues/277" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Mitigation" ,
2023-10-13 20:00:27 +00:00
"Vendor Advisory"
]
2023-10-10 20:00:29 +00:00
} ,
2023-10-10 23:55:28 +00:00
{
"url" : "https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Product" ,
"Release Notes" ,
2023-10-13 20:00:27 +00:00
"Vendor Advisory"
]
2023-10-10 23:55:28 +00:00
} ,
2023-10-10 16:00:28 +00:00
{
"url" : "https://github.com/eclipse/jetty.project/issues/10679" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Issue Tracking" ,
2023-10-13 20:00:27 +00:00
"Vendor Advisory"
]
2023-10-10 16:00:28 +00:00
} ,
{
"url" : "https://github.com/envoyproxy/envoy/pull/30055" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Patch" ,
2023-10-13 20:00:27 +00:00
"Vendor Advisory"
]
2023-10-10 16:00:28 +00:00
} ,
2023-10-11 22:00:28 +00:00
{
"url" : "https://github.com/etcd-io/etcd/issues/16740" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Issue Tracking" ,
2023-10-29 09:06:41 +00:00
"Patch" ,
2023-10-13 20:00:27 +00:00
"Vendor Advisory"
]
2023-10-11 22:00:28 +00:00
} ,
2023-10-10 20:00:29 +00:00
{
"url" : "https://github.com/facebook/proxygen/pull/466" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Patch" ,
2023-10-13 20:00:27 +00:00
"Vendor Advisory"
]
2023-10-10 20:00:29 +00:00
} ,
{
"url" : "https://github.com/golang/go/issues/63417" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Issue Tracking" ,
2023-10-13 20:00:27 +00:00
"Vendor Advisory"
]
2023-10-10 20:00:29 +00:00
} ,
2023-10-10 18:00:28 +00:00
{
"url" : "https://github.com/grpc/grpc-go/pull/6703" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Patch" ,
2023-10-13 20:00:27 +00:00
"Vendor Advisory"
]
2023-10-10 18:00:28 +00:00
} ,
2023-10-10 20:00:29 +00:00
{
"url" : "https://github.com/h2o/h2o/pull/3291" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Patch"
2023-10-13 20:00:27 +00:00
]
2023-10-10 20:00:29 +00:00
} ,
{
"url" : "https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
2023-10-10 20:00:29 +00:00
} ,
2023-10-10 16:00:28 +00:00
{
"url" : "https://github.com/haproxy/haproxy/issues/2312" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Issue Tracking" ,
2023-10-13 20:00:27 +00:00
"Vendor Advisory"
]
2023-10-10 16:00:28 +00:00
} ,
2023-10-10 18:00:28 +00:00
{
"url" : "https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Product" ,
2023-10-13 20:00:27 +00:00
"Vendor Advisory"
]
2023-10-10 18:00:28 +00:00
} ,
2023-10-11 22:00:28 +00:00
{
"url" : "https://github.com/junkurihara/rust-rpxy/issues/97" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Issue Tracking" ,
"Vendor Advisory"
]
2023-10-11 22:00:28 +00:00
} ,
2023-10-11 06:00:28 +00:00
{
"url" : "https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
2023-10-11 06:00:28 +00:00
} ,
{
"url" : "https://github.com/kazu-yamamoto/http2/issues/93" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Issue Tracking"
2023-10-13 20:00:27 +00:00
]
2023-10-11 06:00:28 +00:00
} ,
2023-10-11 02:00:28 +00:00
{
"url" : "https://github.com/kubernetes/kubernetes/pull/121120" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Patch" ,
2023-10-13 20:00:27 +00:00
"Vendor Advisory"
]
2023-10-11 02:00:28 +00:00
} ,
2023-10-11 22:00:28 +00:00
{
"url" : "https://github.com/line/armeria/pull/5232" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Issue Tracking" ,
2023-10-29 09:06:41 +00:00
"Patch" ,
2023-10-13 20:00:27 +00:00
"Vendor Advisory"
]
2023-10-11 22:00:28 +00:00
} ,
{
"url" : "https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
2023-10-11 22:00:28 +00:00
} ,
2023-10-10 20:00:29 +00:00
{
"url" : "https://github.com/micrictor/http2-rst-stream" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Exploit" ,
"Third Party Advisory"
2023-10-13 20:00:27 +00:00
]
2023-10-10 20:00:29 +00:00
} ,
{
"url" : "https://github.com/microsoft/CBL-Mariner/pull/6381" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Patch" ,
2023-10-13 20:00:27 +00:00
"Vendor Advisory"
]
2023-10-10 20:00:29 +00:00
} ,
2023-10-10 16:00:28 +00:00
{
"url" : "https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Patch" ,
2023-10-13 20:00:27 +00:00
"Vendor Advisory"
]
2023-10-10 16:00:28 +00:00
} ,
{
"url" : "https://github.com/nghttp2/nghttp2/pull/1961" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Patch" ,
2023-10-13 20:00:27 +00:00
"Vendor Advisory"
]
2023-10-10 16:00:28 +00:00
} ,
2023-10-10 18:00:28 +00:00
{
"url" : "https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Release Notes"
2023-10-13 20:00:27 +00:00
]
2023-10-10 18:00:28 +00:00
} ,
2023-10-11 22:00:28 +00:00
{
"url" : "https://github.com/ninenines/cowboy/issues/1615" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Issue Tracking" ,
"Vendor Advisory"
]
2023-10-11 22:00:28 +00:00
} ,
2023-10-10 20:00:29 +00:00
{
"url" : "https://github.com/nodejs/node/pull/50121" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
2023-10-10 20:00:29 +00:00
} ,
2023-10-12 20:00:28 +00:00
{
"url" : "https://github.com/openresty/openresty/issues/930" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Issue Tracking" ,
"Vendor Advisory"
]
2023-10-12 20:00:28 +00:00
} ,
2023-10-11 02:00:28 +00:00
{
"url" : "https://github.com/opensearch-project/data-prepper/issues/3474" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Issue Tracking" ,
"Patch" ,
2023-10-13 20:00:27 +00:00
"Vendor Advisory"
]
2023-10-11 02:00:28 +00:00
} ,
{
"url" : "https://github.com/oqtane/oqtane.framework/discussions/3367" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Issue Tracking" ,
2023-10-13 20:00:27 +00:00
"Vendor Advisory"
]
2023-10-11 02:00:28 +00:00
} ,
2023-10-11 22:00:28 +00:00
{
"url" : "https://github.com/projectcontour/contour/pull/5826" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Issue Tracking" ,
2023-10-29 09:06:41 +00:00
"Patch" ,
2023-10-13 20:00:27 +00:00
"Vendor Advisory"
]
2023-10-11 22:00:28 +00:00
} ,
{
"url" : "https://github.com/tempesta-tech/tempesta/issues/1986" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Issue Tracking" ,
"Vendor Advisory"
]
2023-10-11 22:00:28 +00:00
} ,
{
"url" : "https://github.com/varnishcache/varnish-cache/issues/3996" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Issue Tracking" ,
"Vendor Advisory"
]
2023-10-11 22:00:28 +00:00
} ,
2023-10-10 20:00:29 +00:00
{
"url" : "https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
2023-10-10 20:00:29 +00:00
} ,
2023-10-11 22:00:28 +00:00
{
"url" : "https://istio.io/latest/news/security/istio-security-2023-004/" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
2023-10-11 22:00:28 +00:00
} ,
2023-10-15 20:00:27 +00:00
{
"url" : "https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/" ,
2023-10-29 09:06:41 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
2023-10-15 20:00:27 +00:00
} ,
2023-10-10 22:00:28 +00:00
{
"url" : "https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Mailing List" ,
2023-10-13 20:00:27 +00:00
"Vendor Advisory"
]
2023-10-10 22:00:28 +00:00
} ,
2023-10-13 18:00:28 +00:00
{
"url" : "https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Mailing List"
2023-10-13 20:00:27 +00:00
]
2023-10-13 18:00:28 +00:00
} ,
2023-10-16 20:00:28 +00:00
{
"url" : "https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html" ,
2023-10-29 09:06:41 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
2023-10-16 20:00:28 +00:00
} ,
2023-10-17 02:00:29 +00:00
{
"url" : "https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html" ,
2023-10-29 09:06:41 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/" ,
2023-10-17 02:00:29 +00:00
"source" : "cve@mitre.org"
} ,
2023-10-29 09:06:41 +00:00
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List"
]
} ,
2023-10-15 06:00:27 +00:00
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/" ,
2023-10-29 09:06:41 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/" ,
2023-10-15 06:00:27 +00:00
"source" : "cve@mitre.org"
} ,
2023-10-14 02:00:28 +00:00
{
2023-10-29 09:06:41 +00:00
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/" ,
2023-10-14 02:00:28 +00:00
"source" : "cve@mitre.org"
} ,
2023-10-10 18:00:28 +00:00
{
2023-10-29 09:06:41 +00:00
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List"
]
} ,
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List"
]
2023-10-10 18:00:28 +00:00
} ,
2023-10-29 09:06:41 +00:00
{
"url" : "https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Patch"
]
} ,
2023-10-11 06:00:28 +00:00
{
"url" : "https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Third Party Advisory"
2023-10-13 20:00:27 +00:00
]
2023-10-11 06:00:28 +00:00
} ,
2023-10-10 20:00:29 +00:00
{
"url" : "https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Patch" ,
2023-10-13 20:00:27 +00:00
"Vendor Advisory"
]
2023-10-10 20:00:29 +00:00
} ,
{
"url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Mitigation" ,
2023-10-13 20:00:27 +00:00
"Patch" ,
"Vendor Advisory"
]
2023-10-10 20:00:29 +00:00
} ,
2023-10-10 18:00:28 +00:00
{
"url" : "https://my.f5.com/manage/s/article/K000137106" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
2023-10-10 18:00:28 +00:00
} ,
2023-10-11 02:00:28 +00:00
{
"url" : "https://netty.io/news/2023/10/10/4-1-100-Final.html" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Release Notes" ,
2023-10-13 20:00:27 +00:00
"Vendor Advisory"
]
2023-10-11 02:00:28 +00:00
} ,
2023-10-10 16:00:28 +00:00
{
"url" : "https://news.ycombinator.com/item?id=37830987" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Issue Tracking" ,
2023-10-13 20:00:27 +00:00
"Third Party Advisory"
]
2023-10-10 16:00:28 +00:00
} ,
{
"url" : "https://news.ycombinator.com/item?id=37830998" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Issue Tracking" ,
2023-10-13 20:00:27 +00:00
"Press/Media Coverage"
]
2023-10-10 16:00:28 +00:00
} ,
{
"url" : "https://news.ycombinator.com/item?id=37831062" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Issue Tracking" ,
2023-10-13 20:00:27 +00:00
"Third Party Advisory"
]
2023-10-10 16:00:28 +00:00
} ,
2023-10-11 02:00:28 +00:00
{
"url" : "https://news.ycombinator.com/item?id=37837043" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Issue Tracking"
2023-10-13 20:00:27 +00:00
]
2023-10-11 02:00:28 +00:00
} ,
2023-10-10 20:00:29 +00:00
{
"url" : "https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
2023-10-10 20:00:29 +00:00
} ,
2023-10-10 22:00:28 +00:00
{
"url" : "https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
2023-10-10 22:00:28 +00:00
} ,
2023-10-16 20:00:28 +00:00
{
"url" : "https://security.netapp.com/advisory/ntap-20231016-0001/" ,
2023-10-29 09:06:41 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
2023-10-16 20:00:28 +00:00
} ,
2023-10-12 20:00:28 +00:00
{
"url" : "https://security.paloaltonetworks.com/CVE-2023-44487" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
2023-10-12 20:00:28 +00:00
} ,
2023-10-10 22:00:28 +00:00
{
"url" : "https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Release Notes" ,
2023-10-13 20:00:27 +00:00
"Vendor Advisory"
]
2023-10-10 22:00:28 +00:00
} ,
2023-10-11 22:00:28 +00:00
{
"url" : "https://ubuntu.com/security/CVE-2023-44487" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
2023-10-11 22:00:28 +00:00
} ,
2023-10-10 16:00:28 +00:00
{
"url" : "https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
2023-10-10 16:00:28 +00:00
} ,
2023-10-11 02:00:28 +00:00
{
"url" : "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory" ,
"US Government Resource"
]
2023-10-11 02:00:28 +00:00
} ,
2023-10-11 22:00:28 +00:00
{
"url" : "https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Press/Media Coverage"
]
2023-10-11 22:00:28 +00:00
} ,
2023-10-11 08:00:29 +00:00
{
"url" : "https://www.debian.org/security/2023/dsa-5521" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
2023-10-11 08:00:29 +00:00
} ,
{
"url" : "https://www.debian.org/security/2023/dsa-5522" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
2023-10-11 08:00:29 +00:00
} ,
2023-10-11 02:00:28 +00:00
{
"url" : "https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
2023-10-11 02:00:28 +00:00
} ,
2023-10-12 20:00:28 +00:00
{
"url" : "https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
2023-10-12 20:00:28 +00:00
} ,
2023-10-10 16:00:28 +00:00
{
"url" : "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
2023-10-29 09:06:41 +00:00
"Mitigation" ,
2023-10-13 20:00:27 +00:00
"Vendor Advisory"
]
2023-10-10 16:00:28 +00:00
} ,
2023-10-10 22:00:28 +00:00
{
"url" : "https://www.openwall.com/lists/oss-security/2023/10/10/6" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
2023-10-10 22:00:28 +00:00
} ,
2023-10-10 16:00:28 +00:00
{
"url" : "https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Press/Media Coverage"
]
2023-10-11 02:00:28 +00:00
} ,
{
"url" : "https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/" ,
2023-10-13 20:00:27 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Press/Media Coverage"
]
2023-10-10 16:00:28 +00:00
}
]
}