Vulnerabilites related to nghttp2 - nghttp2
Vulnerability from fkie_nvd
Published
2018-05-08 15:29
Modified
2024-11-21 03:39
Summary
nghttp2 version >= 1.10.0 and nghttp2 <= v1.31.0 contains an Improper Input Validation CWE-20 vulnerability in ALTSVC frame handling that can result in segmentation fault leading to denial of service. This attack appears to be exploitable via network client. This vulnerability appears to have been fixed in >= 1.31.1.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:nghttp2:nghttp2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D406D06D-CFAA-4CBA-AD46-81855AB98930",
                     versionEndIncluding: "1.31.0",
                     versionStartIncluding: "1.10.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
                     matchCriteriaId: "D107EC29-67E7-40C3-8E5A-324C9105C5E4",
                     versionEndIncluding: "6.8.1",
                     versionStartIncluding: "6.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*",
                     matchCriteriaId: "2D68FAF3-F5F9-4141-B10F-AB99D620F617",
                     versionEndIncluding: "8.17.0",
                     versionStartIncluding: "8.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "45DB38F2-B756-42E0-81D9-4F1AC0798F40",
                     versionEndIncluding: "9.11.2",
                     versionStartIncluding: "9.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
                     matchCriteriaId: "6F40337E-4705-46D3-9731-A3B3A9303A74",
                     versionEndExcluding: "10.4.1",
                     versionStartIncluding: "10.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "nghttp2 version >= 1.10.0 and nghttp2 <= v1.31.0 contains an Improper Input Validation CWE-20 vulnerability in ALTSVC frame handling that can result in segmentation fault leading to denial of service. This attack appears to be exploitable via network client. This vulnerability appears to have been fixed in >= 1.31.1.",
      },
      {
         lang: "es",
         value: "nghttp2 hasta la versión 1.10.0 y nghttp2 en versiones 1.31.0 y anteriores contienen una vulnerabilidad de validación incorrecta de entradas (CWE-20) en la gestión de tramas ALTSVC que puede resultar en un fallo de segmentación, lo que provoca una denegación de servicio (DoS). Este ataque parece ser explotable mediante un cliente de red. La vulnerabilidad parece haber sido solucionada en la versión 1.31.1 y posteriores.",
      },
   ],
   id: "CVE-2018-1000168",
   lastModified: "2024-11-21T03:39:50.327",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-05-08T15:29:00.207",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/103952",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:0366",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:0367",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://nghttp2.org/blog/2018/04/12/nghttp2-v1-31-1/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Release Notes",
            "Third Party Advisory",
         ],
         url: "https://nodejs.org/en/blog/vulnerability/june-2018-security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/103952",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:0366",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:0367",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://nghttp2.org/blog/2018/04/12/nghttp2-v1-31-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
            "Third Party Advisory",
         ],
         url: "https://nodejs.org/en/blog/vulnerability/june-2018-security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
            {
               lang: "en",
               value: "CWE-476",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-02-06 15:15
Modified
2024-11-21 02:46
Summary
nghttp2 before 1.7.1 allows remote attackers to cause a denial of service (memory exhaustion).
References
Impacted products
Vendor Product Version
nghttp2 nghttp2 *
fedoraproject fedora 22
fedoraproject fedora 23



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:nghttp2:nghttp2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3CC6C00-4DBA-4232-9868-93D1DBABA9D4",
                     versionEndExcluding: "1.7.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                     matchCriteriaId: "253C303A-E577-4488-93E6-68A8DD942C38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*",
                     matchCriteriaId: "E79AB8DD-C907-4038-A931-1A5A4CFB6A5B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "nghttp2 before 1.7.1 allows remote attackers to cause a denial of service (memory exhaustion).",
      },
      {
         lang: "es",
         value: "nghttp2 versiones anteriores a 1.7.1, permite a atacantes remotos causar una denegación de servicio (agotamiento de la memoria).",
      },
   ],
   id: "CVE-2016-1544",
   lastModified: "2024-11-21T02:46:36.873",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 2.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "LOW",
               baseScore: 3.3,
               baseSeverity: "LOW",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-02-06T15:15:11.170",
   references: [
      {
         source: "cret@cert.org",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177308.html",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177666.html",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Issue Tracking",
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=1308461",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Release Notes",
            "Third Party Advisory",
         ],
         url: "https://github.com/nghttp2/nghttp2/compare/v1.7.0...v1.7.1",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Release Notes",
            "Third Party Advisory",
         ],
         url: "https://github.com/nghttp2/nghttp2/releases/tag/v1.7.1",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.gentoo.org/glsa/201612-13",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177308.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177666.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=1308461",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
            "Third Party Advisory",
         ],
         url: "https://github.com/nghttp2/nghttp2/compare/v1.7.0...v1.7.1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
            "Third Party Advisory",
         ],
         url: "https://github.com/nghttp2/nghttp2/releases/tag/v1.7.1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.gentoo.org/glsa/201612-13",
      },
   ],
   sourceIdentifier: "cret@cert.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-400",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-03 23:15
Modified
2024-11-21 04:56
Summary
In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.
References
security-advisories@github.comhttp://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.htmlMailing List, Third Party Advisory
security-advisories@github.comhttps://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090Patch, Third Party Advisory
security-advisories@github.comhttps://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394Patch, Third Party Advisory
security-advisories@github.comhttps://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xrPatch, Third Party Advisory
security-advisories@github.comhttps://lists.debian.org/debian-lts-announce/2021/10/msg00011.htmlMailing List, Third Party Advisory
security-advisories@github.comhttps://lists.debian.org/debian-lts-announce/2023/10/msg00023.html
security-advisories@github.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
security-advisories@github.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
security-advisories@github.comhttps://www.debian.org/security/2020/dsa-4696Third Party Advisory
security-advisories@github.comhttps://www.oracle.com//security-alerts/cpujul2021.htmlNot Applicable, Third Party Advisory
security-advisories@github.comhttps://www.oracle.com/security-alerts/cpuapr2022.htmlPatch, Third Party Advisory
security-advisories@github.comhttps://www.oracle.com/security-alerts/cpujan2021.htmlThird Party Advisory
security-advisories@github.comhttps://www.oracle.com/security-alerts/cpujul2020.htmlThird Party Advisory
security-advisories@github.comhttps://www.oracle.com/security-alerts/cpuoct2020.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xrPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2021/10/msg00011.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2020/dsa-4696Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com//security-alerts/cpujul2021.htmlNot Applicable, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpuapr2022.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpujan2021.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpujul2020.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpuoct2020.htmlThird Party Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:nghttp2:nghttp2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B8F12EE-F729-4A29-A21C-254E2E13B649",
                     versionEndExcluding: "1.41.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B620311B-34A3-48A6-82DF-6F078D7A4493",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F0FA5D-8D3B-4C0E-81E2-87998286AF33",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
                     matchCriteriaId: "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:oracle:banking_extensibility_workbench:14.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "EABAFD73-150F-4DFE-B721-29EB4475D979",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:banking_extensibility_workbench:14.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE57039D-E2EE-4014-A7B1-D7380D26098E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0DBC938-A782-433F-8BF1-CA250C332AA7",
                     versionEndExcluding: "21.1.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E11C65C3-1B17-4362-A99C-59583081A24D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:enterprise_communications_broker:3.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "348EEE70-E114-4720-AAAF-E77DE5C9A2D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:graalvm:19.3.2:*:*:*:enterprise:*:*:*",
                     matchCriteriaId: "909B4029-1D4F-4D60-AC6D-98C7E9FF1B15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:graalvm:20.1.0:*:*:*:enterprise:*:*:*",
                     matchCriteriaId: "B501426C-7FB5-4C0D-83E4-0279746EFBE8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D2F1144-F032-4687-8F76-1A4E45BCD8F3",
                     versionEndIncluding: "7.3.30",
                     versionStartIncluding: "7.3.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD5F19DF-F8E7-48B4-BBFA-22A0118584CB",
                     versionEndIncluding: "7.4.29",
                     versionStartIncluding: "7.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD7FA925-B9AC-4819-AAC1-C3478D80E3E7",
                     versionEndIncluding: "7.5.19",
                     versionStartIncluding: "7.5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF828AB6-ED4E-4AA9-9E8D-58E715DBDB1D",
                     versionEndIncluding: "7.6.15",
                     versionStartIncluding: "7.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A885799-F19A-41B5-B015-B318ED959755",
                     versionEndIncluding: "8.0.21",
                     versionStartIncluding: "8.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
                     matchCriteriaId: "25A3180B-21AF-4010-9DAB-41ADFD2D8031",
                     versionEndIncluding: "10.12.0",
                     versionStartIncluding: "10.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*",
                     matchCriteriaId: "E9E9BD86-6374-45B3-8727-AACED7C8F3B9",
                     versionEndExcluding: "10.21.0",
                     versionStartIncluding: "10.13.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
                     matchCriteriaId: "564ED5C8-50D7-413A-B88E-E62B6C07336A",
                     versionEndIncluding: "12.12.0",
                     versionStartIncluding: "12.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*",
                     matchCriteriaId: "319C5BC0-7893-4FEC-8051-C8067F5007D0",
                     versionEndExcluding: "12.18.0",
                     versionStartIncluding: "12.13.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
                     matchCriteriaId: "7AB132F1-11B6-4B70-8819-4ADD7B6C814E",
                     versionEndIncluding: "14.4.0",
                     versionStartIncluding: "14.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.",
      },
      {
         lang: "es",
         value: "En nghttp2 versiones anteriores a 1.41.0, la carga útil de la trama HTTP/2 SETTINGS demasiado grande causa una denegación de servicio. El ataque de prueba de concepto involucra a un cliente malicioso que construye una trama SETTINGS con una longitud de 14,400 bytes (2400 entradas de configuraciones individuales) una y otra vez. El ataque causa que la CPU se aumente al 100%. nghttp2 versión v1.41.0 corrige esta vulnerabilidad. Existe una solución alternativa a esta vulnerabilidad. Implemente la función nghttp2_on_frame_recv_callback callback, y si la trama es recibida es la trama SETTINGS y el número de entradas de configuración es grande (por ejemplo, mayor a 32), luego desconecte la conexión",
      },
   ],
   id: "CVE-2020-11080",
   lastModified: "2024-11-21T04:56:44.657",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 3.7,
               baseSeverity: "LOW",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
               version: "3.1",
            },
            exploitabilityScore: 2.2,
            impactScore: 1.4,
            source: "security-advisories@github.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-03T23:15:11.073",
   references: [
      {
         source: "security-advisories@github.com",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html",
      },
      {
         source: "security-advisories@github.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090",
      },
      {
         source: "security-advisories@github.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394",
      },
      {
         source: "security-advisories@github.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr",
      },
      {
         source: "security-advisories@github.com",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html",
      },
      {
         source: "security-advisories@github.com",
         url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html",
      },
      {
         source: "security-advisories@github.com",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/",
      },
      {
         source: "security-advisories@github.com",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/",
      },
      {
         source: "security-advisories@github.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2020/dsa-4696",
      },
      {
         source: "security-advisories@github.com",
         tags: [
            "Not Applicable",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com//security-alerts/cpujul2021.html",
      },
      {
         source: "security-advisories@github.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuapr2022.html",
      },
      {
         source: "security-advisories@github.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpujan2021.html",
      },
      {
         source: "security-advisories@github.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpujul2020.html",
      },
      {
         source: "security-advisories@github.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2020/dsa-4696",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Not Applicable",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com//security-alerts/cpujul2021.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuapr2022.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpujan2021.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpujul2020.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
      },
   ],
   sourceIdentifier: "security-advisories@github.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-707",
            },
         ],
         source: "security-advisories@github.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-400",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-10-10 14:15
Modified
2025-03-07 19:15
Summary
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
References
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2023/10/10/6
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2023/10/10/7
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2023/10/13/4Mailing List, Third Party Advisory
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2023/10/13/9Mailing List, Third Party Advisory
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2023/10/18/4Mailing List, Third Party Advisory
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2023/10/18/8Mailing List, Third Party Advisory
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2023/10/19/6Mailing List, Third Party Advisory
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2023/10/20/8Mailing List
cve@mitre.orghttps://access.redhat.com/security/cve/cve-2023-44487Vendor Advisory
cve@mitre.orghttps://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/Press/Media Coverage, Third Party Advisory
cve@mitre.orghttps://aws.amazon.com/security/security-bulletins/AWS-2023-011/Third Party Advisory
cve@mitre.orghttps://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/Technical Description, Vendor Advisory
cve@mitre.orghttps://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/Third Party Advisory, Vendor Advisory
cve@mitre.orghttps://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/Vendor Advisory
cve@mitre.orghttps://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attackPress/Media Coverage, Third Party Advisory
cve@mitre.orghttps://blog.vespa.ai/cve-2023-44487/Vendor Advisory
cve@mitre.orghttps://bugzilla.proxmox.com/show_bug.cgi?id=4988Issue Tracking, Third Party Advisory
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=2242803Issue Tracking, Vendor Advisory
cve@mitre.orghttps://bugzilla.suse.com/show_bug.cgi?id=1216123Issue Tracking, Vendor Advisory
cve@mitre.orghttps://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9Mailing List, Patch, Vendor Advisory
cve@mitre.orghttps://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/Technical Description, Vendor Advisory
cve@mitre.orghttps://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attackTechnical Description, Vendor Advisory
cve@mitre.orghttps://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125Vendor Advisory
cve@mitre.orghttps://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715Third Party Advisory
cve@mitre.orghttps://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cveTechnical Description, Third Party Advisory
cve@mitre.orghttps://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764Vendor Advisory
cve@mitre.orghttps://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088Issue Tracking, Patch
cve@mitre.orghttps://github.com/Azure/AKS/issues/3947Issue Tracking
cve@mitre.orghttps://github.com/Kong/kong/discussions/11741Issue Tracking
cve@mitre.orghttps://github.com/advisories/GHSA-qppj-fm5r-hxr3Vendor Advisory
cve@mitre.orghttps://github.com/advisories/GHSA-vx74-f528-fxqgMitigation, Patch, Vendor Advisory
cve@mitre.orghttps://github.com/advisories/GHSA-xpw8-rcwv-8f8pPatch, Vendor Advisory
cve@mitre.orghttps://github.com/akka/akka-http/issues/4323Issue Tracking
cve@mitre.orghttps://github.com/alibaba/tengine/issues/1872Issue Tracking
cve@mitre.orghttps://github.com/apache/apisix/issues/10320Issue Tracking
cve@mitre.orghttps://github.com/apache/httpd-site/pull/10Issue Tracking
cve@mitre.orghttps://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113Product
cve@mitre.orghttps://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2Product, Third Party Advisory
cve@mitre.orghttps://github.com/apache/trafficserver/pull/10564Issue Tracking, Patch
cve@mitre.orghttps://github.com/arkrwn/PoC/tree/main/CVE-2023-44487Vendor Advisory
cve@mitre.orghttps://github.com/bcdannyboy/CVE-2023-44487Third Party Advisory
cve@mitre.orghttps://github.com/caddyserver/caddy/issues/5877Issue Tracking, Vendor Advisory
cve@mitre.orghttps://github.com/caddyserver/caddy/releases/tag/v2.7.5Release Notes, Third Party Advisory
cve@mitre.orghttps://github.com/dotnet/announcements/issues/277Issue Tracking, Mitigation, Vendor Advisory
cve@mitre.orghttps://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73Product, Release Notes
cve@mitre.orghttps://github.com/eclipse/jetty.project/issues/10679Issue Tracking
cve@mitre.orghttps://github.com/envoyproxy/envoy/pull/30055Issue Tracking, Patch
cve@mitre.orghttps://github.com/etcd-io/etcd/issues/16740Issue Tracking, Patch
cve@mitre.orghttps://github.com/facebook/proxygen/pull/466Issue Tracking, Patch
cve@mitre.orghttps://github.com/golang/go/issues/63417Issue Tracking
cve@mitre.orghttps://github.com/grpc/grpc-go/pull/6703Issue Tracking, Patch
cve@mitre.orghttps://github.com/grpc/grpc/releases/tag/v1.59.2
cve@mitre.orghttps://github.com/h2o/h2o/pull/3291Issue Tracking, Patch
cve@mitre.orghttps://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqfVendor Advisory
cve@mitre.orghttps://github.com/haproxy/haproxy/issues/2312Issue Tracking
cve@mitre.orghttps://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244Product
cve@mitre.orghttps://github.com/junkurihara/rust-rpxy/issues/97Issue Tracking
cve@mitre.orghttps://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1Patch
cve@mitre.orghttps://github.com/kazu-yamamoto/http2/issues/93Issue Tracking
cve@mitre.orghttps://github.com/kubernetes/kubernetes/pull/121120Issue Tracking, Patch
cve@mitre.orghttps://github.com/line/armeria/pull/5232Issue Tracking, Patch
cve@mitre.orghttps://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632Patch
cve@mitre.orghttps://github.com/micrictor/http2-rst-streamExploit, Third Party Advisory
cve@mitre.orghttps://github.com/microsoft/CBL-Mariner/pull/6381Issue Tracking, Patch
cve@mitre.orghttps://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61Patch
cve@mitre.orghttps://github.com/nghttp2/nghttp2/pull/1961Issue Tracking, Patch
cve@mitre.orghttps://github.com/nghttp2/nghttp2/releases/tag/v1.57.0Release Notes
cve@mitre.orghttps://github.com/ninenines/cowboy/issues/1615Issue Tracking
cve@mitre.orghttps://github.com/nodejs/node/pull/50121Issue Tracking
cve@mitre.orghttps://github.com/openresty/openresty/issues/930Issue Tracking
cve@mitre.orghttps://github.com/opensearch-project/data-prepper/issues/3474Issue Tracking, Patch
cve@mitre.orghttps://github.com/oqtane/oqtane.framework/discussions/3367Issue Tracking
cve@mitre.orghttps://github.com/projectcontour/contour/pull/5826Issue Tracking, Patch
cve@mitre.orghttps://github.com/tempesta-tech/tempesta/issues/1986Issue Tracking
cve@mitre.orghttps://github.com/varnishcache/varnish-cache/issues/3996Issue Tracking
cve@mitre.orghttps://groups.google.com/g/golang-announce/c/iNNxDTCjZvoMailing List, Release Notes, Vendor Advisory
cve@mitre.orghttps://istio.io/latest/news/security/istio-security-2023-004/Vendor Advisory
cve@mitre.orghttps://linkerd.io/2023/10/12/linkerd-cve-2023-44487/Vendor Advisory
cve@mitre.orghttps://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87qMailing List
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2023/10/msg00020.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2023/10/msg00023.htmlMailing List
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2023/10/msg00024.htmlMailing List
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2023/10/msg00045.htmlMailing List
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2023/10/msg00047.htmlMailing List
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2023/11/msg00001.htmlMailing List
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2023/11/msg00012.htmlMailing List
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/
cve@mitre.orghttps://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.htmlMailing List, Patch, Third Party Advisory
cve@mitre.orghttps://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.htmlThird Party Advisory
cve@mitre.orghttps://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/Patch, Vendor Advisory
cve@mitre.orghttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487Mitigation, Patch, Vendor Advisory
cve@mitre.orghttps://my.f5.com/manage/s/article/K000137106Vendor Advisory
cve@mitre.orghttps://netty.io/news/2023/10/10/4-1-100-Final.htmlRelease Notes, Vendor Advisory
cve@mitre.orghttps://news.ycombinator.com/item?id=37830987Issue Tracking
cve@mitre.orghttps://news.ycombinator.com/item?id=37830998Issue Tracking, Press/Media Coverage
cve@mitre.orghttps://news.ycombinator.com/item?id=37831062Issue Tracking
cve@mitre.orghttps://news.ycombinator.com/item?id=37837043Issue Tracking
cve@mitre.orghttps://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/Third Party Advisory
cve@mitre.orghttps://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffectedThird Party Advisory
cve@mitre.orghttps://security.gentoo.org/glsa/202311-09Third Party Advisory
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20231016-0001/Third Party Advisory
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20240426-0007/Third Party Advisory
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20240621-0006/Exploit, Third Party Advisory
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20240621-0007/Third Party Advisory
cve@mitre.orghttps://security.paloaltonetworks.com/CVE-2023-44487Vendor Advisory
cve@mitre.orghttps://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14Release Notes
cve@mitre.orghttps://ubuntu.com/security/CVE-2023-44487Vendor Advisory
cve@mitre.orghttps://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/Third Party Advisory
cve@mitre.orghttps://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487Third Party Advisory, US Government Resource
cve@mitre.orghttps://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-eventPress/Media Coverage, Third Party Advisory
cve@mitre.orghttps://www.debian.org/security/2023/dsa-5521Mailing List, Vendor Advisory
cve@mitre.orghttps://www.debian.org/security/2023/dsa-5522Mailing List, Vendor Advisory
cve@mitre.orghttps://www.debian.org/security/2023/dsa-5540Mailing List, Third Party Advisory
cve@mitre.orghttps://www.debian.org/security/2023/dsa-5549Mailing List, Third Party Advisory
cve@mitre.orghttps://www.debian.org/security/2023/dsa-5558Mailing List, Third Party Advisory
cve@mitre.orghttps://www.debian.org/security/2023/dsa-5570Third Party Advisory
cve@mitre.orghttps://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487Third Party Advisory, Vendor Advisory
cve@mitre.orghttps://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/Vendor Advisory
cve@mitre.orghttps://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/Mitigation, Vendor Advisory
cve@mitre.orghttps://www.openwall.com/lists/oss-security/2023/10/10/6Mailing List, Third Party Advisory
cve@mitre.orghttps://www.phoronix.com/news/HTTP2-Rapid-Reset-AttackPress/Media Coverage
cve@mitre.orghttps://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/Press/Media Coverage, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/10/13/4Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/10/13/9Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/10/18/4Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/10/18/8Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/10/19/6Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/10/20/8Mailing List
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/security/cve/cve-2023-44487Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/Press/Media Coverage, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://aws.amazon.com/security/security-bulletins/AWS-2023-011/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/Technical Description, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/Third Party Advisory, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attackPress/Media Coverage, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://blog.vespa.ai/cve-2023-44487/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.proxmox.com/show_bug.cgi?id=4988Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=2242803Issue Tracking, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.suse.com/show_bug.cgi?id=1216123Issue Tracking, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9Mailing List, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/Technical Description, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attackTechnical Description, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cveTechnical Description, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088Issue Tracking, Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/Azure/AKS/issues/3947Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/Kong/kong/discussions/11741Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/advisories/GHSA-qppj-fm5r-hxr3Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/advisories/GHSA-vx74-f528-fxqgMitigation, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/advisories/GHSA-xpw8-rcwv-8f8pPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/akka/akka-http/issues/4323Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/alibaba/tengine/issues/1872Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/apache/apisix/issues/10320Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/apache/httpd-site/pull/10Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113Product
af854a3a-2127-422b-91ae-364da2661108https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2Product, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/apache/trafficserver/pull/10564Issue Tracking, Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/bcdannyboy/CVE-2023-44487Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/caddyserver/caddy/issues/5877Issue Tracking, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/caddyserver/caddy/releases/tag/v2.7.5Release Notes, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/dotnet/announcements/issues/277Issue Tracking, Mitigation, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73Product, Release Notes
af854a3a-2127-422b-91ae-364da2661108https://github.com/eclipse/jetty.project/issues/10679Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/envoyproxy/envoy/pull/30055Issue Tracking, Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/etcd-io/etcd/issues/16740Issue Tracking, Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/facebook/proxygen/pull/466Issue Tracking, Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/golang/go/issues/63417Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/grpc/grpc-go/pull/6703Issue Tracking, Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/h2o/h2o/pull/3291Issue Tracking, Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqfVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/haproxy/haproxy/issues/2312Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244Product
af854a3a-2127-422b-91ae-364da2661108https://github.com/junkurihara/rust-rpxy/issues/97Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/kazu-yamamoto/http2/issues/93Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/kubernetes/kubernetes/pull/121120Issue Tracking, Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/line/armeria/pull/5232Issue Tracking, Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/micrictor/http2-rst-streamExploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/microsoft/CBL-Mariner/pull/6381Issue Tracking, Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/nghttp2/nghttp2/pull/1961Issue Tracking, Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0Release Notes
af854a3a-2127-422b-91ae-364da2661108https://github.com/ninenines/cowboy/issues/1615Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/nodejs/node/pull/50121Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/openresty/openresty/issues/930Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/opensearch-project/data-prepper/issues/3474Issue Tracking, Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/oqtane/oqtane.framework/discussions/3367Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/projectcontour/contour/pull/5826Issue Tracking, Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/tempesta-tech/tempesta/issues/1986Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/varnishcache/varnish-cache/issues/3996Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/g/golang-announce/c/iNNxDTCjZvoMailing List, Release Notes, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://istio.io/latest/news/security/istio-security-2023-004/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87qMailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/10/msg00020.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/10/msg00023.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/10/msg00024.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/10/msg00045.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/10/msg00047.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/11/msg00001.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/11/msg00012.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.htmlMailing List, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487Mitigation, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://my.f5.com/manage/s/article/K000137106Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://netty.io/news/2023/10/10/4-1-100-Final.htmlRelease Notes, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://news.ycombinator.com/item?id=37830987Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://news.ycombinator.com/item?id=37830998Issue Tracking, Press/Media Coverage
af854a3a-2127-422b-91ae-364da2661108https://news.ycombinator.com/item?id=37831062Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://news.ycombinator.com/item?id=37837043Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffectedThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202311-09Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20231016-0001/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20240426-0007/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20240621-0006/Exploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20240621-0007/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.paloaltonetworks.com/CVE-2023-44487Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14Release Notes
af854a3a-2127-422b-91ae-364da2661108https://ubuntu.com/security/CVE-2023-44487Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-eventPress/Media Coverage, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2023/dsa-5521Mailing List, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2023/dsa-5522Mailing List, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2023/dsa-5540Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2023/dsa-5549Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2023/dsa-5558Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2023/dsa-5570Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487Third Party Advisory, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/Mitigation, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.openwall.com/lists/oss-security/2023/10/10/6Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.phoronix.com/news/HTTP2-Rapid-Reset-AttackPress/Media Coverage
af854a3a-2127-422b-91ae-364da2661108https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/Press/Media Coverage, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.vicarius.io/vsociety/posts/rapid-reset-cve-2023-44487-dos-in-http2-understanding-the-root-causeThird Party Advisory
Impacted products
Vendor Product Version
ietf http 2.0
nghttp2 nghttp2 *
netty netty *
envoyproxy envoy 1.24.10
envoyproxy envoy 1.25.9
envoyproxy envoy 1.26.4
envoyproxy envoy 1.27.0
eclipse jetty *
eclipse jetty *
eclipse jetty *
eclipse jetty *
caddyserver caddy *
golang go *
golang go *
golang http2 *
golang networking *
f5 big-ip_access_policy_manager *
f5 big-ip_access_policy_manager *
f5 big-ip_access_policy_manager *
f5 big-ip_access_policy_manager *
f5 big-ip_access_policy_manager 17.1.0
f5 big-ip_advanced_firewall_manager *
f5 big-ip_advanced_firewall_manager *
f5 big-ip_advanced_firewall_manager *
f5 big-ip_advanced_firewall_manager *
f5 big-ip_advanced_firewall_manager 17.1.0
f5 big-ip_advanced_web_application_firewall *
f5 big-ip_advanced_web_application_firewall *
f5 big-ip_advanced_web_application_firewall *
f5 big-ip_advanced_web_application_firewall *
f5 big-ip_advanced_web_application_firewall 17.1.0
f5 big-ip_analytics *
f5 big-ip_analytics *
f5 big-ip_analytics *
f5 big-ip_analytics *
f5 big-ip_analytics 17.1.0
f5 big-ip_application_acceleration_manager *
f5 big-ip_application_acceleration_manager *
f5 big-ip_application_acceleration_manager *
f5 big-ip_application_acceleration_manager *
f5 big-ip_application_acceleration_manager 17.1.0
f5 big-ip_application_security_manager *
f5 big-ip_application_security_manager *
f5 big-ip_application_security_manager *
f5 big-ip_application_security_manager *
f5 big-ip_application_security_manager 17.1.0
f5 big-ip_application_visibility_and_reporting *
f5 big-ip_application_visibility_and_reporting *
f5 big-ip_application_visibility_and_reporting *
f5 big-ip_application_visibility_and_reporting *
f5 big-ip_application_visibility_and_reporting 17.1.0
f5 big-ip_carrier-grade_nat *
f5 big-ip_carrier-grade_nat *
f5 big-ip_carrier-grade_nat *
f5 big-ip_carrier-grade_nat *
f5 big-ip_carrier-grade_nat 17.1.0
f5 big-ip_ddos_hybrid_defender *
f5 big-ip_ddos_hybrid_defender *
f5 big-ip_ddos_hybrid_defender *
f5 big-ip_ddos_hybrid_defender *
f5 big-ip_ddos_hybrid_defender 17.1.0
f5 big-ip_domain_name_system *
f5 big-ip_domain_name_system *
f5 big-ip_domain_name_system *
f5 big-ip_domain_name_system *
f5 big-ip_domain_name_system 17.1.0
f5 big-ip_fraud_protection_service *
f5 big-ip_fraud_protection_service *
f5 big-ip_fraud_protection_service *
f5 big-ip_fraud_protection_service *
f5 big-ip_fraud_protection_service 17.1.0
f5 big-ip_global_traffic_manager *
f5 big-ip_global_traffic_manager *
f5 big-ip_global_traffic_manager *
f5 big-ip_global_traffic_manager *
f5 big-ip_global_traffic_manager 17.1.0
f5 big-ip_link_controller *
f5 big-ip_link_controller *
f5 big-ip_link_controller *
f5 big-ip_link_controller *
f5 big-ip_link_controller 17.1.0
f5 big-ip_local_traffic_manager *
f5 big-ip_local_traffic_manager *
f5 big-ip_local_traffic_manager *
f5 big-ip_local_traffic_manager *
f5 big-ip_local_traffic_manager 17.1.0
f5 big-ip_next 20.0.1
f5 big-ip_next_service_proxy_for_kubernetes *
f5 big-ip_policy_enforcement_manager *
f5 big-ip_policy_enforcement_manager *
f5 big-ip_policy_enforcement_manager *
f5 big-ip_policy_enforcement_manager *
f5 big-ip_policy_enforcement_manager 17.1.0
f5 big-ip_ssl_orchestrator *
f5 big-ip_ssl_orchestrator *
f5 big-ip_ssl_orchestrator *
f5 big-ip_ssl_orchestrator *
f5 big-ip_ssl_orchestrator 17.1.0
f5 big-ip_webaccelerator *
f5 big-ip_webaccelerator *
f5 big-ip_webaccelerator *
f5 big-ip_webaccelerator *
f5 big-ip_webaccelerator 17.1.0
f5 big-ip_websafe *
f5 big-ip_websafe *
f5 big-ip_websafe *
f5 big-ip_websafe *
f5 big-ip_websafe 17.1.0
f5 nginx *
f5 nginx_ingress_controller *
f5 nginx_ingress_controller *
f5 nginx_plus *
f5 nginx_plus r29
f5 nginx_plus r30
apache tomcat *
apache tomcat *
apache tomcat *
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apple swiftnio_http\/2 *
grpc grpc *
grpc grpc *
grpc grpc *
grpc grpc 1.57.0
microsoft .net *
microsoft .net *
microsoft asp.net_core *
microsoft asp.net_core *
microsoft azure_kubernetes_service *
microsoft visual_studio_2022 *
microsoft visual_studio_2022 *
microsoft visual_studio_2022 *
microsoft visual_studio_2022 *
microsoft windows_10_1607 *
microsoft windows_10_1607 *
microsoft windows_10_1809 *
microsoft windows_10_21h2 *
microsoft windows_10_22h2 *
microsoft windows_11_21h2 *
microsoft windows_11_22h2 *
microsoft windows_server_2016 -
microsoft windows_server_2019 -
microsoft windows_server_2022 -
nodejs node.js *
nodejs node.js *
microsoft cbl-mariner *
dena h2o *
facebook proxygen *
apache apisix *
apache traffic_server *
apache traffic_server *
amazon opensearch_data_prepper *
debian debian_linux 10.0
debian debian_linux 11.0
debian debian_linux 12.0
kazu-yamamoto http2 *
istio istio *
istio istio *
istio istio *
varnish_cache_project varnish_cache *
traefik traefik *
traefik traefik 3.0.0
traefik traefik 3.0.0
traefik traefik 3.0.0
projectcontour contour *
linkerd linkerd *
linkerd linkerd 2.13.0
linkerd linkerd 2.13.1
linkerd linkerd 2.14.0
linkerd linkerd 2.14.1
linecorp armeria *
redhat 3scale_api_management_platform 2.0
redhat advanced_cluster_management_for_kubernetes 2.0
redhat advanced_cluster_security 3.0
redhat advanced_cluster_security 4.0
redhat ansible_automation_platform 2.0
redhat build_of_optaplanner 8.0
redhat build_of_quarkus -
redhat ceph_storage 5.0
redhat cert-manager_operator_for_red_hat_openshift -
redhat certification_for_red_hat_enterprise_linux 8.0
redhat certification_for_red_hat_enterprise_linux 9.0
redhat cost_management -
redhat cryostat 2.0
redhat decision_manager 7.0
redhat fence_agents_remediation_operator -
redhat integration_camel_for_spring_boot -
redhat integration_camel_k -
redhat integration_service_registry -
redhat jboss_a-mq 7
redhat jboss_a-mq_streams -
redhat jboss_core_services -
redhat jboss_data_grid 7.0.0
redhat jboss_enterprise_application_platform 6.0.0
redhat jboss_enterprise_application_platform 7.0.0
redhat jboss_fuse 6.0.0
redhat jboss_fuse 7.0.0
redhat logging_subsystem_for_red_hat_openshift -
redhat machine_deletion_remediation_operator -
redhat migration_toolkit_for_applications 6.0
redhat migration_toolkit_for_containers -
redhat migration_toolkit_for_virtualization -
redhat network_observability_operator -
redhat node_healthcheck_operator -
redhat node_maintenance_operator -
redhat openshift -
redhat openshift_api_for_data_protection -
redhat openshift_container_platform 4.0
redhat openshift_container_platform_assisted_installer -
redhat openshift_data_science -
redhat openshift_dev_spaces -
redhat openshift_developer_tools_and_services -
redhat openshift_distributed_tracing -
redhat openshift_gitops -
redhat openshift_pipelines -
redhat openshift_sandboxed_containers -
redhat openshift_secondary_scheduler_operator -
redhat openshift_serverless -
redhat openshift_service_mesh 2.0
redhat openshift_virtualization 4
redhat openstack_platform 16.1
redhat openstack_platform 16.2
redhat openstack_platform 17.1
redhat process_automation 7.0
redhat quay 3.0.0
redhat run_once_duration_override_operator -
redhat satellite 6.0
redhat self_node_remediation_operator -
redhat service_interconnect 1.0
redhat single_sign-on 7.0
redhat support_for_spring_boot -
redhat web_terminal -
redhat enterprise_linux 6.0
redhat enterprise_linux 8.0
redhat enterprise_linux 9.0
redhat service_telemetry_framework 1.5
redhat enterprise_linux 8.0
fedoraproject fedora 37
fedoraproject fedora 38
netapp astra_control_center -
netapp oncommand_insight -
akka http_server *
konghq kong_gateway *
jenkins jenkins *
jenkins jenkins *
apache solr *
openresty openresty *
cisco connected_mobile_experiences *
cisco crosswork_data_gateway *
cisco crosswork_data_gateway 5.0
cisco crosswork_zero_touch_provisioning *
cisco data_center_network_manager -
cisco enterprise_chat_and_email -
cisco expressway *
cisco firepower_threat_defense *
cisco iot_field_network_director *
cisco prime_access_registrar *
cisco prime_cable_provisioning *
cisco prime_infrastructure *
cisco prime_network_registrar *
cisco secure_dynamic_attributes_connector *
cisco secure_malware_analytics *
cisco telepresence_video_communication_server *
cisco ultra_cloud_core_-_policy_control_function *
cisco ultra_cloud_core_-_policy_control_function 2024.01.0
cisco ultra_cloud_core_-_serving_gateway_function *
cisco ultra_cloud_core_-_session_management_function *
cisco unified_attendant_console_advanced -
cisco unified_contact_center_domain_manager -
cisco unified_contact_center_enterprise -
cisco unified_contact_center_enterprise_-_live_data_server *
cisco unified_contact_center_management_portal -
cisco fog_director *
cisco ios_xe *
cisco ios_xr *
cisco secure_web_appliance_firmware *
cisco secure_web_appliance -
cisco nx-os *
cisco nx-os *
cisco nexus_3016 -
cisco nexus_3016q -
cisco nexus_3048 -
cisco nexus_3064 -
cisco nexus_3064-32t -
cisco nexus_3064-t -
cisco nexus_3064-x -
cisco nexus_3064t -
cisco nexus_3064x -
cisco nexus_3100 -
cisco nexus_3100-v -
cisco nexus_3100-z -
cisco nexus_3100v -
cisco nexus_31108pc-v -
cisco nexus_31108pv-v -
cisco nexus_31108tc-v -
cisco nexus_31128pq -
cisco nexus_3132c-z -
cisco nexus_3132q -
cisco nexus_3132q-v -
cisco nexus_3132q-x -
cisco nexus_3132q-x\/3132q-xl -
cisco nexus_3132q-xl -
cisco nexus_3164q -
cisco nexus_3172 -
cisco nexus_3172pq -
cisco nexus_3172pq-xl -
cisco nexus_3172pq\/pq-xl -
cisco nexus_3172tq -
cisco nexus_3172tq-32t -
cisco nexus_3172tq-xl -
cisco nexus_3200 -
cisco nexus_3232 -
cisco nexus_3232c -
cisco nexus_3232c_ -
cisco nexus_3264c-e -
cisco nexus_3264q -
cisco nexus_3400 -
cisco nexus_3408-s -
cisco nexus_34180yc -
cisco nexus_34200yc-sm -
cisco nexus_3432d-s -
cisco nexus_3464c -
cisco nexus_3500 -
cisco nexus_3524 -
cisco nexus_3524-x -
cisco nexus_3524-x\/xl -
cisco nexus_3524-xl -
cisco nexus_3548 -
cisco nexus_3548-x -
cisco nexus_3548-x\/xl -
cisco nexus_3548-xl -
cisco nexus_3600 -
cisco nexus_36180yc-r -
cisco nexus_3636c-r -
cisco nx-os *
cisco nx-os *
cisco nexus_9000v -
cisco nexus_9200 -
cisco nexus_9200yc -
cisco nexus_92160yc-x -
cisco nexus_92160yc_switch -
cisco nexus_9221c -
cisco nexus_92300yc -
cisco nexus_92300yc_switch -
cisco nexus_92304qc -
cisco nexus_92304qc_switch -
cisco nexus_9232e -
cisco nexus_92348gc-x -
cisco nexus_9236c -
cisco nexus_9236c_switch -
cisco nexus_9272q -
cisco nexus_9272q_switch -
cisco nexus_9300 -
cisco nexus_93108tc-ex -
cisco nexus_93108tc-ex-24 -
cisco nexus_93108tc-ex_switch -
cisco nexus_93108tc-fx -
cisco nexus_93108tc-fx-24 -
cisco nexus_93108tc-fx3h -
cisco nexus_93108tc-fx3p -
cisco nexus_93120tx -
cisco nexus_93120tx_switch -
cisco nexus_93128 -
cisco nexus_93128tx -
cisco nexus_93128tx_switch -
cisco nexus_9316d-gx -
cisco nexus_93180lc-ex -
cisco nexus_93180lc-ex_switch -
cisco nexus_93180tc-ex -
cisco nexus_93180yc-ex -
cisco nexus_93180yc-ex-24 -
cisco nexus_93180yc-ex_switch -
cisco nexus_93180yc-fx -
cisco nexus_93180yc-fx-24 -
cisco nexus_93180yc-fx3 -
cisco nexus_93180yc-fx3h -
cisco nexus_93180yc-fx3s -
cisco nexus_93216tc-fx2 -
cisco nexus_93240tc-fx2 -
cisco nexus_93240yc-fx2 -
cisco nexus_9332c -
cisco nexus_9332d-gx2b -
cisco nexus_9332d-h2r -
cisco nexus_9332pq -
cisco nexus_9332pq_switch -
cisco nexus_93360yc-fx2 -
cisco nexus_9336c-fx2 -
cisco nexus_9336c-fx2-e -
cisco nexus_9336pq -
cisco nexus_9336pq_aci -
cisco nexus_9336pq_aci_spine -
cisco nexus_9336pq_aci_spine_switch -
cisco nexus_9348d-gx2a -
cisco nexus_9348gc-fx3 -
cisco nexus_9348gc-fxp -
cisco nexus_93600cd-gx -
cisco nexus_9364c -
cisco nexus_9364c-gx -
cisco nexus_9364d-gx2a -
cisco nexus_9372px -
cisco nexus_9372px-e -
cisco nexus_9372px-e_switch -
cisco nexus_9372px_switch -
cisco nexus_9372tx -
cisco nexus_9372tx-e -
cisco nexus_9372tx-e_switch -
cisco nexus_9372tx_switch -
cisco nexus_9396px -
cisco nexus_9396px_switch -
cisco nexus_9396tx -
cisco nexus_9396tx_switch -
cisco nexus_9408 -
cisco nexus_9432pq -
cisco nexus_9500 -
cisco nexus_9500_16-slot -
cisco nexus_9500_4-slot -
cisco nexus_9500_8-slot -
cisco nexus_9500_supervisor_a -
cisco nexus_9500_supervisor_a\+ -
cisco nexus_9500_supervisor_b -
cisco nexus_9500_supervisor_b\+ -
cisco nexus_9500r -
cisco nexus_9504 -
cisco nexus_9504_switch -
cisco nexus_9508 -
cisco nexus_9508_switch -
cisco nexus_9516 -
cisco nexus_9516_switch -
cisco nexus_9536pq -
cisco nexus_9636pq -
cisco nexus_9716d-gx -
cisco nexus_9736pq -
cisco nexus_9800 -
cisco nexus_9804 -
cisco nexus_9808 -



{
   cisaActionDue: "2023-10-31",
   cisaExploitAdd: "2023-10-10",
   cisaRequiredAction: "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
   cisaVulnerabilityName: "HTTP/2 Rapid Reset Attack Vulnerability",
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:ietf:http:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5200E35-222B-42E0-83E0-5B702684D992",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:nghttp2:nghttp2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3BDC297-F023-4E87-8518-B84CCF9DD6A8",
                     versionEndExcluding: "1.57.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:netty:netty:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D12D5257-7ED2-400F-9EF7-40E0D3650C2B",
                     versionEndExcluding: "4.1.100",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:envoyproxy:envoy:1.24.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B058776-B5B7-4079-B0AF-23F40926DCEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:envoyproxy:envoy:1.25.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D565975-EFD9-467C-B6E3-1866A4EF17A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:envoyproxy:envoy:1.26.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D487271-1B5E-4F16-B0CB-A7B8908935C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:envoyproxy:envoy:1.27.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA6ED627-EFB3-4BDD-8ECC-C5947A1470B2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4A6F189-6C43-462D-85C9-B0EBDA8A4683",
                     versionEndExcluding: "9.4.53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C993C920-85C0-4181-A95E-5D965A670738",
                     versionEndExcluding: "10.0.17",
                     versionStartIncluding: "10.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "08E79A8E-E12C-498F-AF4F-1AAA7135661E",
                     versionEndExcluding: "11.0.17",
                     versionStartIncluding: "11.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F138D800-9A3B-4C76-8A3C-4793083A1517",
                     versionEndExcluding: "12.0.2",
                     versionStartIncluding: "12.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:caddyserver:caddy:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6341DDDA-AD27-4087-9D59-0A212F0037B4",
                     versionEndExcluding: "2.7.5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "328120E4-C031-44B4-9BE5-03B0CDAA066F",
                     versionEndExcluding: "1.20.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5FD9AB15-E5F6-4DBC-9EC7-D0ABA705802A",
                     versionEndExcluding: "1.21.3",
                     versionStartIncluding: "1.21.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:golang:http2:*:*:*:*:*:go:*:*",
                     matchCriteriaId: "D7D2F801-6F65-4705-BCB9-D057EA54A707",
                     versionEndExcluding: "0.17.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:golang:networking:*:*:*:*:*:go:*:*",
                     matchCriteriaId: "801F25DA-F38C-4452-8E90-235A3B1A5FF0",
                     versionEndExcluding: "0.17.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D93F04AD-DF14-48AB-9F13-8B2E491CF42E",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7522C760-7E07-406F-BF50-5656D5723C4F",
                     versionEndIncluding: "14.1.5",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A7F605E-EB10-40FB-98D6-7E3A95E310BC",
                     versionEndIncluding: "15.1.10",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "783E62F2-F867-48F1-B123-D1227C970674",
                     versionEndIncluding: "16.1.4",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8D90B7-A1AF-4EFB-B688-1563D81E5C6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6603ED6A-3366-4572-AFCD-B3D4B1EC7606",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "88978E38-81D3-4EFE-8525-A300B101FA69",
                     versionEndIncluding: "14.1.5",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0510296F-92D7-4388-AE3A-0D9799C2FC4D",
                     versionEndIncluding: "15.1.10",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7698D6C-B1F7-43C1-BBA6-88E956356B3D",
                     versionEndIncluding: "16.1.4",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A1CC91B-6920-4AF0-9EDD-DD3189E78F4D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "05E452AA-A520-4CBE-8767-147772B69194",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "596FC5D5-7329-4E39-841E-CAE937C02219",
                     versionEndIncluding: "14.1.5",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3C7A168-F370-441E-8790-73014BCEC39F",
                     versionEndIncluding: "15.1.10",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF16FD01-7704-40AB-ACB2-80A883804D22",
                     versionEndIncluding: "16.1.4",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "1769D69A-CB59-46B1-89B3-FB97DC6DEB9B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9167FEC1-2C37-4946-9657-B4E69301FB24",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B4B3442-E0C0-48CD-87AD-060E15C9801E",
                     versionEndIncluding: "14.1.5",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FA85EC1-D91A-49DD-949B-2AF7AC813CA5",
                     versionEndIncluding: "15.1.10",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "20662BB0-4C3D-4CF0-B068-3555C65DD06C",
                     versionEndIncluding: "16.1.4",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "59203EBF-C52A-45A1-B8DF-00E17E3EFB51",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7EC2324D-EC8B-41DF-88A7-819E53AAD0FC",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B88F9D1-B54B-40C7-A18A-26C4A071D7EC",
                     versionEndIncluding: "14.1.5",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8F39403-C259-4D6F-9E9A-53671017EEDB",
                     versionEndIncluding: "15.1.10",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "220F2D38-FA82-45EF-B957-7678C9FEDBC1",
                     versionEndIncluding: "16.1.4",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C698C1C-A3DD-46E2-B05A-12F2604E7F85",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "922AA845-530A-4B4B-9976-4CBC30C8A324",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F938EB43-8373-47EB-B269-C6DF058A9244",
                     versionEndIncluding: "14.1.5",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1771493E-ACAA-477F-8AB4-25DB12F6AD6E",
                     versionEndIncluding: "15.1.10",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E86F3D5-65A4-48CE-A6A2-736BBB88E3F8",
                     versionEndIncluding: "16.1.4",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "87670A74-34FE-45DF-A725-25B804C845B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7E422F6-C4C2-43AC-B137-0997B5739030",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC3F710F-DBCB-4976-9719-CF063DA22377",
                     versionEndIncluding: "14.1.5",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B9B76A1-7C5A-453F-A4ED-F1A81BCEBEB5",
                     versionEndIncluding: "15.1.10",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "88EDFCD9-775C-48FA-9CDA-2B04DA8D0612",
                     versionEndIncluding: "16.1.4",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "67DB21AE-DF53-442D-B492-C4ED9A20B105",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C9FCBCB-9CE0-49E7-85C8-69E71D211912",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "112DFA85-90AD-478D-BD70-8C7C0C074F1B",
                     versionEndIncluding: "14.1.5",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB704A1C-D8B7-48BB-A15A-C14DB591FE4A",
                     versionEndIncluding: "15.1.10",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "21D51D9F-2840-4DEA-A007-D20111A1745C",
                     versionEndIncluding: "16.1.4",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BC1D037-74D2-4F92-89AD-C90F6CBF440B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CAEF3EA4-7D5A-4B44-9CE3-258AEC745866",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FBCE2D1-9D93-415D-AB2C-2060307C305A",
                     versionEndIncluding: "14.1.5",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8070B469-8CC4-4D2F-97D7-12D0ABB963C1",
                     versionEndIncluding: "15.1.10",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A326597E-725D-45DE-BEF7-2ED92137B253",
                     versionEndIncluding: "16.1.4",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B235A78-649B-46C5-B24B-AB485A884654",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "08B25AAB-A98C-4F89-9131-29E3A8C0ED23",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED9B976A-D3AD-4445-BF8A-067C3EBDFBB0",
                     versionEndIncluding: "14.1.5",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "98D2CE1E-DED0-470A-AA78-C78EF769C38E",
                     versionEndIncluding: "15.1.10",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C966FABA-7199-4F0D-AB8C-4590FE9D2FFF",
                     versionEndIncluding: "16.1.4",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "84D00768-E71B-4FF7-A7BF-F2C8CFBC900D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3D2ABA3-D4A9-4267-B0DF-7C3BBEEAEB66",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC36311E-BB00-4750-85C8-51F5A2604F07",
                     versionEndIncluding: "14.1.5",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A65D357E-4B40-42EC-9AAA-2B6CEF78C401",
                     versionEndIncluding: "15.1.10",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7EF9865-FE65-4DFB-BF21-62FBCE65FF1C",
                     versionEndIncluding: "16.1.4",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "ABBD10E8-6054-408F-9687-B9BF6375CA09",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6018B01-048C-43BB-A78D-66910ED60CA9",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A6A5686-5A8B-45D5-9165-BC99D2CCAC47",
                     versionEndIncluding: "14.1.5",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D2A121F-5BD2-4263-8ED3-1DDE25B5C306",
                     versionEndIncluding: "15.1.10",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A4F7BAD-3EDD-4DE0-AAB7-DE5ACA34DD79",
                     versionEndIncluding: "16.1.4",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "83794B04-87E2-4CA9-81F5-BB820D0F5395",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9EC2237-117F-43BD-ADEC-516CF72E04EF",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F70D4B6F-65CF-48F4-9A07-072DFBCE53D9",
                     versionEndIncluding: "14.1.5",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "29563719-1AF2-4BB8-8CCA-A0869F87795D",
                     versionEndIncluding: "15.1.10",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D24815DD-579A-46D1-B9F2-3BB2C56BC54D",
                     versionEndIncluding: "16.1.4",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A6E7035-3299-474F-8F67-945EA9A059D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0360F76D-E75E-4B05-A294-B47012323ED9",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A4607BF-41AC-4E84-A110-74E085FF0445",
                     versionEndIncluding: "14.1.5",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "441CC945-7CA3-49C0-AE10-94725301E31D",
                     versionEndIncluding: "15.1.10",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "46BA8E8A-6ED5-4FB2-8BBC-586AA031085A",
                     versionEndIncluding: "16.1.4",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "56FB92F7-FF1E-425D-A5AB-9D9FB0BB9450",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "969C4F14-F6D6-46D6-B348-FC1463877680",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "41AD5040-1250-45F5-AB63-63F333D49BCC",
                     versionEndIncluding: "1.8.2",
                     versionStartIncluding: "1.5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8257AA59-C14D-4EC1-B22C-DFBB92CBC297",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "37DB32BB-F4BA-4FB5-94B1-55C3F06749CF",
                     versionEndIncluding: "14.1.5",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FFF5007E-761C-4697-8D34-C064DF0ABE8D",
                     versionEndIncluding: "15.1.10",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "910441D3-90EF-4375-B007-D51120A60AB2",
                     versionEndIncluding: "16.1.4",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "667EB77B-DA13-4BA4-9371-EE3F3A109F38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A6F9699-A485-4614-8F38-5A556D31617E",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A90F547-97A2-41EC-9FDF-25F869F0FA38",
                     versionEndIncluding: "14.1.5",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E76E1B82-F1DC-4366-B388-DBDF16C586A0",
                     versionEndIncluding: "15.1.10",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "660137F4-15A1-42D1-BBAC-99A1D5BB398B",
                     versionEndIncluding: "16.1.4",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C446827A-1F71-4FAD-9422-580642D26AD1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1932D32D-0E4B-4BBD-816F-6D47AB2E2F04",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D47B7691-A95B-45C0-BAB4-27E047F3C379",
                     versionEndIncluding: "14.1.5",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CD1637D-0E42-4928-867A-BA0FDB6E8462",
                     versionEndIncluding: "15.1.10",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A599F90-F66B-4DF0-AD7D-D234F328BD59",
                     versionEndIncluding: "16.1.4",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D1B2000-C3FE-4B4C-885A-A5076EB164E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5326759A-AFB0-4A15-B4E9-3C9A2E5DB32A",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "57D92D05-C67D-437E-88F3-DCC3F6B0ED2F",
                     versionEndIncluding: "14.1.5",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECCB8C30-861E-4E48-A5F5-30EE523C1FB6",
                     versionEndIncluding: "15.1.10",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5FEAD2A-3A58-432E-BEBB-6E3FDE24395F",
                     versionEndIncluding: "16.1.4",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AB23AE6-245E-43D6-B832-933F8259F937",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1188B4A9-2684-413C-83D1-E91C75AE0FCF",
                     versionEndIncluding: "1.25.2",
                     versionStartIncluding: "1.9.5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3337609D-5291-4A52-BC6A-6A8D4E60EB20",
                     versionEndIncluding: "2.4.2",
                     versionStartIncluding: "2.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6CF0ABD9-EB28-4966-8C31-EED7AFBF1527",
                     versionEndIncluding: "3.3.0",
                     versionStartIncluding: "3.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F291CB34-47A4-425A-A200-087CC295AEC8",
                     versionEndExcluding: "r29",
                     versionStartIncluding: "r25",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
                     matchCriteriaId: "5892B558-EC3A-43FF-A1D5-B2D9F70796F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
                     matchCriteriaId: "96BF2B19-52C7-4051-BA58-CAE6F912B72F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "ABD26B48-CC80-4FAE-BD3D-78DE4C80C92B",
                     versionEndIncluding: "8.5.93",
                     versionStartIncluding: "8.5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3EC20B6-B2AB-41F5-9BF9-D16C1FE67C34",
                     versionEndIncluding: "9.0.80",
                     versionStartIncluding: "9.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0765CC3D-AB1A-4147-8900-EF4C105321F2",
                     versionEndIncluding: "10.1.13",
                     versionStartIncluding: "10.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:tomcat:11.0.0:milestone1:*:*:*:*:*:*",
                     matchCriteriaId: "D1AA7FF6-E8E7-4BF6-983E-0A99B0183008",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:tomcat:11.0.0:milestone10:*:*:*:*:*:*",
                     matchCriteriaId: "57088BDD-A136-45EF-A8A1-2EBF79CEC2CE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:tomcat:11.0.0:milestone11:*:*:*:*:*:*",
                     matchCriteriaId: "B32D1D7A-A04F-444E-8F45-BB9A9E4B0199",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:tomcat:11.0.0:milestone2:*:*:*:*:*:*",
                     matchCriteriaId: "2AAD52CE-94F5-4F98-A027-9A7E68818CB6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:tomcat:11.0.0:milestone3:*:*:*:*:*:*",
                     matchCriteriaId: "F1F981F5-035A-4EDD-8A9F-481EE8BC7FF7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:tomcat:11.0.0:milestone4:*:*:*:*:*:*",
                     matchCriteriaId: "03A171AF-2EC8-4422-912C-547CDB58CAAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:tomcat:11.0.0:milestone5:*:*:*:*:*:*",
                     matchCriteriaId: "538E68C4-0BA4-495F-AEF8-4EF6EE7963CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:tomcat:11.0.0:milestone6:*:*:*:*:*:*",
                     matchCriteriaId: "49350A6E-5E1D-45B2-A874-3B8601B3ADCC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:tomcat:11.0.0:milestone7:*:*:*:*:*:*",
                     matchCriteriaId: "5F50942F-DF54-46C0-8371-9A476DD3EEA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:tomcat:11.0.0:milestone8:*:*:*:*:*:*",
                     matchCriteriaId: "D12C2C95-B79F-4AA4-8CE3-99A3EE7991AB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:tomcat:11.0.0:milestone9:*:*:*:*:*:*",
                     matchCriteriaId: "98792138-DD56-42DF-9612-3BDC65EEC117",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:apple:swiftnio_http\\/2:*:*:*:*:*:swift:*:*",
                     matchCriteriaId: "08190072-3880-4EF5-B642-BA053090D95B",
                     versionEndExcluding: "1.28.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:grpc:grpc:*:*:*:*:*:go:*:*",
                     matchCriteriaId: "5F4CDEA9-CB47-4881-B096-DA896E2364F3",
                     versionEndExcluding: "1.56.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:grpc:grpc:*:*:*:*:*:-:*:*",
                     matchCriteriaId: "E65AF7BC-7DAE-408A-8485-FBED22815F75",
                     versionEndIncluding: "1.59.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:grpc:grpc:*:*:*:*:*:go:*:*",
                     matchCriteriaId: "DD868DDF-C889-4F36-B5E6-68B6D9EA48CC",
                     versionEndExcluding: "1.58.3",
                     versionStartIncluding: "1.58.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:grpc:grpc:1.57.0:-:*:*:*:go:*:*",
                     matchCriteriaId: "FBD991E2-DB5A-4AAD-95BA-4B5ACB811C96",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4496821E-BD55-4F31-AD9C-A3D66CBBD6BD",
                     versionEndExcluding: "6.0.23",
                     versionStartIncluding: "6.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DF7ECF6-178D-433C-AA21-BAE9EF248F37",
                     versionEndExcluding: "7.0.12",
                     versionStartIncluding: "7.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C3418F4-B8BF-4666-BB39-C188AB01F45C",
                     versionEndExcluding: "6.0.23",
                     versionStartIncluding: "6.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1278DD1C-EFA9-4316-AD32-24C1B1FB0CEA",
                     versionEndExcluding: "7.0.12",
                     versionStartIncluding: "7.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:azure_kubernetes_service:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3BDFB0FF-0F4A-4B7B-94E8-ED72A8106314",
                     versionEndExcluding: "2023-10-08",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "16A8F269-E07E-402F-BFD5-60F3988A5EAF",
                     versionEndExcluding: "17.2.20",
                     versionStartIncluding: "17.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4B2B972-69E2-4D21-9A7C-B2AFF1D89EB8",
                     versionEndExcluding: "17.4.12",
                     versionStartIncluding: "17.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA5834D4-F52F-41C0-AA11-C974FFEEA063",
                     versionEndExcluding: "17.6.8",
                     versionStartIncluding: "17.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2166106F-ACD6-4C7B-B0CC-977B83CC5F73",
                     versionEndExcluding: "17.7.5",
                     versionStartIncluding: "17.7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
                     matchCriteriaId: "4CD49C41-6D90-47D3-AB4F-4A74169D3A8F",
                     versionEndExcluding: "10.0.14393.6351",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
                     matchCriteriaId: "BAEFEE13-9CD7-46A2-8AF6-0A33C79C05F1",
                     versionEndExcluding: "10.0.14393.6351",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E500D59C-6597-45E9-A57B-BE26C0C231D3",
                     versionEndExcluding: "10.0.17763.4974",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9F9A643-90C6-489C-98A0-D2739CE72F86",
                     versionEndExcluding: "10.0.19044.3570",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1814619C-ED07-49E0-A50A-E28D824D43BC",
                     versionEndExcluding: "10.0.19045.3570",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "100A27D3-87B0-4E72-83F6-7605E3F35E63",
                     versionEndExcluding: "10.0.22000.2538",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6A36795-0238-45C9-ABE6-3DCCF751915B",
                     versionEndExcluding: "10.0.22621.2428",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB79EE26-FC32-417D-A49C-A1A63165A968",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "821614DD-37DD-44E2-A8A4-FE8D23A33C3C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*",
                     matchCriteriaId: "C61F0294-5C7E-4DB2-8905-B85D0782F35F",
                     versionEndExcluding: "18.18.2",
                     versionStartIncluding: "18.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "69843DE4-4721-4F0A-A9B7-0F6DF5AAA388",
                     versionEndExcluding: "20.8.1",
                     versionStartIncluding: "20.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:cbl-mariner:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B25279EF-C406-4133-99ED-0492703E0A4E",
                     versionEndExcluding: "2023-10-11",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:dena:h2o:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FFFF84B-F35C-43DE-959A-A5D10C3AE9F5",
                     versionEndExcluding: "2023-10-10",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:facebook:proxygen:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DCE8C89-7C22-48CA-AF22-B34C8AA2CB8C",
                     versionEndExcluding: "2023.10.16.00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:apache:apisix:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDEB508E-0EBD-4450-9074-983DDF568AB4",
                     versionEndExcluding: "3.6.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "93A1A748-6C71-4191-8A16-A93E94E2CDE4",
                     versionEndExcluding: "8.1.9",
                     versionStartIncluding: "8.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E4BCAF6-B246-41EC-9EE1-24296BFC4F5A",
                     versionEndExcluding: "9.2.3",
                     versionStartIncluding: "9.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amazon:opensearch_data_prepper:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F70360D-6214-46BA-AF82-6AB01E13E4E9",
                     versionEndExcluding: "2.5.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA6FEEC2-9F11-4643-8827-749718254FED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "46D69DCC-AE4D-4EA5-861C-D60951444C6C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:kazu-yamamoto:http2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2DA759E-1AF8-49D3-A3FC-1B426C13CA82",
                     versionEndExcluding: "4.2.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "28BE6F7B-AE66-4C8A-AAFA-F1262671E9BF",
                     versionEndExcluding: "1.17.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0C8E760-C8D2-483A-BBD4-6A6D292A3874",
                     versionEndExcluding: "1.18.3",
                     versionStartIncluding: "1.18.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D0F78BB-6A05-4C97-A8DB-E731B6CC8CC7",
                     versionEndExcluding: "1.19.1",
                     versionStartIncluding: "1.19.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:varnish_cache_project:varnish_cache:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "050AE218-3871-44D6-94DA-12D84C2093CB",
                     versionEndExcluding: "2023-10-10",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B36BFFB0-C0EC-4926-A1DB-0B711C846A68",
                     versionEndExcluding: "2.10.5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:traefik:traefik:3.0.0:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "376EAF9B-E994-4268-9704-0A45EA30270F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:traefik:traefik:3.0.0:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "F3D08335-C291-4623-B80C-3B14C4D1FA32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:traefik:traefik:3.0.0:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "21033CEE-CEF5-4B0D-A565-4A6FC764AA6D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:projectcontour:contour:*:*:*:*:*:kubernetes:*:*",
                     matchCriteriaId: "FC4C66B1-42C0-495D-AE63-2889DE0BED84",
                     versionEndExcluding: "2023-10-11",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:linkerd:linkerd:*:*:*:*:stable:kubernetes:*:*",
                     matchCriteriaId: "8633E263-F066-4DD8-A734-90207207A873",
                     versionEndIncluding: "2.12.5",
                     versionStartIncluding: "2.12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linkerd:linkerd:2.13.0:*:*:*:stable:kubernetes:*:*",
                     matchCriteriaId: "34A23BD9-A0F4-4D85-8011-EAC93C29B4E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linkerd:linkerd:2.13.1:*:*:*:stable:kubernetes:*:*",
                     matchCriteriaId: "27ED3533-A795-422F-B923-68BE071DC00D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linkerd:linkerd:2.14.0:*:*:*:stable:kubernetes:*:*",
                     matchCriteriaId: "45F7E352-3208-4188-A5B1-906E00DF9896",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linkerd:linkerd:2.14.1:*:*:*:stable:kubernetes:*:*",
                     matchCriteriaId: "DF89A8AD-66FE-439A-B732-CAAB304D765B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:linecorp:armeria:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A400C637-AF18-4BEE-B57C-145261B65DEC",
                     versionEndExcluding: "1.26.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "653A5B08-0D02-4362-A8B1-D00B24C6C6F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B0E6B4B-BAA6-474E-A18C-72C9719CEC1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0FD736A-8730-446A-BA3A-7B608DB62B0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4C504B6-3902-46E2-82B7-48AEC9CDD48D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B4BE2D6-43C3-4065-A213-5DB1325DC78F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D54F5AE-61EC-4434-9D5F-9394A3979894",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE29B9D6-63DC-4779-ACE8-4E51E6A0AF37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E37E1B3-6F68-4502-85D6-68333643BDFF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D5A7736-A403-4617-8790-18E46CB74DA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "33F13B03-69BF-4A8B-A0A0-7F47FD857461",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "9393119E-F018-463F-9548-60436F104195",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC45EE1E-2365-42D4-9D55-92FA24E5ED3A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E567CD9F-5A43-4D25-B911-B5D0440698F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "68146098-58F8-417E-B165-5182527117C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB4D6790-63E5-4043-B8BE-B489D649061D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78698F40-0777-4990-822D-02E1B5D0E2C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B87C8AD3-8878-4546-86C2-BF411876648C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF03BDE8-602D-4DEE-BA5B-5B20FDF47741",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
                     matchCriteriaId: "A58966CB-36AF-4E64-AB39-BE3A0753E155",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "585BC540-073B-425B-B664-5EA4C00AFED6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B453CF7-9AA6-4B94-A003-BF7AE0B82F53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD354E32-A8B0-484C-B4C6-9FBCD3430D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B142ACCC-F7A9-4A3B-BE60-0D6691D5058D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "72A54BDA-311C-413B-8E4D-388AD65A170A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A305F012-544E-4245-9D69-1C8CD37748B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B40CCE4F-EA2C-453D-BB76-6388767E5C6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF93A27E-AA2B-4C2E-9B8D-FE7267847326",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B12A3A8-6456-481A-A0C9-524543FCC149",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C2E7E3C-A507-4AB2-97E5-4944D8775CF7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E22EBF9-AA0D-4712-9D69-DD97679CE835",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "941B114C-FBD7-42FF-B1D8-4EA30E99102C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "339CFB34-A795-49F9-BF6D-A00F3A1A4F63",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D044DBE-6F5A-4C53-828E-7B1A570CACFF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E23FA47F-B967-44AD-AB76-1BB2CAD3CA5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
                     matchCriteriaId: "65203CA1-5225-4E55-A187-6454C091F532",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BF8EFFB-5686-4F28-A68F-1A8854E098CE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "932D137F-528B-4526-9A89-CD59FA1AB0FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DA9B2E2-958B-478D-87D6-E5CDDCD44315",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3F5FF1E-5DA3-4EC3-B41A-A362BDFC4C69",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "99B8A88B-0B31-4CFF-AFD7-C9D3DDD5790D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97321212-0E07-4CC2-A917-7B5F61AB9A5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF390236-3259-4C8F-891C-62ACC4386CD1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0AAA300-691A-4957-8B69-F6888CC971B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45937289-2D64-47CB-A750-5B4F0D4664A0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B129311C-EB4B-4041-B85C-44D5E53FCAA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1AB54DB-3FB4-41CB-88ED-1400FD22AB85",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "77675CB7-67D7-44E9-B7FF-D224B3341AA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A76A2BCE-4AAE-46D7-93D6-2EDE0FC83145",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C877879-B84B-471C-80CF-0656521CA8AB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCC81071-B46D-4F5D-AC25-B4A4CCC20C73",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B3000D2-35DF-4A93-9FC0-1AD3AB8349B8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E315FC5C-FF19-43C9-A58A-CF2A5FF13824",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "20A6B40D-F991-4712-8E30-5FE008505CB7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1987BDA-0113-4603-B9BE-76647EB043F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D482A3D2-6E9B-42BA-9926-35E5BDD5F3BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "848C92A9-0677-442B-8D52-A448F2019903",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F564701-EDC1-43CF-BB9F-287D6992C6CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "12B0CF2B-D1E1-4E20-846E-6F0D873499A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EFEC7CA-8DDA-48A6-A7B6-1F1D14792890",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8885C2C-7FB8-40CA-BCB9-B48C50BF2499",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D88B140-D2A1-4A0A-A2E9-1A3B50C295AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4CFF558-3C47-480D-A2F0-BABF26042943",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F6FB57C-2BC7-487C-96DD-132683AEB35D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:redhat:service_telemetry_framework:1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "A903C3AD-2D25-45B5-BF4A-A5BEB2286627",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4CFF558-3C47-480D-A2F0-BABF26042943",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
                     matchCriteriaId: "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:netapp:astra_control_center:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC5EBD2A-32A3-46D5-B155-B44DCB7F6902",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1BE6C1F-2565-4E97-92AA-16563E5660A5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:akka:http_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2792650-851F-4820-B003-06A4BEA092D7",
                     versionEndExcluding: "10.5.3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:konghq:kong_gateway:*:*:*:*:enterprise:*:*:*",
                     matchCriteriaId: "9F6B63B9-F4C9-4A3F-9310-E0918E1070D1",
                     versionEndExcluding: "3.4.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
                     matchCriteriaId: "E6FF5F80-A991-43D4-B49F-D843E2BC5798",
                     versionEndIncluding: "2.414.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*",
                     matchCriteriaId: "54D25DA9-12D0-4F14-83E6-C69D0293AAB9",
                     versionEndIncluding: "2.427",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E1AFFB9-C717-4727-B0C9-5A0C281710E2",
                     versionEndExcluding: "9.4.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:openresty:openresty:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "25C85001-E0AB-4B01-8EE7-1D9C77CD956E",
                     versionEndExcluding: "1.21.4.3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F98F9D27-6659-413F-8F29-4FDB0882AAC5",
                     versionEndExcluding: "11.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C98BF315-C563-47C2-BAD1-63347A3D1008",
                     versionEndExcluding: "4.1.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "705CBA49-21C9-4400-B7B9-71CDF9F97D8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA2BE0F1-DD16-4876-8EBA-F187BD38B159",
                     versionEndExcluding: "6.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "796B6C58-2140-4105-A2A1-69865A194A75",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEA99DC6-EA03-469F-A8BE-7F96FDF0B333",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6560DBF4-AFE6-4672-95DE-74A0B8F4170A",
                     versionEndExcluding: "x14.3.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "84785919-796D-41E5-B652-6B5765C81D4A",
                     versionEndExcluding: "7.4.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "92A74A1A-C69F-41E6-86D0-D6BB1C5D0A1E",
                     versionEndExcluding: "4.11.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FE7BA33-2AC0-4A85-97AD-6D77F20BA2AD",
                     versionEndExcluding: "9.3.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FE2F959-1084-48D1-B1F1-8182FC9862DD",
                     versionEndExcluding: "7.2.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CC17E6B-D7AB-40D7-AEC5-F5B555AC4D7F",
                     versionEndExcluding: "3.10.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB6B48E-EA36-40A0-96D0-AF909BEC1147",
                     versionEndExcluding: "11.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CBED844-7F94-498C-836D-8593381A9657",
                     versionEndExcluding: "2.2.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C170DBA1-0899-4ECC-9A0D-8FEB1DA1B510",
                     versionEndExcluding: "2.19.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "358FA1DC-63D3-49F6-AC07-9E277DD0D9DA",
                     versionEndExcluding: "x14.3.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFF2D182-7599-4B81-B56B-F44EDA1384C0",
                     versionEndExcluding: "2024.01.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "4868BCCA-24DE-4F24-A8AF-B3A545C0396E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "194F7A1F-FD43-4FF7-9AE2-C13AA5567E8A",
                     versionEndExcluding: "2024.02.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEC75F99-C7F0-47EB-9032-C9D3A42EBA20",
                     versionEndExcluding: "2024.02.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6638F4E-16F7-447D-B755-52640BCB1C61",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC34F742-530E-4AB4-8AFC-D1E088E256B4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D31CC0E9-8E21-436B-AB84-EA1B1BC60DCD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22AD683-345B-4E16-BB9E-E9B1783E09AD",
                     versionEndExcluding: "12.6.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5C0D694-9E24-4782-B35F-D7C3E3B0F2ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2955BEE9-F567-4006-B96D-92E10FF84DB4",
                     versionEndExcluding: "1.22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "67502878-DB20-4410-ABA0-A1C5705064CD",
                     versionEndExcluding: "17.15.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "177DED2D-8089-4494-BDD9-7F84FC06CD5B",
                     versionEndExcluding: "7.11.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:secure_web_appliance_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "54A29FD3-4128-4333-8445-A7DD04A6ECF6",
                     versionEndExcluding: "15.1.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:secure_web_appliance:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "67074526-9933-46B3-9FE3-A0BE73C5E8A7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EEB32D2E-AD9D-44A0-AEF7-689F7D2605C9",
                     versionEndExcluding: "10.2\\(7\\)",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A236A0A-6956-4D79-B8E5-B2D0C79FAE88",
                     versionEndExcluding: "10.3\\(5\\)",
                     versionStartIncluding: "10.3\\(1\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "528ED62B-D739-4E06-AC64-B506FD73BBAB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3016q:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D402AB0-BCFB-4F42-8C50-5DC930AEEC8B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC2A6C31-438A-4CF5-A3F3-364B1672EB7D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3064:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76C10D85-88AC-4A79-8866-BED88A0F8DF8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3064-32t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "09AC2BAD-F536-48D0-A2F0-D4E290519EB6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3064-t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "65CB7F6D-A82B-4A31-BFAC-FF4A4B8DF9C1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3064-x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECC4FFCC-E886-49BC-9737-5B5BA2AAB14B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3064t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F4E8EE4-031D-47D3-A12E-EE5F792172EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3064x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "00CDD8C3-67D5-4E9F-9D48-A77B55DB0AB1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "41C14CC9-C244-4B86-AEA6-C50BAD5DA9A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3100-v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8FF2EC4-0C09-4C00-9956-A2A4A894F63D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3100-z:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D14D4B4E-120E-4607-A4F1-447C7BF3052E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3100v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15702ACB-29F3-412D-8805-E107E0729E35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_31108pc-v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E930332-CDDD-48D5-93BC-C22D693BBFA2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_31108pv-v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "29B34855-D8D2-4114-80D2-A4D159C62458",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_31108tc-v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BF4B8FE-E134-4491-B5C2-C1CFEB64731B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4226DA0-9371-401C-8247-E6E636A116C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7664666F-BCE4-4799-AEEA-3A73E6AD33F4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3DBBFE9-835C-4411-8492-6006E74BAC65",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3132q-v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3293438-3D18-45A2-B093-2C3F65783336",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3132q-x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C97C29EE-9426-4BBE-8D84-AB5FF748703D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3132q-x\\/3132q-xl:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E142C18F-9FB5-4D96-866A-141D7D16CAF7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3132q-xl:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F43B770-D96C-44EA-BC12-9F39FC4317B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA782EB3-E8E6-4DCF-B39C-B3CBD46E4384",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3172:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7817F4E6-B2DA-4F06-95A4-AF329F594C02",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3172pq:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CED628B5-97A8-4B26-AA40-BEC854982157",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3172pq-xl:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BB9DD73-E31D-4921-A6D6-E14E04703588",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3172pq\\/pq-xl:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8EFC116A-627F-4E05-B631-651D161217C8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3172tq:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4532F513-0543-4960-9877-01F23CA7BA1B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3172tq-32t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B43502B-FD53-465A-B60F-6A359C6ACD99",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3172tq-xl:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3229124-B097-4AAC-8ACD-2F9C89DCC3AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "32A532C0-B0E3-484A-B356-88970E7D0248",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3232:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C84D24C-2256-42AF-898A-221EBE9FE1E4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3232c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "652A2849-668D-4156-88FB-C19844A59F33",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3232c_:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D008CA1C-6F5A-40EA-BB12-A9D84D5AF700",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3264c-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "24FBE87B-8A4F-43A8-98A3-4A7D9C630937",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6ACD09AC-8B28-4ACB-967B-AB3D450BC137",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43913A0E-50D5-47DD-94D8-DD3391633619",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3408-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D397349-CCC6-479B-9273-FB1FFF4F34F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_34180yc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC7286A7-780F-4A45-940A-4AD5C9D0F201",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_34200yc-sm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA52D5C1-13D8-4D23-B022-954CCEF491F1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3432d-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F7AF8D7-431B-43CE-840F-CC0817D159C0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3464c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DAC204C8-1A5A-4E85-824E-DC9B8F6A802D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8E1073F-D374-4311-8F12-AD8C72FAA293",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3524:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EAF5AF71-15DF-4151-A1CF-E138A7103FC8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "10F80A72-AD54-4699-B8AE-82715F0B58E2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3524-x\\/xl:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E505C0B1-2119-4C6A-BF96-C282C633D169",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9354B6A2-D7D6-442E-BF4C-FE8A336D9E94",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "088C0323-683A-44F5-8D42-FF6EC85D080E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "74CB4002-7636-4382-B33E-FBA060A13C34",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3548-x\\/xl:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "915EF8F6-6039-4DD0-B875-30D911752B74",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "10CEBF73-3EE0-459A-86C5-F8F6243FE27C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97217080-455C-48E4-8CE1-6D5B9485864F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_36180yc-r:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "95D2C4C3-65CE-4612-A027-AF70CEFC3233",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3636c-r:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "57572E4A-78D5-4D1A-938B-F05F01759612",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EEB32D2E-AD9D-44A0-AEF7-689F7D2605C9",
                     versionEndExcluding: "10.2\\(7\\)",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A236A0A-6956-4D79-B8E5-B2D0C79FAE88",
                     versionEndExcluding: "10.3\\(5\\)",
                     versionStartIncluding: "10.3\\(1\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9000v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0CD9C1F1-8582-4F67-A77D-97CBFECB88B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "532CE4B0-A3C9-4613-AAAF-727817D06FB4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9200yc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "24CA1A59-2681-4507-AC74-53BD481099B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4283E433-7F8C-4410-B565-471415445811",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_92160yc_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF9147C9-5D8B-40F5-9AAA-66A3495A0AD8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9221c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FFB9FDE8-8533-4F65-BF32-4066D042B2F7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_92300yc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F80AB6FB-32FD-43D7-A9F1-80FA47696210",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_92300yc_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA5389A-8AD1-476E-983A-54DF573C30F5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5B2E4C1-2627-4B9D-8E92-4B483F647651",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_92304qc_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1B1A8F1-45B1-4E64-A254-7191FA93CB6D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9232e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "83DA8BFA-D7A2-476C-A6F5-CAE610033BC2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_92348gc-x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "557ED31C-C26A-4FAE-8B14-D06B49F7F08B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11411BFD-3F4D-4309-AB35-A3629A360FB0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9236c_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB2FFD26-8255-4351-8594-29D2AEFC06EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E663DE91-C86D-48DC-B771-FA72A8DF7A7C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9272q_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "61E10975-B47E-4F4D-8096-AEC7B7733612",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "92E2CB2B-DA11-4CF7-9D57-3D4D48990DC0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A90184B3-C82F-4CE5-B2AD-97D5E4690871",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93108tc-ex-24:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "40E40F42-632A-47DF-BE33-DC25B826310B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93108tc-ex_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C67B7A6-9BB2-41FC-8FA3-8D0DF67CBC68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AB89849-6DA4-4C9D-BC3F-EE0E41FD1901",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93108tc-fx-24:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C47F6BF9-2ADB-41A4-8D7D-8BB00141BB23",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93108tc-fx3h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C64136-89C2-443C-AF7B-BED81D3DE25A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93108tc-fx3p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBEF7F26-BB47-44BD-872E-130820557C23",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "07DE6F63-2C7D-415B-8C34-01EC05C062F3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93120tx_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "182000E0-8204-4D8B-B7DE-B191AFE12E28",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93128:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F309E7B9-B828-4CD2-9D2B-8966EE5B9CC1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F423E45D-A6DD-4305-9C6A-EAB26293E53A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93128tx_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BDC208BC-7E19-48C6-A20E-A79A51B7362C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9316d-gx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "102F91CD-DFB6-43D4-AE5B-DA157A696230",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93180lc-ex:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E952A96A-0F48-4357-B7DD-1127D8827650",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93180lc-ex_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "084D0191-563B-4FF0-B589-F35DA118E1C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93180tc-ex:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B7DB6FC5-762A-4F16-AE8C-69330EFCF640",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F70D81F1-8B12-4474-9060-B4934D8A3873",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93180yc-ex-24:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5394DE31-3863-4CA9-B7B1-E5227183100D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93180yc-ex_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "968390BC-B430-4903-B614-13104BFAE635",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93180yc-fx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7349D69B-D8FA-4462-AA28-69DD18A652D9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93180yc-fx-24:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE4BB834-2C00-4384-A78E-AF3BCDDC58AF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93180yc-fx3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0D30D52-837F-4FDA-B8E5-A9066E9C6D2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93180yc-fx3h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6678B8A-D905-447E-BE7E-6BFB4CC5DAFE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93180yc-fx3s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CE49B45-F2E9-491D-9C29-1B46E9CE14E2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93216tc-fx2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1CC5F78-E88B-4B82-9E3E-C73D3A49DE26",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93240tc-fx2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4BFAD21E-59EE-4CCE-8F1E-621D2EA50905",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93240yc-fx2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "91231DC6-2773-4238-8C14-A346F213B5E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9332c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DF88547-BAF4-47B0-9F60-80A30297FCEB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9332d-gx2b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "02C3CE6D-BD54-48B1-A188-8E53DA001424",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9332d-h2r:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "498991F7-39D6-428C-8C7D-DD8DC72A0346",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "113772B6-E9D2-4094-9468-3F4E1A87D07D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9332pq_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7B90D36-5124-4669-8462-4EAF35B0F53D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93360yc-fx2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C45A38D6-BED6-4FEF-AD87-A1E813695DE0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9336c-fx2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1FC2B1F-232E-4754-8076-CC82F3648730",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9336c-fx2-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CDD27C9-5EAF-4956-8AB7-740C84C9D4FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9336pq:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F1127D2-12C0-454F-91EF-5EE334070D06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9336pq_aci:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D6EB963-E0F2-4A02-8765-AB2064BE19E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "785FD17C-F32E-4042-9DDE-A89B3AAE0334",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9336pq_aci_spine_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEAAF99B-5406-4722-81FB-A91CBAC2DF41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9348d-gx2a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "73DC1E93-561E-490C-AE0E-B02BAB9A7C8E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9348gc-fx3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12DA2DE5-8ADA-4D6A-BC1A-9C06FA163B1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9348gc-fxp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "17C7E3DB-8E1A-47AD-B1C5-61747DC0CFB9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93600cd-gx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CF467E2-4567-426E-8F48-39669E0F514C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9364c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "63842B25-8C32-4988-BBBD-61E9CB09B4F3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9364c-gx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68EA1FEF-B6B6-49FE-A0A4-5387F76303F8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9364d-gx2a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "40D6DB7F-C025-4971-9615-73393ED61078",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4364ADB9-8162-451D-806A-B98924E6B2CF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9372px-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B53BCB42-ED61-4FCF-8068-CB467631C63C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9372px-e_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "737C724A-B6CD-4FF7-96E0-EBBF645D660E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9372px_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7067AEC7-DFC8-4437-9338-C5165D9A8F36",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "49E0371B-FDE2-473C-AA59-47E1269D050F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9372tx-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "489D11EC-5A18-4F32-BC7C-AC1FCEC27222",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9372tx-e_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "71D4CF15-B293-4403-A1A9-96AD3933BAEF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9372tx_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DBCC1515-2DBE-4DF2-8E83-29A869170F36",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BC5293E-F2B4-46DC-85DA-167EA323FCFD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9396px_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7282AAFF-ED18-4992-AC12-D953C35EC328",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA022E77-6557-4A33-9A3A-D028E2DB669A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9396tx_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "360409CC-4172-4878-A76B-EA1C1F8C7A79",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9408:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8D5D5E2-B40B-475D-9EF3-8441016E37E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9432pq:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDA8E1F0-74A6-4725-B6AA-A1112EFC5D0C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "63BE0266-1C00-4D6A-AD96-7F82532ABAA7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9500_16-slot:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "73F59A4B-AE92-4533-8EDC-D1DD850309FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9500_4-slot:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "492A2C86-DD38-466B-9965-77629A73814F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9500_8-slot:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1FB7AA46-4018-4925-963E-719E1037F759",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9500_supervisor_a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "31B9D1E4-10B9-4B6F-B848-D93ABF6486D6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9500_supervisor_a\\+:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB270C45-756E-400A-979F-D07D750C881A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9500_supervisor_b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E8A085C-2DBA-4269-AB01-B16019FBB4DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9500_supervisor_b\\+:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A79DD582-AF68-44F1-B640-766B46EF2BE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9500r:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B04484DA-AA59-4833-916E-6A8C96D34F0D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "768BE390-5ED5-48A7-9E80-C4DE8BA979B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9504_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D07B5399-44C7-468D-9D57-BB5B5E26CE50",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDC2F709-AFBE-48EA-A3A2-DA1134534FB6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9508_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B76FB64F-16F0-4B0B-B304-B46258D434BA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E02DC82-0D26-436F-BA64-73C958932B0A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9516_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E128053-834B-4DD5-A517-D14B4FC2B56F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9536pq:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "163743A1-09E7-4EC5-8ECA-79E4B9CE173B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9636pq:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE340E4C-DC48-4FC8-921B-EE304DB5AE0A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9716d-gx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C367BBE0-D71F-4CB5-B50E-72B033E73FE1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9736pq:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85E1D224-4751-4233-A127-A041068C804A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD31B075-01B1-429E-83F4-B999356A0EB9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9804:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A10C9C0A-C96A-4B45-90D0-6ED457EB5F4C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9808:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3284D16F-3275-4F8D-8AE4-D413DE19C4FA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.",
      },
      {
         lang: "es",
         value: "El protocolo HTTP/2 permite una denegación de servicio (consumo de recursos del servidor) porque la cancelación de solicitudes puede restablecer muchas transmisiones rápidamente, como se explotó en la naturaleza entre agosto y octubre de 2023.",
      },
   ],
   id: "CVE-2023-44487",
   lastModified: "2025-03-07T19:15:36.157",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-10-10T14:15:10.883",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.openwall.com/lists/oss-security/2023/10/10/6",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.openwall.com/lists/oss-security/2023/10/10/7",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2023/10/13/4",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2023/10/13/9",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2023/10/18/4",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2023/10/18/8",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2023/10/19/6",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "http://www.openwall.com/lists/oss-security/2023/10/20/8",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://access.redhat.com/security/cve/cve-2023-44487",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Press/Media Coverage",
            "Third Party Advisory",
         ],
         url: "https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://aws.amazon.com/security/security-bulletins/AWS-2023-011/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Technical Description",
            "Vendor Advisory",
         ],
         url: "https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "Vendor Advisory",
         ],
         url: "https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Press/Media Coverage",
            "Third Party Advisory",
         ],
         url: "https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://blog.vespa.ai/cve-2023-44487/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://bugzilla.proxmox.com/show_bug.cgi?id=4988",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=2242803",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://bugzilla.suse.com/show_bug.cgi?id=1216123",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Technical Description",
            "Vendor Advisory",
         ],
         url: "https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Technical Description",
            "Vendor Advisory",
         ],
         url: "https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Technical Description",
            "Third Party Advisory",
         ],
         url: "https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/Azure/AKS/issues/3947",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/Kong/kong/discussions/11741",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://github.com/advisories/GHSA-qppj-fm5r-hxr3",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mitigation",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://github.com/advisories/GHSA-vx74-f528-fxqg",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://github.com/advisories/GHSA-xpw8-rcwv-8f8p",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/akka/akka-http/issues/4323",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/alibaba/tengine/issues/1872",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/apache/apisix/issues/10320",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/apache/httpd-site/pull/10",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Product",
         ],
         url: "https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Product",
            "Third Party Advisory",
         ],
         url: "https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/apache/trafficserver/pull/10564",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://github.com/bcdannyboy/CVE-2023-44487",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://github.com/caddyserver/caddy/issues/5877",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Release Notes",
            "Third Party Advisory",
         ],
         url: "https://github.com/caddyserver/caddy/releases/tag/v2.7.5",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "https://github.com/dotnet/announcements/issues/277",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Product",
            "Release Notes",
         ],
         url: "https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/eclipse/jetty.project/issues/10679",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/envoyproxy/envoy/pull/30055",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/etcd-io/etcd/issues/16740",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/facebook/proxygen/pull/466",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/golang/go/issues/63417",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/grpc/grpc-go/pull/6703",
      },
      {
         source: "cve@mitre.org",
         url: "https://github.com/grpc/grpc/releases/tag/v1.59.2",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/h2o/h2o/pull/3291",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/haproxy/haproxy/issues/2312",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Product",
         ],
         url: "https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/junkurihara/rust-rpxy/issues/97",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/kazu-yamamoto/http2/issues/93",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/kubernetes/kubernetes/pull/121120",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/line/armeria/pull/5232",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://github.com/micrictor/http2-rst-stream",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/microsoft/CBL-Mariner/pull/6381",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/nghttp2/nghttp2/pull/1961",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Release Notes",
         ],
         url: "https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/ninenines/cowboy/issues/1615",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/nodejs/node/pull/50121",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/openresty/openresty/issues/930",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/opensearch-project/data-prepper/issues/3474",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/oqtane/oqtane.framework/discussions/3367",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/projectcontour/contour/pull/5826",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/tempesta-tech/tempesta/issues/1986",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/varnishcache/varnish-cache/issues/3996",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://istio.io/latest/news/security/istio-security-2023-004/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00045.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00047.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2023/11/msg00012.html",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mitigation",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://my.f5.com/manage/s/article/K000137106",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://netty.io/news/2023/10/10/4-1-100-Final.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://news.ycombinator.com/item?id=37830987",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Press/Media Coverage",
         ],
         url: "https://news.ycombinator.com/item?id=37830998",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://news.ycombinator.com/item?id=37831062",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
         ],
         url: "https://news.ycombinator.com/item?id=37837043",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.gentoo.org/glsa/202311-09",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20231016-0001/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20240426-0007/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20240621-0006/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20240621-0007/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://security.paloaltonetworks.com/CVE-2023-44487",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Release Notes",
         ],
         url: "https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://ubuntu.com/security/CVE-2023-44487",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Press/Media Coverage",
            "Third Party Advisory",
         ],
         url: "https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Vendor Advisory",
         ],
         url: "https://www.debian.org/security/2023/dsa-5521",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Vendor Advisory",
         ],
         url: "https://www.debian.org/security/2023/dsa-5522",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2023/dsa-5540",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2023/dsa-5549",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2023/dsa-5558",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2023/dsa-5570",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "Vendor Advisory",
         ],
         url: "https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://www.openwall.com/lists/oss-security/2023/10/10/6",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Press/Media Coverage",
         ],
         url: "https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Press/Media Coverage",
            "Third Party Advisory",
         ],
         url: "https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2023/10/13/4",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2023/10/13/9",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2023/10/18/4",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2023/10/18/8",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2023/10/19/6",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "http://www.openwall.com/lists/oss-security/2023/10/20/8",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://access.redhat.com/security/cve/cve-2023-44487",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Press/Media Coverage",
            "Third Party Advisory",
         ],
         url: "https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://aws.amazon.com/security/security-bulletins/AWS-2023-011/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Technical Description",
            "Vendor Advisory",
         ],
         url: "https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "Vendor Advisory",
         ],
         url: "https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Press/Media Coverage",
            "Third Party Advisory",
         ],
         url: "https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://blog.vespa.ai/cve-2023-44487/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://bugzilla.proxmox.com/show_bug.cgi?id=4988",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=2242803",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://bugzilla.suse.com/show_bug.cgi?id=1216123",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Technical Description",
            "Vendor Advisory",
         ],
         url: "https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Technical Description",
            "Vendor Advisory",
         ],
         url: "https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Technical Description",
            "Third Party Advisory",
         ],
         url: "https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/Azure/AKS/issues/3947",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/Kong/kong/discussions/11741",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://github.com/advisories/GHSA-qppj-fm5r-hxr3",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://github.com/advisories/GHSA-vx74-f528-fxqg",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://github.com/advisories/GHSA-xpw8-rcwv-8f8p",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/akka/akka-http/issues/4323",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/alibaba/tengine/issues/1872",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/apache/apisix/issues/10320",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/apache/httpd-site/pull/10",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Product",
         ],
         url: "https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Product",
            "Third Party Advisory",
         ],
         url: "https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/apache/trafficserver/pull/10564",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://github.com/bcdannyboy/CVE-2023-44487",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://github.com/caddyserver/caddy/issues/5877",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
            "Third Party Advisory",
         ],
         url: "https://github.com/caddyserver/caddy/releases/tag/v2.7.5",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "https://github.com/dotnet/announcements/issues/277",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Product",
            "Release Notes",
         ],
         url: "https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/eclipse/jetty.project/issues/10679",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/envoyproxy/envoy/pull/30055",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/etcd-io/etcd/issues/16740",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/facebook/proxygen/pull/466",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/golang/go/issues/63417",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/grpc/grpc-go/pull/6703",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/h2o/h2o/pull/3291",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/haproxy/haproxy/issues/2312",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Product",
         ],
         url: "https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/junkurihara/rust-rpxy/issues/97",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/kazu-yamamoto/http2/issues/93",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/kubernetes/kubernetes/pull/121120",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/line/armeria/pull/5232",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://github.com/micrictor/http2-rst-stream",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/microsoft/CBL-Mariner/pull/6381",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/nghttp2/nghttp2/pull/1961",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
         ],
         url: "https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/ninenines/cowboy/issues/1615",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/nodejs/node/pull/50121",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/openresty/openresty/issues/930",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/opensearch-project/data-prepper/issues/3474",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/oqtane/oqtane.framework/discussions/3367",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
         ],
         url: "https://github.com/projectcontour/contour/pull/5826",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/tempesta-tech/tempesta/issues/1986",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://github.com/varnishcache/varnish-cache/issues/3996",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://istio.io/latest/news/security/istio-security-2023-004/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00045.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00047.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2023/11/msg00012.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://my.f5.com/manage/s/article/K000137106",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://netty.io/news/2023/10/10/4-1-100-Final.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://news.ycombinator.com/item?id=37830987",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Press/Media Coverage",
         ],
         url: "https://news.ycombinator.com/item?id=37830998",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://news.ycombinator.com/item?id=37831062",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://news.ycombinator.com/item?id=37837043",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.gentoo.org/glsa/202311-09",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20231016-0001/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20240426-0007/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20240621-0006/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20240621-0007/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://security.paloaltonetworks.com/CVE-2023-44487",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
         ],
         url: "https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://ubuntu.com/security/CVE-2023-44487",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Press/Media Coverage",
            "Third Party Advisory",
         ],
         url: "https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Vendor Advisory",
         ],
         url: "https://www.debian.org/security/2023/dsa-5521",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Vendor Advisory",
         ],
         url: "https://www.debian.org/security/2023/dsa-5522",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2023/dsa-5540",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2023/dsa-5549",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2023/dsa-5558",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2023/dsa-5570",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "Vendor Advisory",
         ],
         url: "https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://www.openwall.com/lists/oss-security/2023/10/10/6",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Press/Media Coverage",
         ],
         url: "https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Press/Media Coverage",
            "Third Party Advisory",
         ],
         url: "https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.vicarius.io/vsociety/posts/rapid-reset-cve-2023-44487-dos-in-http2-understanding-the-root-cause",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Undergoing Analysis",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-400",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2016-01-12 19:59
Modified
2024-11-21 02:38
Severity ?
Summary
The idle stream handling in nghttp2 before 1.6.0 allows attackers to have unspecified impact via unknown vectors, aka a heap-use-after-free bug.
References
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2016-January/175085.html
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2016-January/175423.html
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2015/12/23/10
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2015/12/23/6
cve@mitre.orghttp://www.securitytracker.com/id/1035353
cve@mitre.orghttps://nghttp2.org/blog/2015/12/23/nghttp2-v1-6-0/Patch, Vendor Advisory
cve@mitre.orghttps://security.gentoo.org/glsa/201612-06
cve@mitre.orghttps://support.apple.com/HT206166Vendor Advisory
cve@mitre.orghttps://support.apple.com/HT206167Vendor Advisory
cve@mitre.orghttps://support.apple.com/HT206168Vendor Advisory
cve@mitre.orghttps://support.apple.com/HT206169Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175085.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175423.html
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2015/12/23/10
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2015/12/23/6
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1035353
af854a3a-2127-422b-91ae-364da2661108https://nghttp2.org/blog/2015/12/23/nghttp2-v1-6-0/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201612-06
af854a3a-2127-422b-91ae-364da2661108https://support.apple.com/HT206166Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://support.apple.com/HT206167Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://support.apple.com/HT206168Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://support.apple.com/HT206169Vendor Advisory
Impacted products
Vendor Product Version
apple mac_os_x *
nghttp2 nghttp2 *
apple iphone_os *
apple tvos *
apple watchos *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3C6DA6A-9C87-4B7B-A52D-A66276B5DE82",
                     versionEndIncluding: "10.11.3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:nghttp2:nghttp2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "59431EFB-2ABD-459B-9080-BF26FFC6F41B",
                     versionEndIncluding: "1.5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "080450EA-85C1-454D-98F9-5286D69CF237",
                     versionEndIncluding: "9.2.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B7CF16CB-120B-4FC0-B7A2-2FCD3324EA8A",
                     versionEndIncluding: "9.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FBF14807-BA21-480B-9ED0-A6D53352E87F",
                     versionEndIncluding: "2.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The idle stream handling in nghttp2 before 1.6.0 allows attackers to have unspecified impact via unknown vectors, aka a heap-use-after-free bug.",
      },
      {
         lang: "es",
         value: "El manejo de flujo de datos en reposo en nghttp2 en versiones anteriores a 1.6.0 permite atacantes tener un impacto no especificado a través de vectores desconocidos, también conocido como error de uso después de liberación de memoria dinámica.",
      },
   ],
   id: "CVE-2015-8659",
   lastModified: "2024-11-21T02:38:54.840",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: true,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 10,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 10,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2016-01-12T19:59:13.223",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175085.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175423.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.openwall.com/lists/oss-security/2015/12/23/10",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.openwall.com/lists/oss-security/2015/12/23/6",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securitytracker.com/id/1035353",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://nghttp2.org/blog/2015/12/23/nghttp2-v1-6-0/",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.gentoo.org/glsa/201612-06",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://support.apple.com/HT206166",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://support.apple.com/HT206167",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://support.apple.com/HT206168",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://support.apple.com/HT206169",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175085.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175423.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.openwall.com/lists/oss-security/2015/12/23/10",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.openwall.com/lists/oss-security/2015/12/23/6",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id/1035353",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://nghttp2.org/blog/2015/12/23/nghttp2-v1-6-0/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.gentoo.org/glsa/201612-06",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://support.apple.com/HT206166",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://support.apple.com/HT206167",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://support.apple.com/HT206168",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://support.apple.com/HT206169",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-07-13 21:15
Modified
2024-11-21 08:09
Summary
Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy’s HTTP/2 codec may leak a header map and bookkeeping structures upon receiving `RST_STREAM` immediately followed by the `GOAWAY` frames from an upstream server. In nghttp2, cleanup of pending requests due to receipt of the `GOAWAY` frame skips de-allocation of the bookkeeping structure and pending compressed header. The error return [code path] is taken if connection is already marked for not sending more requests due to `GOAWAY` frame. The clean-up code is right after the return statement, causing memory leak. Denial of service through memory exhaustion. This vulnerability was patched in versions(s) 1.26.3, 1.25.8, 1.24.9, 1.23.11.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6229C1E0-69F5-49E0-AECC-F98E792E06F4",
                     versionEndExcluding: "1.23.11",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E48F872E-5893-4F65-AB15-CA5E9240FD48",
                     versionEndExcluding: "1.24.9",
                     versionStartIncluding: "1.24.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A8C39F9-39D8-475E-BF5D-52DF8435C02D",
                     versionEndExcluding: "1.25.8",
                     versionStartIncluding: "1.25.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E208BBEC-FFAC-4513-AF33-45029CC8E0F3",
                     versionEndExcluding: "1.26.3",
                     versionStartIncluding: "1.26.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:nghttp2:nghttp2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BE13342-76A9-4B62-941D-39C1FE18E19D",
                     versionEndExcluding: "1.55.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy’s HTTP/2 codec may leak a header map and bookkeeping structures upon receiving `RST_STREAM` immediately followed by the `GOAWAY` frames from an upstream server. In nghttp2, cleanup of pending requests due to receipt of the `GOAWAY` frame skips de-allocation of the bookkeeping structure and pending compressed header. The error return [code path] is taken if connection is already marked for not sending more requests due to `GOAWAY` frame. The clean-up code is right after the return statement, causing memory leak. Denial of service through memory exhaustion. This vulnerability was patched in versions(s) 1.26.3, 1.25.8, 1.24.9, 1.23.11.",
      },
   ],
   id: "CVE-2023-35945",
   lastModified: "2024-11-21T08:09:01.860",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "security-advisories@github.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-07-13T21:15:08.880",
   references: [
      {
         source: "security-advisories@github.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://github.com/envoyproxy/envoy/security/advisories/GHSA-jfxv-29pc-x22r",
      },
      {
         source: "security-advisories@github.com",
         tags: [
            "Product",
         ],
         url: "https://github.com/nghttp2/nghttp2/blob/e7f59406556c80904b81b593d38508591bb7523a/lib/nghttp2_session.c#L3346",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://github.com/envoyproxy/envoy/security/advisories/GHSA-jfxv-29pc-x22r",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Product",
         ],
         url: "https://github.com/nghttp2/nghttp2/blob/e7f59406556c80904b81b593d38508591bb7523a/lib/nghttp2_session.c#L3346",
      },
   ],
   sourceIdentifier: "security-advisories@github.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-400",
            },
         ],
         source: "security-advisories@github.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-459",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

var-201704-0784
Vulnerability from variot

An issue was discovered in certain Apple products. iOS before 10.3 is affected. macOS before 10.12.4 is affected. tvOS before 10.2 is affected. watchOS before 3.2 is affected. The issue involves nghttp2 before 1.17.0 in the "HTTPProtocol" component. It allows remote HTTP/2 servers to have an unspecified impact via unknown vectors. plural Apple Product HTTPProtocol Components include nghttp2 Vulnerabilities that are unspecified are present due to incomplete processing.Remote HTTP/2 The server may have unspecified effects. iOS is a mobile operating system developed by Apple. Apple first announced this system at the Macworld conference on January 9, 2007. It was originally designed for the iPhone and later applied to iPod touch, iPad and Apple TV. tvOS is a system developed by Apple. Based on iOS, tvOS is an operating system designed specifically for the fourth generation of Apple TV. Mac OS is a set of operating systems running on Apple's Macintosh series of computers. watchOS is a mobile operating system for Apple Watch developed by Apple. It is based on the iOS operating system and has many similar functions. Nghttp2 is prone to multiple remote security vulnerabilities. An attacker can leverage these issues to bypass security restrictions and perform unauthorized actions. This may aid in further attacks. Versions prior to Nghttp2 1.17.0 are vulnerable. HTTPProtocol is one of the implementations that forces browsers to use compatibility mode. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512

APPLE-SA-2017-03-27-5 watchOS 3.2

watchOS 3.2 is now available and addresses the following:

Audio Available for: All Apple Watch models Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution Description: A memory corruption issue was addressed through improved input validation. CVE-2017-2430: an anonymous researcher working with Trend Microas Zero Day Initiative CVE-2017-2462: an anonymous researcher working with Trend Microas Zero Day Initiative

Carbon Available for: All Apple Watch models Impact: Processing a maliciously crafted .dfont file may lead to arbitrary code execution Description: A buffer overflow existed in the handling of font files. This issue was addressed through improved bounds checking. CVE-2017-2379: John Villamil, Doyensec, riusksk (ae3aY=) of Tencent Security Platform Department

CoreGraphics Available for: All Apple Watch models Impact: Processing a maliciously crafted image may lead to a denial of service Description: An infinite recursion was addressed through improved state management. CVE-2017-2417: riusksk (ae3aY=) of Tencent Security Platform Department

CoreGraphics Available for: All Apple Watch models Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: Multiple memory corruption issues were addressed through improved input validation. CVE-2017-2444: Mei Wang of 360 GearTeam

CoreText Available for: All Apple Watch models Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: A memory corruption issue was addressed through improved input validation. CVE-2017-2435: John Villamil, Doyensec

CoreText Available for: All Apple Watch models Impact: Processing a maliciously crafted font may result in the disclosure of process memory Description: An out-of-bounds read was addressed through improved input validation. CVE-2017-2450: John Villamil, Doyensec

CoreText Available for: All Apple Watch models Impact: Processing a maliciously crafted text message may lead to application denial of service Description: A resource exhaustion issue was addressed through improved input validation. CVE-2017-2461: Isaac Archambault of IDAoADI, an anonymous researcher

FontParser Available for: All Apple Watch models Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: Multiple memory corruption issues were addressed through improved input validation. CVE-2017-2406: riusksk (ae3aY=) of Tencent Security Platform Department CVE-2017-2487: riusksk (ae3aY=) of Tencent Security Platform Department

FontParser Available for: All Apple Watch models Impact: Parsing a maliciously crafted font file may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues were addressed through improved input validation. CVE-2017-2407: riusksk (ae3aY=) of Tencent Security Platform Department

FontParser Available for: All Apple Watch models Impact: Processing a maliciously crafted font may result in the disclosure of process memory Description: An out-of-bounds read was addressed through improved input validation. CVE-2017-2439: John Villamil, Doyensec

HTTPProtocol Available for: All Apple Watch models Impact: A malicious HTTP/2 server may be able to cause undefined behavior Description: Multiple issues existed in nghttp2 before 1.17.0. These were addressed by updating LibreSSL to version 1.17.0. CVE-2017-2428

ImageIO Available for: All Apple Watch models Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: A memory corruption issue was addressed through improved input validation. CVE-2017-2416: Qidan He (a1/2ae*a,1, @flanker_hqd) of KeenLab, Tencent

ImageIO Available for: All Apple Watch models Impact: Viewing a maliciously crafted JPEG file may lead to arbitrary code execution Description: A memory corruption issue was addressed through improved input validation. CVE-2017-2432: an anonymous researcher working with Trend Micro's Zero Day Initiative

ImageIO Available for: All Apple Watch models Impact: Processing a maliciously crafted file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue was addressed through improved input validation. CVE-2017-2467

ImageIO Available for: All Apple Watch models Impact: Processing a maliciously crafted image may lead to unexpected application termination Description: An out-of-bound read existed in LibTIFF versions before 4.0.7. This was addressed by updating LibTIFF in ImageIO to version 4.0.7. CVE-2016-3619

Kernel Available for: All Apple Watch models Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed through improved input validation. CVE-2017-2401: Lufeng Li of Qihoo 360 Vulcan Team

Kernel Available for: All Apple Watch models Impact: An application may be able to execute arbitrary code with kernel privileges Description: An integer overflow was addressed through improved input validation. CVE-2017-2440: an anonymous researcher

Kernel Available for: All Apple Watch models Impact: A malicious application may be able to execute arbitrary code with root privileges Description: A race condition was addressed through improved memory handling. CVE-2017-2456: lokihardt of Google Project Zero

Kernel Available for: All Apple Watch models Impact: An application may be able to execute arbitrary code with kernel privileges Description: A use after free issue was addressed through improved memory management. CVE-2017-2472: Ian Beer of Google Project Zero

Kernel Available for: All Apple Watch models Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed through improved input validation. CVE-2017-2473: Ian Beer of Google Project Zero

Kernel Available for: All Apple Watch models Impact: An application may be able to execute arbitrary code with kernel privileges Description: An off-by-one issue was addressed through improved bounds checking. CVE-2017-2474: Ian Beer of Google Project Zero

Kernel Available for: All Apple Watch models Impact: An application may be able to execute arbitrary code with kernel privileges Description: A race condition was addressed through improved locking. CVE-2017-2478: Ian Beer of Google Project Zero

Kernel Available for: All Apple Watch models Impact: An application may be able to execute arbitrary code with kernel privileges Description: A buffer overflow issue was addressed through improved memory handling. CVE-2017-2482: Ian Beer of Google Project Zero CVE-2017-2483: Ian Beer of Google Project Zero

Keyboards Available for: All Apple Watch models Impact: An application may be able to execute arbitrary code Description: A buffer overflow was addressed through improved bounds checking. CVE-2017-2458: Shashank (@cyberboyIndia)

libarchive Available for: All Apple Watch models Impact: A local attacker may be able to change file system permissions on arbitrary directories Description: A validation issue existed in the handling of symlinks. This issue was addressed through improved validation of symlinks. CVE-2017-2390: Omer Medan of enSilo Ltd

libc++abi Available for: All Apple Watch models Impact: Demangling a malicious C++ application may lead to arbitrary code execution Description: A use after free issue was addressed through improved memory management. CVE-2017-2441

Security Available for: All Apple Watch models Impact: An application may be able to execute arbitrary code with root privileges Description: A buffer overflow was addressed through improved bounds checking. CVE-2017-2451: Alex Radocea of Longterm Security, Inc.

Security Available for: All Apple Watch models Impact: Processing a maliciously crafted x509 certificate may lead to arbitrary code execution Description: A memory corruption issue existed in the parsing of certificates. This issue was addressed through improved input validation. CVE-2017-2485: Aleksandar Nikolic of Cisco Talos

WebKit Available for: All Apple Watch models Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A type confusion issue was addressed through improved memory handling. CVE-2017-2415: Kai Kang of Tencent's Xuanwu Lab (tentcent.com)

WebKit Available for: All Apple Watch models Impact: Processing maliciously crafted web content may lead to high memory consumption Description: An uncontrolled resource consumption issue was addressed through improved regex processing. CVE-2016-9643: Gustavo Grieco

WebKit Available for: All Apple Watch models Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A use after free issue was addressed through improved memory management. CVE-2017-2471: Ivan Fratric of Google Project Zero

Installation note:

Instructions on how to update your Apple Watch software are available at https://support.apple.com/kb/HT204641

To check the version on your Apple Watch, open the Apple Watch app on your iPhone and select "My Watch > General > About".

Alternatively, on your watch, select "My Watch > General > About".

Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222

This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Comment: GPGTools - http://gpgtools.org

iQIcBAEBCgAGBQJY2Yo7AAoJEIOj74w0bLRGnz8P/2pCIIMej7VvKEMeeOblPHII ZwaSR8nzRIlL5IsPgPcq/e2vkZoyPs3ee5dQGX4yJTgzEY0FuD1S/NxeFntxFlzm 8Ei+PQJco8xdZtlL1HXjg+UlY0HAm1TJGYyriDPjbJiqCBRktv3ta/uzJY+yvXK8 3KtO0PXmEGFod9eyQZIRqFZ6GLxNdeFIxabp1SkOoiGk29jC3E9YjgR5qldMAjfN AuYWiBBhMOmal8dbnamtcJh93ElzuXX77cCUlw7wQMz6NaqNS3FWaGEUHsxn6y/4 P8XIfwYAaoWhaCJpEari+GkxmmuXmtbuKyMTDQqCWQyG3ThkYDk6kKQNcQMDbxnh pcyEB7WI9sRQ7CoFH7rmyl8BqQr4Ys0uGPtRDvCVO91kNUMYXeBiNC+StyqWt6Wd 3p/QUxYnM+kG8Zd0lMEaF3LNolr1w54APxMYD3sW3/tOmf8C7d6+qGTGlrumizkD Z0zr/xRNNpd0m4PVmlNt7YJMjN6s1xJwpEUC1n4FyRifdQktqsKMrumq7VGplHYO VNKToB3BuHHjTi2HOocvUXfj55htqrCxETEyHD7NhKVpLEf15vDgyXKFGgF95/HR gomW+ApttZNiz/vOOoI9DL2ZSOnwzo5uO8W4GYSpDpQ36YaYQj/jei2MgtVqqKo+ bNi/H1Oquz40IhKoGR/B =4Uvv -----END PGP SIGNATURE-----

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201704-0784",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "mac os x",
            scope: "eq",
            trust: 1.4,
            vendor: "apple",
            version: "10.12.3",
         },
         {
            model: "iphone os",
            scope: "lte",
            trust: 1,
            vendor: "apple",
            version: "10.2.1",
         },
         {
            model: "tvos",
            scope: "lte",
            trust: 1,
            vendor: "apple",
            version: "10.1.1",
         },
         {
            model: "watchos",
            scope: "lte",
            trust: 1,
            vendor: "apple",
            version: "3.1.3",
         },
         {
            model: "mac os x",
            scope: "lte",
            trust: 1,
            vendor: "apple",
            version: "10.12.3",
         },
         {
            model: "watchos",
            scope: "eq",
            trust: 0.9,
            vendor: "apple",
            version: "3.1.3",
         },
         {
            model: "ios",
            scope: "lt",
            trust: 0.8,
            vendor: "apple",
            version: "10.3   (ipad first  4 after generation )",
         },
         {
            model: "ios",
            scope: "lt",
            trust: 0.8,
            vendor: "apple",
            version: "10.3   (iphone 5 or later )",
         },
         {
            model: "ios",
            scope: "lt",
            trust: 0.8,
            vendor: "apple",
            version: "10.3   (ipod touch first  6 after generation )",
         },
         {
            model: "tvos",
            scope: "lt",
            trust: 0.8,
            vendor: "apple",
            version: "10.2   (apple tv first  4 generation )",
         },
         {
            model: "watchos",
            scope: "lt",
            trust: 0.8,
            vendor: "apple",
            version: "3.2   (apple watch all models )",
         },
         {
            model: "ios",
            scope: "lt",
            trust: 0.6,
            vendor: "apple",
            version: "10.3",
         },
         {
            model: "macos",
            scope: "lt",
            trust: 0.6,
            vendor: "apple",
            version: "10.12.4",
         },
         {
            model: "tvos",
            scope: "lt",
            trust: 0.6,
            vendor: "apple",
            version: "10.2",
         },
         {
            model: "watchos",
            scope: "lt",
            trust: 0.6,
            vendor: "apple",
            version: "3.2",
         },
         {
            model: "tv",
            scope: "eq",
            trust: 0.6,
            vendor: "apple",
            version: "10.1.1",
         },
         {
            model: "iphone os",
            scope: "eq",
            trust: 0.6,
            vendor: "apple",
            version: "10.2.1",
         },
         {
            model: "libressl",
            scope: "eq",
            trust: 0.3,
            vendor: "openbsd",
            version: null,
         },
         {
            model: "nghttp2",
            scope: "eq",
            trust: 0.3,
            vendor: "nghttp2",
            version: "1.16.1",
         },
         {
            model: "nghttp2",
            scope: "eq",
            trust: 0.3,
            vendor: "nghttp2",
            version: "1.6",
         },
         {
            model: "nghttp2",
            scope: "eq",
            trust: 0.3,
            vendor: "nghttp2",
            version: "1.5",
         },
         {
            model: "nghttp2",
            scope: "eq",
            trust: 0.3,
            vendor: "nghttp2",
            version: "1.7.1",
         },
         {
            model: "watchos",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "10.1.1",
         },
         {
            model: "watchos",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "3.1.1",
         },
         {
            model: "watchos",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "2.2.2",
         },
         {
            model: "watchos",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "2.2.1",
         },
         {
            model: "watchos",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "2.0.1",
         },
         {
            model: "watchos",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "1.0.1",
         },
         {
            model: "watchos",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "3.1",
         },
         {
            model: "watchos",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "3.0",
         },
         {
            model: "watchos",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "2.2",
         },
         {
            model: "watchos",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "2.1",
         },
         {
            model: "watchos",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "2.0",
         },
         {
            model: "watchos",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "1.0",
         },
         {
            model: "watch",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "0",
         },
         {
            model: "tvos",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "10.1.1",
         },
         {
            model: "tvos",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "10.0.1",
         },
         {
            model: "tvos",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "9.2.2",
         },
         {
            model: "tvos",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "9.2.1",
         },
         {
            model: "tvos",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "9.1.1",
         },
         {
            model: "tvos",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "9.2",
         },
         {
            model: "tvos",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "9.1",
         },
         {
            model: "tvos",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "9.0",
         },
         {
            model: "tvos",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "10.1",
         },
         {
            model: "tvos",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "10",
         },
         {
            model: "tv",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "0",
         },
         {
            model: "macos",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "10.12.3",
         },
         {
            model: "ipod touch",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "0",
         },
         {
            model: "iphone",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "0",
         },
         {
            model: "ipad",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "0",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "50",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "40",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "30",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "10.2.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "10.0.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "9.3.4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "9.3.3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "9.3.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "9.3.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "9.2.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "9.0.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "9.0.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "8.4.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "7.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "7.0.6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "7.0.5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "7.0.3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "7.0.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "7.0.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "6.3.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "6.1.6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "6.1.4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "6.1.3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.2.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.0.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.0.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "3.2.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "3.2.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "9.3.5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "9.3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "9.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "9.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "9",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "8.4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "8.3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "8.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "8.1.3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "8.1.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "8.1.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "8.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "8",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "7.1.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "7.1.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "7.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "7.0.4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "7",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "6.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "6.0.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "6.0.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "5.1.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "5.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "5.0.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.3.5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.3.4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.3.3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.3.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.3.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.2.9",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.2.8",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.2.7",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.2.6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.2.5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.2.10",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "3.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "3.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "2.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "2.0",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "10.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "10.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "10",
         },
         {
            model: "nghttp2",
            scope: "ne",
            trust: 0.3,
            vendor: "nghttp2",
            version: "1.17",
         },
         {
            model: "watchos",
            scope: "ne",
            trust: 0.3,
            vendor: "apple",
            version: "3.2",
         },
         {
            model: "tvos",
            scope: "ne",
            trust: 0.3,
            vendor: "apple",
            version: "10.2",
         },
         {
            model: "security update yosemite",
            scope: "ne",
            trust: 0.3,
            vendor: "apple",
            version: "2017-0010",
         },
         {
            model: "security update el capitan",
            scope: "ne",
            trust: 0.3,
            vendor: "apple",
            version: "2017-0010",
         },
         {
            model: "macos",
            scope: "ne",
            trust: 0.3,
            vendor: "apple",
            version: "10.12.4",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "apple",
            version: "10.3",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-04876",
         },
         {
            db: "BID",
            id: "97146",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-002357",
         },
         {
            db: "NVD",
            id: "CVE-2017-2428",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201703-1267",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "3.1.3",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "10.1.1",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "10.2.1",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "10.12.3",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2017-2428",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The vendor reported this issue.",
      sources: [
         {
            db: "BID",
            id: "97146",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2017-2428",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 7.5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 7.5,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2017-2428",
                  impactScore: null,
                  integrityImpact: "Partial",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 7.5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "CNVD-2017-04876",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  severity: "HIGH",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 7.5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "VHN-110631",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 9.8,
                  baseSeverity: "CRITICAL",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 3.9,
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 9.8,
                  baseSeverity: "Critical",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2017-2428",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2017-2428",
                  trust: 1.8,
                  value: "CRITICAL",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2017-04876",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201703-1267",
                  trust: 0.6,
                  value: "CRITICAL",
               },
               {
                  author: "VULHUB",
                  id: "VHN-110631",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-04876",
         },
         {
            db: "VULHUB",
            id: "VHN-110631",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-002357",
         },
         {
            db: "NVD",
            id: "CVE-2017-2428",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201703-1267",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "An issue was discovered in certain Apple products. iOS before 10.3 is affected. macOS before 10.12.4 is affected. tvOS before 10.2 is affected. watchOS before 3.2 is affected. The issue involves nghttp2 before 1.17.0 in the \"HTTPProtocol\" component. It allows remote HTTP/2 servers to have an unspecified impact via unknown vectors. plural Apple Product HTTPProtocol Components include nghttp2 Vulnerabilities that are unspecified are present due to incomplete processing.Remote HTTP/2 The server may have unspecified effects. iOS is a mobile operating system developed by Apple. Apple first announced this system at the Macworld conference on January 9, 2007. It was originally designed for the iPhone and later applied to iPod touch, iPad and Apple TV. tvOS is a system developed by Apple. Based on iOS, tvOS is an operating system designed specifically for the fourth generation of Apple TV. Mac OS is a set of operating systems running on Apple's Macintosh series of computers. watchOS is a mobile operating system for Apple Watch developed by Apple. It is based on the iOS operating system and has many similar functions. Nghttp2 is prone to multiple remote security vulnerabilities. \nAn attacker can leverage these issues to bypass security restrictions and perform unauthorized actions. This may aid in further attacks. \nVersions prior to Nghttp2 1.17.0 are vulnerable. HTTPProtocol is one of the implementations that forces browsers to use compatibility mode. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\nAPPLE-SA-2017-03-27-5 watchOS 3.2\n\nwatchOS 3.2 is now available and addresses the following:\n\nAudio\nAvailable for:  All Apple Watch models\nImpact: Processing a maliciously crafted audio file may lead to\narbitrary code execution\nDescription: A memory corruption issue was addressed through improved\ninput validation. \nCVE-2017-2430: an anonymous researcher working with Trend Microas\nZero Day Initiative\nCVE-2017-2462: an anonymous researcher working with Trend Microas\nZero Day Initiative\n\nCarbon\nAvailable for:  All Apple Watch models\nImpact: Processing a maliciously crafted .dfont file may lead to\narbitrary code execution\nDescription: A buffer overflow existed in the handling of font files. \nThis issue was addressed through improved bounds checking. \nCVE-2017-2379: John Villamil, Doyensec, riusksk (ae3aY=) of Tencent\nSecurity Platform Department\n\nCoreGraphics\nAvailable for:  All Apple Watch models\nImpact: Processing a maliciously crafted image may lead to a denial\nof service\nDescription: An infinite recursion was addressed through improved\nstate management. \nCVE-2017-2417: riusksk (ae3aY=) of Tencent Security Platform\nDepartment\n\nCoreGraphics\nAvailable for:  All Apple Watch models\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: Multiple memory corruption issues were addressed through\nimproved input validation. \nCVE-2017-2444: Mei Wang of 360 GearTeam\n\nCoreText\nAvailable for:  All Apple Watch models\nImpact: Processing a maliciously crafted font file may lead to\narbitrary code execution\nDescription: A memory corruption issue was addressed through improved\ninput validation. \nCVE-2017-2435: John Villamil, Doyensec\n\nCoreText\nAvailable for:  All Apple Watch models\nImpact: Processing a maliciously crafted font may result in the\ndisclosure of process memory\nDescription: An out-of-bounds read was addressed through improved\ninput validation. \nCVE-2017-2450: John Villamil, Doyensec\n\nCoreText\nAvailable for:  All Apple Watch models\nImpact: Processing a maliciously crafted text message may lead to\napplication denial of service\nDescription: A resource exhaustion issue was addressed through\nimproved input validation. \nCVE-2017-2461: Isaac Archambault of IDAoADI, an anonymous researcher\n\nFontParser\nAvailable for:  All Apple Watch models\nImpact: Processing a maliciously crafted font file may lead to\narbitrary code execution\nDescription: Multiple memory corruption issues were addressed through\nimproved input validation. \nCVE-2017-2406: riusksk (ae3aY=) of Tencent Security Platform\nDepartment\nCVE-2017-2487: riusksk (ae3aY=) of Tencent Security Platform\nDepartment\n\nFontParser\nAvailable for:  All Apple Watch models\nImpact: Parsing a maliciously crafted font file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: Multiple memory corruption issues were addressed through\nimproved input validation. \nCVE-2017-2407: riusksk (ae3aY=) of Tencent Security Platform\nDepartment\n\nFontParser\nAvailable for:  All Apple Watch models\nImpact: Processing a maliciously crafted font may result in the\ndisclosure of process memory\nDescription: An out-of-bounds read was addressed through improved\ninput validation. \nCVE-2017-2439: John Villamil, Doyensec\n\nHTTPProtocol\nAvailable for:  All Apple Watch models\nImpact: A malicious HTTP/2 server may be able to cause undefined\nbehavior\nDescription: Multiple issues existed in nghttp2 before 1.17.0. These\nwere addressed by updating LibreSSL to version 1.17.0. \nCVE-2017-2428\n\nImageIO\nAvailable for:  All Apple Watch models\nImpact: Processing a maliciously crafted image may lead to arbitrary\ncode execution\nDescription: A memory corruption issue was addressed through improved\ninput validation. \nCVE-2017-2416: Qidan He (a1/2ae*a,1, @flanker_hqd) of KeenLab, Tencent\n\nImageIO\nAvailable for:  All Apple Watch models\nImpact: Viewing a maliciously crafted JPEG file may lead to arbitrary\ncode execution\nDescription: A memory corruption issue was addressed through improved\ninput validation. \nCVE-2017-2432: an anonymous researcher working with Trend Micro's\nZero Day Initiative\n\nImageIO\nAvailable for:  All Apple Watch models\nImpact: Processing a maliciously crafted file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A memory corruption issue was addressed through improved\ninput validation. \nCVE-2017-2467\n\nImageIO\nAvailable for:  All Apple Watch models\nImpact: Processing a maliciously crafted image may lead to unexpected\napplication termination\nDescription: An out-of-bound read existed in LibTIFF versions before\n4.0.7. This was addressed by updating LibTIFF in ImageIO to version\n4.0.7. \nCVE-2016-3619\n\nKernel\nAvailable for:  All Apple Watch models\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed through improved\ninput validation. \nCVE-2017-2401: Lufeng Li of Qihoo 360 Vulcan Team\n\nKernel\nAvailable for:  All Apple Watch models\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: An integer overflow was addressed through improved input\nvalidation. \nCVE-2017-2440: an anonymous researcher\n\nKernel\nAvailable for:  All Apple Watch models\nImpact: A malicious application may be able to execute arbitrary code\nwith root privileges\nDescription: A race condition was addressed through improved memory\nhandling. \nCVE-2017-2456: lokihardt of Google Project Zero\n\nKernel\nAvailable for:  All Apple Watch models\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A use after free issue was addressed through improved\nmemory management. \nCVE-2017-2472: Ian Beer of Google Project Zero\n\nKernel\nAvailable for:  All Apple Watch models\nImpact: A malicious application may be able to execute arbitrary code\nwith kernel privileges\nDescription: A memory corruption issue was addressed through improved\ninput validation. \nCVE-2017-2473: Ian Beer of Google Project Zero\n\nKernel\nAvailable for:  All Apple Watch models\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: An off-by-one issue was addressed through improved\nbounds checking. \nCVE-2017-2474: Ian Beer of Google Project Zero\n\nKernel\nAvailable for:  All Apple Watch models\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A race condition was addressed through improved locking. \nCVE-2017-2478: Ian Beer of Google Project Zero\n\nKernel\nAvailable for:  All Apple Watch models\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A buffer overflow issue was addressed through improved\nmemory handling. \nCVE-2017-2482: Ian Beer of Google Project Zero\nCVE-2017-2483: Ian Beer of Google Project Zero\n\nKeyboards\nAvailable for:  All Apple Watch models\nImpact: An application may be able to execute arbitrary code\nDescription: A buffer overflow was addressed through improved bounds\nchecking. \nCVE-2017-2458: Shashank (@cyberboyIndia)\n\nlibarchive\nAvailable for:  All Apple Watch models\nImpact: A local attacker may be able to change file system\npermissions on arbitrary directories\nDescription: A validation issue existed in the handling of symlinks. \nThis issue was addressed through improved validation of symlinks. \nCVE-2017-2390: Omer Medan of enSilo Ltd\n\nlibc++abi\nAvailable for:  All Apple Watch models\nImpact: Demangling a malicious C++ application may lead to arbitrary\ncode execution\nDescription: A use after free issue was addressed through improved\nmemory management. \nCVE-2017-2441\n\nSecurity\nAvailable for:  All Apple Watch models\nImpact: An application may be able to execute arbitrary code with\nroot privileges\nDescription: A buffer overflow was addressed through improved bounds\nchecking. \nCVE-2017-2451: Alex Radocea of Longterm Security, Inc. \n\nSecurity\nAvailable for:  All Apple Watch models\nImpact: Processing a maliciously crafted x509 certificate may lead to\narbitrary code execution\nDescription: A memory corruption issue existed in the parsing of\ncertificates. This issue was addressed through improved input\nvalidation. \nCVE-2017-2485: Aleksandar Nikolic of Cisco Talos\n\nWebKit\nAvailable for:  All Apple Watch models\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: A type confusion issue was addressed through improved\nmemory handling. \nCVE-2017-2415: Kai Kang of Tencent's Xuanwu Lab (tentcent.com)\n\nWebKit\nAvailable for:  All Apple Watch models\nImpact: Processing maliciously crafted web content may lead to high\nmemory consumption\nDescription: An uncontrolled resource consumption issue was addressed\nthrough improved regex processing. \nCVE-2016-9643: Gustavo Grieco\n\nWebKit\nAvailable for:  All Apple Watch models\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: A use after free issue was addressed through improved\nmemory management. \nCVE-2017-2471: Ivan Fratric of Google Project Zero\n\nInstallation note:\n\nInstructions on how to update your Apple Watch software are\navailable at https://support.apple.com/kb/HT204641\n\nTo check the version on your Apple Watch, open the Apple Watch app\non your iPhone and select \"My Watch > General > About\". \n\nAlternatively, on your watch, select \"My Watch > General > About\". \n\nInformation will also be posted to the Apple Security Updates\nweb site: https://support.apple.com/kb/HT201222\n\nThis message is signed with Apple's Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n-----BEGIN PGP SIGNATURE-----\nComment: GPGTools - http://gpgtools.org\n\niQIcBAEBCgAGBQJY2Yo7AAoJEIOj74w0bLRGnz8P/2pCIIMej7VvKEMeeOblPHII\nZwaSR8nzRIlL5IsPgPcq/e2vkZoyPs3ee5dQGX4yJTgzEY0FuD1S/NxeFntxFlzm\n8Ei+PQJco8xdZtlL1HXjg+UlY0HAm1TJGYyriDPjbJiqCBRktv3ta/uzJY+yvXK8\n3KtO0PXmEGFod9eyQZIRqFZ6GLxNdeFIxabp1SkOoiGk29jC3E9YjgR5qldMAjfN\nAuYWiBBhMOmal8dbnamtcJh93ElzuXX77cCUlw7wQMz6NaqNS3FWaGEUHsxn6y/4\nP8XIfwYAaoWhaCJpEari+GkxmmuXmtbuKyMTDQqCWQyG3ThkYDk6kKQNcQMDbxnh\npcyEB7WI9sRQ7CoFH7rmyl8BqQr4Ys0uGPtRDvCVO91kNUMYXeBiNC+StyqWt6Wd\n3p/QUxYnM+kG8Zd0lMEaF3LNolr1w54APxMYD3sW3/tOmf8C7d6+qGTGlrumizkD\nZ0zr/xRNNpd0m4PVmlNt7YJMjN6s1xJwpEUC1n4FyRifdQktqsKMrumq7VGplHYO\nVNKToB3BuHHjTi2HOocvUXfj55htqrCxETEyHD7NhKVpLEf15vDgyXKFGgF95/HR\ngomW+ApttZNiz/vOOoI9DL2ZSOnwzo5uO8W4GYSpDpQ36YaYQj/jei2MgtVqqKo+\nbNi/H1Oquz40IhKoGR/B\n=4Uvv\n-----END PGP SIGNATURE-----\n\n\n\n",
      sources: [
         {
            db: "NVD",
            id: "CVE-2017-2428",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-002357",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-04876",
         },
         {
            db: "BID",
            id: "97146",
         },
         {
            db: "VULHUB",
            id: "VHN-110631",
         },
         {
            db: "PACKETSTORM",
            id: "141933",
         },
      ],
      trust: 2.61,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2017-2428",
            trust: 3.5,
         },
         {
            db: "BID",
            id: "97146",
            trust: 2,
         },
         {
            db: "SECTRACK",
            id: "1038138",
            trust: 1.7,
         },
         {
            db: "JVN",
            id: "JVNVU90482935",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-002357",
            trust: 0.8,
         },
         {
            db: "CNVD",
            id: "CNVD-2017-04876",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201703-1267",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-110631",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "141933",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-04876",
         },
         {
            db: "VULHUB",
            id: "VHN-110631",
         },
         {
            db: "BID",
            id: "97146",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-002357",
         },
         {
            db: "PACKETSTORM",
            id: "141933",
         },
         {
            db: "NVD",
            id: "CVE-2017-2428",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201703-1267",
         },
      ],
   },
   id: "VAR-201704-0784",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-110631",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2023-12-18T11:48:44.546000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Apple security updates",
            trust: 0.8,
            url: "https://support.apple.com/en-us/ht201222",
         },
         {
            title: "HT207602",
            trust: 0.8,
            url: "https://support.apple.com/en-us/ht207602",
         },
         {
            title: "HT207601",
            trust: 0.8,
            url: "https://support.apple.com/en-us/ht207601",
         },
         {
            title: "HT207617",
            trust: 0.8,
            url: "https://support.apple.com/en-us/ht207617",
         },
         {
            title: "HT207615",
            trust: 0.8,
            url: "https://support.apple.com/en-us/ht207615",
         },
         {
            title: "HT207617",
            trust: 0.8,
            url: "https://support.apple.com/ja-jp/ht207617",
         },
         {
            title: "HT207615",
            trust: 0.8,
            url: "https://support.apple.com/ja-jp/ht207615",
         },
         {
            title: "HT207602",
            trust: 0.8,
            url: "https://support.apple.com/ja-jp/ht207602",
         },
         {
            title: "HT207601",
            trust: 0.8,
            url: "https://support.apple.com/ja-jp/ht207601",
         },
         {
            title: "Patches for unnamed vulnerabilities in Apple iOS/tvOS/macOS/watchOS HTTPProtocol components",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/92175",
         },
         {
            title: "Nghttp2 Security vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=68819",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-04876",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-002357",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201703-1267",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "NVD-CWE-noinfo",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2017-2428",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "http://www.securityfocus.com/bid/97146",
         },
         {
            trust: 1.7,
            url: "https://support.apple.com/ht207601",
         },
         {
            trust: 1.7,
            url: "https://support.apple.com/ht207602",
         },
         {
            trust: 1.7,
            url: "https://support.apple.com/ht207615",
         },
         {
            trust: 1.7,
            url: "https://support.apple.com/ht207617",
         },
         {
            trust: 1.7,
            url: "http://www.securitytracker.com/id/1038138",
         },
         {
            trust: 1.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-2428",
         },
         {
            trust: 1.1,
            url: "https://github.com/nghttp2/nghttp2/releases/tag/v1.17.0",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-2428",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/vu/jvnvu90482935/index.html",
         },
         {
            trust: 0.6,
            url: "http2/releases/tag/v1.17.0",
         },
         {
            trust: 0.6,
            url: "http2/ng",
         },
         {
            trust: 0.6,
            url: "https://github.com/ng",
         },
         {
            trust: 0.3,
            url: "http://www.apple.com/ios/",
         },
         {
            trust: 0.3,
            url: "https://www.apple.com/osx/",
         },
         {
            trust: 0.3,
            url: "http://www.apple.com/appletv/features.html",
         },
         {
            trust: 0.3,
            url: "http://www.apple.com/in/watch/",
         },
         {
            trust: 0.3,
            url: "https://nghttp2.org",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-2406",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-2379",
         },
         {
            trust: 0.1,
            url: "https://support.apple.com/kb/ht204641",
         },
         {
            trust: 0.1,
            url: "https://support.apple.com/kb/ht201222",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-2444",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-2450",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-2441",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-3619",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-2472",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-2473",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-2401",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-2467",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-2458",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-2417",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-2462",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-2440",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-2435",
         },
         {
            trust: 0.1,
            url: "https://www.apple.com/support/security/pgp/",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-2430",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-2432",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-2471",
         },
         {
            trust: 0.1,
            url: "http://gpgtools.org",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-2451",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-2461",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-2439",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-2390",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-2415",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-2407",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-2416",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-9643",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-2456",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-04876",
         },
         {
            db: "VULHUB",
            id: "VHN-110631",
         },
         {
            db: "BID",
            id: "97146",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-002357",
         },
         {
            db: "PACKETSTORM",
            id: "141933",
         },
         {
            db: "NVD",
            id: "CVE-2017-2428",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201703-1267",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2017-04876",
         },
         {
            db: "VULHUB",
            id: "VHN-110631",
         },
         {
            db: "BID",
            id: "97146",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-002357",
         },
         {
            db: "PACKETSTORM",
            id: "141933",
         },
         {
            db: "NVD",
            id: "CVE-2017-2428",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201703-1267",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-04-21T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-04876",
         },
         {
            date: "2017-04-02T00:00:00",
            db: "VULHUB",
            id: "VHN-110631",
         },
         {
            date: "2017-03-27T00:00:00",
            db: "BID",
            id: "97146",
         },
         {
            date: "2017-04-12T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2017-002357",
         },
         {
            date: "2017-03-27T17:32:22",
            db: "PACKETSTORM",
            id: "141933",
         },
         {
            date: "2017-04-02T01:59:01.810000",
            db: "NVD",
            id: "CVE-2017-2428",
         },
         {
            date: "2017-03-31T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201703-1267",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-06-11T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-04876",
         },
         {
            date: "2019-03-08T00:00:00",
            db: "VULHUB",
            id: "VHN-110631",
         },
         {
            date: "2017-03-29T01:02:00",
            db: "BID",
            id: "97146",
         },
         {
            date: "2017-04-12T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2017-002357",
         },
         {
            date: "2019-03-08T16:06:33.217000",
            db: "NVD",
            id: "CVE-2017-2428",
         },
         {
            date: "2019-03-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201703-1267",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201703-1267",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Apple Product  HTTPProtocol Component vulnerabilities",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2017-002357",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Design Error",
      sources: [
         {
            db: "BID",
            id: "97146",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201703-1267",
         },
      ],
      trust: 0.9,
   },
}

var-201601-0154
Vulnerability from variot

The idle stream handling in nghttp2 before 1.6.0 allows attackers to have unspecified impact via unknown vectors, aka a heap-use-after-free bug. This vulnerability is called a bug in using free heap memory.An attacker may be able to affect you unspecified. Little is known about this issue or its effects at this time. We will update this BID as more information emerges. Nghttp2 is a C library for implementing HTTP/2. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements. CVE-ID CVE-2016-1722 : Joshua J. CVE-ID CVE-2016-1781 : Devdatta Akhawe of Dropbox, Inc.

WebKit Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A website may be able to track sensitive user information Description: A hidden web page may be able to access device- orientation and device-motion data. This issue was addressed by suspending the availability of this data when the web view is hidden. CVE-ID CVE-2016-1780 : Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, and Feng Hao of the School of Computing Science, Newcastle University, UK

WebKit Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Visiting a maliciously crafted website may reveal a user's current location Description: An issue existed in the parsing of geolocation requests. CVE-ID CVE-2016-1779 : xisigr of Tencent's Xuanwu Lab (http://www.tencent.com)

WebKit Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious website may be able to access restricted ports on arbitrary servers Description: A port redirection issue was addressed through additional port validation. CVE-ID CVE-2016-1782 : Muneaki Nishimura (nishimunea) of Recruit Technologies Co.,Ltd. CVE-ID CVE-2016-1784 : Moony Li and Jack Tang of TrendMicro and 李普君 of 无声信息技术PKAV Team (PKAV.net)

WebKit Page Loading Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Visiting a malicious website may lead to user interface spoofing Description: Redirect responses may have allowed a malicious website to display an arbitrary URL and read cached contents of the destination origin. CVE-ID CVE-2016-1786 : ma.la of LINE Corporation

WebKit Page Loading Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious website may exfiltrate data cross-origin Description: A caching issue existed with character encoding. CVE-ID CVE-2016-0801 : an anonymous researcher CVE-2016-0802 : an anonymous researcher

Installation note:

This update is available through iTunes and Software Update on your iOS device, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from www.apple.com/itunes/

iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device.

The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. You may manually obtain the update via the Check for Updates button within iTunes, or the Software Update on your device.

To check that the iPhone, iPod touch, or iPad has been updated:

  • Navigate to Settings
  • Select General
  • Select About.

Gentoo Linux Security Advisory GLSA 201612-06

                                       https://security.gentoo.org/

Severity: Normal Title: nghttp2: Heap-use-after-free Date: December 04, 2016 Bugs: #569518 ID: 201612-06

Synopsis

Nghttp2 is vulnerable to a heap-use-after-free flaw in idle stream handling code.

Background

Nghttp2 is an implementation of HTTP/2 and its header compression algorithm HPACK in C.

Affected packages

-------------------------------------------------------------------
 Package              /     Vulnerable     /            Unaffected
-------------------------------------------------------------------

1 net-libs/nghttp2 < 1.6.0 >= 1.6.0

Description

A heap-use-after-free vulnerability has been discovered in nghttp2. Please review the CVE identifier referenced below for details.

Impact

The impact of the vulnerability is still unknown.

Resolution

All nghttp2 users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=net-libs/nghttp2-1.6.0"

References

[ 1 ] CVE-2015-8659 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8659

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

https://security.gentoo.org/glsa/201612-06

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us.

License

Copyright 2016 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5

. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512

APPLE-SA-2016-03-21-5 OS X El Capitan 10.11.4 and Security Update 2016-002

OS X El Capitan 10.11.4 and Security Update 2016-002 is now available and addresses the following:

apache_mod_php Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 to v10.11.3 Impact: Processing a maliciously crafted .png file may lead to arbitrary code execution Description: Multiple vulnerabilities existed in libpng versions prior to 1.6.20. These were addressed by updating libpng to version 1.6.20. CVE-ID CVE-2015-8126 : Adam Mariš CVE-2015-8472 : Adam Mariš

AppleRAID Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed through improved input validation. CVE-ID CVE-2016-1733 : Proteas of Qihoo 360 Nirvan Team

AppleRAID Available for: OS X El Capitan v10.11 to v10.11.3 Impact: A local user may be able to determine kernel memory layout Description: An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed through improved input validation. CVE-ID CVE-2016-1732 : Proteas of Qihoo 360 Nirvan Team

AppleUSBNetworking Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue existed in the parsing of data from USB devices. This issue was addressed through improved input validation. CVE-ID CVE-2016-1734 : Andrea Barisani and Andrej Rosano of Inverse Path

Bluetooth Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1735 : Jeonghoon Shin@A.D.D CVE-2016-1736 : beist and ABH of BoB

Carbon Available for: OS X El Capitan v10.11 to v10.11.3 Impact: Processing a maliciously crafted .dfont file may lead to arbitrary code execution Description: Multiple memory corruption issues existed in the handling of font files. These issues were addressed through improved bounds checking. CVE-ID CVE-2016-1737 : an anonymous researcher

dyld Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An attacker may tamper with code-signed applications to execute arbitrary code in the application's context Description: A code signing verification issue existed in dyld. This issue was addressed with improved validation. CVE-ID CVE-2016-1738 : beist and ABH of BoB

FontParser Available for: OS X El Capitan v10.11 to v10.11.3 Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue was addressed through improved memory handling. CVE-ID CVE-2016-1740 : HappilyCoded (ant4g0nist and r3dsm0k3) working with Trend Micro's Zero Day Initiative (ZDI)

HTTPProtocol Available for: OS X El Capitan v10.11 to v10.11.3 Impact: A remote attacker may be able to execute arbitrary code Description: Multiple vulnerabilities existed in nghttp2 versions prior to 1.6.0, the most serious of which may have led to remote code execution. These were addressed by updating nghttp2 to version 1.6.0. CVE-ID CVE-2015-8659

Intel Graphics Driver Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1743 : Piotr Bania of Cisco Talos CVE-2016-1744 : Ian Beer of Google Project Zero

IOFireWireFamily Available for: OS X El Capitan v10.11 to v10.11.3 Impact: A local user may be able to cause a denial of service Description: A null pointer dereference was addressed through improved validation. CVE-ID CVE-2016-1745 : sweetchip of Grayhash

IOGraphics Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed through improved input validation. CVE-ID CVE-2016-1746 : Peter Pi of Trend Micro working with Trend Micro's Zero Day Initiative (ZDI) CVE-2016-1747 : Juwei Lin of Trend Micro working with Trend Micro's Zero Day Initiative (ZDI)

IOHIDFamily Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to determine kernel memory layout Description: A memory corruption issue was addressed through improved memory handling. CVE-ID CVE-2016-1748 : Brandon Azad

IOUSBFamily Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1749 : Ian Beer of Google Project Zero and Juwei Lin of Trend Micro working with Trend Micro's Zero Day Initiative (ZDI)

Kernel Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A use after free issue was addressed through improved memory management. CVE-ID CVE-2016-1750 : CESG

Kernel Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A race condition existed during the creation of new processes. This was addressed through improved state handling. CVE-ID CVE-2016-1757 : Ian Beer of Google Project Zero and Pedro Vilaca

Kernel Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A null pointer dereference was addressed through improved input validation. CVE-ID CVE-2016-1756 : Lufeng Li of Qihoo 360 Vulcan Team

Kernel Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1754 : Lufeng Li of Qihoo 360 Vulcan Team CVE-2016-1755 : Ian Beer of Google Project Zero CVE-2016-1759 : lokihardt

Kernel Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to determine kernel memory layout Description: An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed through improved input validation. CVE-ID CVE-2016-1758 : Brandon Azad

Kernel Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: Multiple integer overflows were addressed through improved input validation. CVE-ID CVE-2016-1753 : Juwei Lin Trend Micro working with Trend Micro's Zero Day Initiative (ZDI)

Kernel Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to cause a denial of service Description: A denial of service issue was addressed through improved validation. CVE-ID CVE-2016-1752 : CESG

libxml2 Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 to v10.11.3 Impact: Processing maliciously crafted XML may lead to unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2015-1819 CVE-2015-5312 : David Drysdale of Google CVE-2015-7499 CVE-2015-7500 : Kostya Serebryany of Google CVE-2015-7942 : Kostya Serebryany of Google CVE-2015-8035 : gustavo.grieco CVE-2015-8242 : Hugh Davenport CVE-2016-1761 : wol0xff working with Trend Micro's Zero Day Initiative (ZDI) CVE-2016-1762

Messages Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An attacker who is able to bypass Apple's certificate pinning, intercept TLS connections, inject messages, and record encrypted attachment-type messages may be able to read attachments Description: A cryptographic issue was addressed by rejecting duplicate messages on the client. CVE-ID CVE-2016-1788 : Christina Garman, Matthew Green, Gabriel Kaptchuk, Ian Miers, and Michael Rushanan of Johns Hopkins University

Messages Available for: OS X El Capitan v10.11 to v10.11.3 Impact: Clicking a JavaScript link can reveal sensitive user information Description: An issue existed in the processing of JavaScript links. This issue was addressed through improved content security policy checks. CVE-ID CVE-2016-1764 : Matthew Bryan of the Uber Security Team (formerly of Bishop Fox), Joe DeMesy and Shubham Shah of Bishop Fox

NVIDIA Graphics Drivers Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1741 : Ian Beer of Google Project Zero

OpenSSH Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 to v10.11.3 Impact: Connecting to a server may leak sensitive user information, such as a client's private keys Description: Roaming, which was on by default in the OpenSSH client, exposed an information leak and a buffer overflow. These issues were addressed by disabling roaming in the client. CVE-ID CVE-2016-0777 : Qualys CVE-2016-0778 : Qualys

OpenSSH Available for: OS X Mavericks v10.9.5 and OS X Yosemite v10.10.5 Impact: Multiple vulnerabilities in LibreSSL Description: Multiple vulnerabilities existed in LibreSSL versions prior to 2.1.8. These were addressed by updating LibreSSL to version 2.1.8. CVE-ID CVE-2015-5333 : Qualys CVE-2015-5334 : Qualys

OpenSSL Available for: OS X El Capitan v10.11 to v10.11.3 Impact: A remote attacker may be able to cause a denial of service Description: A memory leak existed in OpenSSL versions prior to 0.9.8zh. This issue was addressed by updating OpenSSL to version 0.9.8zh. CVE-ID CVE-2015-3195

Python Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 to v10.11.3 Impact: Processing a maliciously crafted .png file may lead to arbitrary code execution Description: Multiple vulnerabilities existed in libpng versions prior to 1.6.20. These were addressed by updating libpng to version 1.6.20. CVE-ID CVE-2014-9495 CVE-2015-0973 CVE-2015-8126 : Adam Mariš CVE-2015-8472 : Adam Mariš

QuickTime Available for: OS X El Capitan v10.11 to v10.11.3 Impact: Processing a maliciously crafted FlashPix Bitmap Image may lead to unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1767 : Francis Provencher from COSIG CVE-2016-1768 : Francis Provencher from COSIG

QuickTime Available for: OS X El Capitan v10.11 to v10.11.3 Impact: Processing a maliciously crafted Photoshop document may lead to unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1769 : Francis Provencher from COSIG

Reminders Available for: OS X El Capitan v10.11 to v10.11.3 Impact: Clicking a tel link can make a call without prompting the user Description: A user was not prompted before invoking a call. This was addressed through improved entitlement checks. CVE-ID CVE-2016-1770 : Guillaume Ross of Rapid7 and Laurent Chouinard of Laurent.ca

Ruby Available for: OS X El Capitan v10.11 to v10.11.3 Impact: A local attacker may be able to cause unexpected application termination or arbitrary code execution Description: An unsafe tainted string usage vulnerability existed in versions prior to 2.0.0-p648. This issue was addressed by updating to version 2.0.0-p648. CVE-ID CVE-2015-7551

Security Available for: OS X El Capitan v10.11 to v10.11.3 Impact: A local user may be able to check for the existence of arbitrary files Description: A permissions issue existed in code signing tools. This was addressed though additional ownership checks. CVE-ID CVE-2016-1773 : Mark Mentovai of Google Inc.

Security Available for: OS X El Capitan v10.11 to v10.11.3 Impact: Processing a maliciously crafted certificate may lead to arbitrary code execution Description: A memory corruption issue existed in the ASN.1 decoder. This issue was addressed through improved input validation. CVE-ID CVE-2016-1950 : Francis Gabriel of Quarkslab

Tcl Available for:
OS X Yosemite v10.10.5 and OS X El Capitan v10.11 to v10.11.3 Impact: Processing a maliciously crafted .png file may lead to arbitrary code execution Description: Multiple vulnerabilities existed in libpng versions prior to 1.6.20. These were addressed by removing libpng. CVE-ID CVE-2015-8126 : Adam Mariš

TrueTypeScaler Available for: OS X El Capitan v10.11 to v10.11.3 Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: A memory corruption issue existed in the processing of font files. This issue was addressed through improved input validation. CVE-ID CVE-2016-1775 : 0x1byte working with Trend Micro's Zero Day Initiative (ZDI)

Wi-Fi Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An attacker with a privileged network position may be able to execute arbitrary code Description: A frame validation and memory corruption issue existed for a given ethertype. This issue was addressed through additional ethertype validation and improved memory handling. CVE-ID CVE-2016-0801 : an anonymous researcher CVE-2016-0802 : an anonymous researcher

OS X El Capitan 10.11.4 includes the security content of Safari 9.1. https://support.apple.com/kb/HT206171

OS X El Capitan v10.11.4 and Security Update 2016-002 may be obtained from the Mac App Store or Apple's Software Downloads web site: http://www.apple.com/support/downloads/

Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222

This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org

iQIcBAEBCgAGBQJW8JQFAAoJEBcWfLTuOo7tZSYP/1bHFA1qemkD37uu7nYpk/q6 ARVsPgME1I1+5tOxX0TQJgzMBmdQsKYdsTiLpDk5HTuv+dAMsFfasaUItGk8Sz1w HiYjSfVsxL+Pjz3vK8/4/fsi2lX6472MElRw8gudITOhXtniGcKo/vuA5dB+vM3l Jy1NLHHhZ6BD2t0bBmlz41mZMG3AMxal2wfqE+5LkjUwASzcvC/3B1sh7Fntwyau /71vIgMQ5AaETdgQJAuQivxPyTlFduBRgLjqvPiB9eSK4Ctu5t/hErFIrP2NiDCi UhfZC48XbiRjJfkUsUD/5TIKnI+jkZxOnch9ny32dw2kUIkbIAbqufTkzsMXOpng O+rI93Ni7nfzgI3EkI2bq+C+arOoRiveWuJvc3SMPD5RQHo4NCQVs0ekQJKNHF78 juPnY29n8WMjwLS6Zfm+bH+n8ELIXrmmEscRztK2efa9S7vJe+AgIxx7JE/f8OHF i9K7UQBXFXcpMjXi1aTby/IUnpL5Ny4NVwYwIhctj0Mf6wTH7uf/FMWYIQOXcIfP Izo+GXxNeLd4H2ypZ+UpkZg/Sn2mtCd88wLc96+owlZPBlSqWl3X1wTlp8i5FP2X qlQ7RcTHJDv8jPT/MOfzxEK1n/azp45ahHA0o6nohUdxlA7PLci9vPiJxqKPo/0q VZmOKa8qMxB1L/JmdCqy =mZR+ -----END PGP SIGNATURE-----

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201601-0154",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "tvos",
            scope: "lte",
            trust: 1,
            vendor: "apple",
            version: "9.1",
         },
         {
            model: "mac os x",
            scope: "lte",
            trust: 1,
            vendor: "apple",
            version: "10.11.3",
         },
         {
            model: "iphone os",
            scope: "lte",
            trust: 1,
            vendor: "apple",
            version: "9.2.1",
         },
         {
            model: "nghttp2",
            scope: "lte",
            trust: 1,
            vendor: "nghttp2",
            version: "1.5.0",
         },
         {
            model: "watchos",
            scope: "lte",
            trust: 1,
            vendor: "apple",
            version: "2.1",
         },
         {
            model: "nghttp2",
            scope: "lt",
            trust: 0.8,
            vendor: "nghttp2",
            version: "1.6.0",
         },
         {
            model: "mac os x",
            scope: "eq",
            trust: 0.8,
            vendor: "apple",
            version: "10.11 to  10.11.3",
         },
         {
            model: "ios",
            scope: "lt",
            trust: 0.8,
            vendor: "apple",
            version: "9.3   (ipad 2 or later )",
         },
         {
            model: "ios",
            scope: "lt",
            trust: 0.8,
            vendor: "apple",
            version: "9.3   (iphone 4s or later )",
         },
         {
            model: "ios",
            scope: "lt",
            trust: 0.8,
            vendor: "apple",
            version: "9.3   (ipod touch first  5 after generation )",
         },
         {
            model: "tvos",
            scope: "lt",
            trust: 0.8,
            vendor: "apple",
            version: "9.2   (apple tv first  4 generation )",
         },
         {
            model: "watchos",
            scope: "lt",
            trust: 0.8,
            vendor: "apple",
            version: "2.2   (apple watch edition)",
         },
         {
            model: "watchos",
            scope: "lt",
            trust: 0.8,
            vendor: "apple",
            version: "2.2   (apple watch hermes)",
         },
         {
            model: "watchos",
            scope: "lt",
            trust: 0.8,
            vendor: "apple",
            version: "2.2   (apple watch sport)",
         },
         {
            model: "watchos",
            scope: "lt",
            trust: 0.8,
            vendor: "apple",
            version: "2.2   (apple watch)",
         },
         {
            model: "nghttp2",
            scope: "eq",
            trust: 0.6,
            vendor: "nghttp2",
            version: "1.5.0",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-006812",
         },
         {
            db: "NVD",
            id: "CVE-2015-8659",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201601-189",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "10.11.3",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "9.2.1",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "9.1",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "2.1",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:nghttp2:nghttp2:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "1.5.0",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-8659",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Apple",
      sources: [
         {
            db: "PACKETSTORM",
            id: "136344",
         },
         {
            db: "PACKETSTORM",
            id: "136343",
         },
         {
            db: "PACKETSTORM",
            id: "136342",
         },
         {
            db: "PACKETSTORM",
            id: "136346",
         },
      ],
      trust: 0.4,
   },
   cve: "CVE-2015-8659",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: true,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 10,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 10,
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 10,
                  confidentialityImpact: "Complete",
                  exploitabilityScore: null,
                  id: "CVE-2015-8659",
                  impactScore: null,
                  integrityImpact: "Complete",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.9,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 10,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 10,
                  id: "VHN-86620",
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:C/I:C/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 10,
                  baseSeverity: "CRITICAL",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 3.9,
                  impactScore: 6,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "CHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2015-8659",
                  trust: 1,
                  value: "CRITICAL",
               },
               {
                  author: "NVD",
                  id: "CVE-2015-8659",
                  trust: 0.8,
                  value: "High",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201601-189",
                  trust: 0.6,
                  value: "CRITICAL",
               },
               {
                  author: "VULHUB",
                  id: "VHN-86620",
                  trust: 0.1,
                  value: "HIGH",
               },
               {
                  author: "VULMON",
                  id: "CVE-2015-8659",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-86620",
         },
         {
            db: "VULMON",
            id: "CVE-2015-8659",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006812",
         },
         {
            db: "NVD",
            id: "CVE-2015-8659",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201601-189",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The idle stream handling in nghttp2 before 1.6.0 allows attackers to have unspecified impact via unknown vectors, aka a heap-use-after-free bug. This vulnerability is called a bug in using free heap memory.An attacker may be able to affect you unspecified. \nLittle is known about this issue or its effects at this time. We will update this BID as more information emerges. Nghttp2 is a C library for implementing HTTP/2. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements. \nCVE-ID\nCVE-2016-1722 : Joshua J. \nCVE-ID\nCVE-2016-1781 : Devdatta Akhawe of Dropbox, Inc. \n\nWebKit\nAvailable for:  iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact:  A website may be able to track sensitive user information\nDescription:  A hidden web page may be able to access device-\norientation and device-motion data. This issue was addressed by\nsuspending the availability of this data when the web view is hidden. \nCVE-ID\nCVE-2016-1780 : Maryam Mehrnezhad, Ehsan Toreini, Siamak F. \nShahandashti, and Feng Hao of the School of Computing Science,\nNewcastle University, UK\n\nWebKit\nAvailable for:  iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact:  Visiting a maliciously crafted website may reveal a user's\ncurrent location\nDescription:  An issue existed in the parsing of geolocation\nrequests. \nCVE-ID\nCVE-2016-1779 : xisigr of Tencent's Xuanwu Lab\n(http://www.tencent.com)\n\nWebKit\nAvailable for:  iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact:  A malicious website may be able to access restricted ports\non arbitrary servers\nDescription:  A port redirection issue was addressed through\nadditional port validation. \nCVE-ID\nCVE-2016-1782 : Muneaki Nishimura (nishimunea) of Recruit\nTechnologies Co.,Ltd. \nCVE-ID\nCVE-2016-1784 : Moony Li and Jack Tang of TrendMicro and 李普君 of\n无声信息技术PKAV Team (PKAV.net)\n\nWebKit Page Loading\nAvailable for:  iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact:  Visiting a malicious website may lead to user interface\nspoofing\nDescription:  Redirect responses may have allowed a malicious website\nto display an arbitrary URL and read cached contents of the\ndestination origin. \nCVE-ID\nCVE-2016-1786 : ma.la of LINE Corporation\n\nWebKit Page Loading\nAvailable for:  iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact:  A malicious website may exfiltrate data cross-origin\nDescription:  A caching issue existed with character encoding. \nCVE-ID\nCVE-2016-0801 : an anonymous researcher\nCVE-2016-0802 : an anonymous researcher\n\nInstallation note:\n\nThis update is available through iTunes and Software Update on your\niOS device, and will not appear in your computer's Software Update\napplication, or in the Apple Downloads site. Make sure you have an\nInternet connection and have installed the latest version of iTunes\nfrom www.apple.com/itunes/\n\niTunes and Software Update on the device will automatically check\nApple's update server on its weekly schedule. When an update is\ndetected, it is downloaded and the option to be installed is\npresented to the user when the iOS device is docked. We recommend\napplying the update immediately if possible. Selecting Don't Install\nwill present the option the next time you connect your iOS device. \n\nThe automatic update process may take up to a week depending on the\nday that iTunes or the device checks for updates. You may manually\nobtain the update via the Check for Updates button within iTunes, or\nthe Software Update on your device. \n\nTo check that the iPhone, iPod touch, or iPad has been updated:\n\n* Navigate to Settings\n* Select General\n* Select About. \n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory                           GLSA 201612-06\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n                                           https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n    Title: nghttp2: Heap-use-after-free\n     Date: December 04, 2016\n     Bugs: #569518\n       ID: 201612-06\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nNghttp2 is vulnerable to a heap-use-after-free flaw in idle stream\nhandling code. \n\nBackground\n==========\n\nNghttp2 is an implementation of HTTP/2 and its header compression\nalgorithm HPACK in C. \n\nAffected packages\n=================\n\n    -------------------------------------------------------------------\n     Package              /     Vulnerable     /            Unaffected\n    -------------------------------------------------------------------\n  1  net-libs/nghttp2             < 1.6.0                    >= 1.6.0\n\nDescription\n===========\n\nA heap-use-after-free vulnerability has been discovered in nghttp2. \nPlease review the CVE identifier referenced below for details. \n\nImpact\n======\n\nThe impact of the vulnerability is still unknown. \n\nResolution\n==========\n\nAll nghttp2 users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \">=net-libs/nghttp2-1.6.0\"\n\nReferences\n==========\n\n[ 1 ] CVE-2015-8659\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8659\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201612-06\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users' machines is of utmost\nimportance to us. \n\nLicense\n=======\n\nCopyright 2016 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\nAPPLE-SA-2016-03-21-5 OS X El Capitan 10.11.4 and Security Update\n2016-002\n\nOS X El Capitan 10.11.4 and Security Update 2016-002 is now available\nand addresses the following:\n\napache_mod_php\nAvailable for:  OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nand OS X El Capitan v10.11 to v10.11.3\nImpact:  Processing a maliciously crafted .png file may lead to\narbitrary code execution\nDescription:  Multiple vulnerabilities existed in libpng versions\nprior to 1.6.20. These were addressed by updating libpng to version\n1.6.20. \nCVE-ID\nCVE-2015-8126 : Adam Mariš\nCVE-2015-8472 : Adam Mariš\n\nAppleRAID\nAvailable for:  OS X El Capitan v10.11 to v10.11.3\nImpact:  An application may be able to execute arbitrary code with\nkernel privileges\nDescription:  A memory corruption issue was addressed through\nimproved input validation. \nCVE-ID\nCVE-2016-1733 : Proteas of Qihoo 360 Nirvan Team\n\nAppleRAID\nAvailable for:  OS X El Capitan v10.11 to v10.11.3\nImpact:  A local user may be able to determine kernel memory layout\nDescription:  An out-of-bounds read issue existed that led to the\ndisclosure of kernel memory. This was addressed through improved\ninput validation. \nCVE-ID\nCVE-2016-1732 : Proteas of Qihoo 360 Nirvan Team\n\nAppleUSBNetworking\nAvailable for:  OS X El Capitan v10.11 to v10.11.3\nImpact:  An application may be able to execute arbitrary code with\nkernel privileges\nDescription:  A memory corruption issue existed in the parsing of\ndata from USB devices. This issue was addressed through improved\ninput validation. \nCVE-ID\nCVE-2016-1734 : Andrea Barisani and Andrej Rosano of Inverse Path\n\nBluetooth\nAvailable for:  OS X El Capitan v10.11 to v10.11.3\nImpact:  An application may be able to execute arbitrary code with\nkernel privileges\nDescription:  Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-ID\nCVE-2016-1735 : Jeonghoon Shin@A.D.D\nCVE-2016-1736 : beist and ABH of BoB\n\nCarbon\nAvailable for:  OS X El Capitan v10.11 to v10.11.3\nImpact:  Processing a maliciously crafted .dfont file may lead to\narbitrary code execution\nDescription:  Multiple memory corruption issues existed in the\nhandling of font files. These issues were addressed through improved\nbounds checking. \nCVE-ID\nCVE-2016-1737 : an anonymous researcher\n\ndyld\nAvailable for:  OS X El Capitan v10.11 to v10.11.3\nImpact:  An attacker may tamper with code-signed applications to\nexecute arbitrary code in the application's context\nDescription:  A code signing verification issue existed in dyld. This\nissue was addressed with improved validation. \nCVE-ID\nCVE-2016-1738 : beist and ABH of BoB\n\nFontParser\nAvailable for:  OS X El Capitan v10.11 to v10.11.3\nImpact:  Opening a maliciously crafted PDF file may lead to an\nunexpected application termination or arbitrary code execution\nDescription:  A memory corruption issue was addressed through\nimproved memory handling. \nCVE-ID\nCVE-2016-1740 : HappilyCoded (ant4g0nist and r3dsm0k3) working with\nTrend Micro's Zero Day Initiative (ZDI)\n\nHTTPProtocol\nAvailable for:  OS X El Capitan v10.11 to v10.11.3\nImpact:  A remote attacker may be able to execute arbitrary code\nDescription:  Multiple vulnerabilities existed in nghttp2 versions\nprior to 1.6.0, the most serious of which may have led to remote code\nexecution. These were addressed by updating nghttp2 to version 1.6.0. \nCVE-ID\nCVE-2015-8659\n\nIntel Graphics Driver\nAvailable for:  OS X El Capitan v10.11 to v10.11.3\nImpact:  An application may be able to execute arbitrary code with\nkernel privileges\nDescription:  Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-ID\nCVE-2016-1743 : Piotr Bania of Cisco Talos\nCVE-2016-1744 : Ian Beer of Google Project Zero\n\nIOFireWireFamily\nAvailable for:  OS X El Capitan v10.11 to v10.11.3\nImpact:  A local user may be able to cause a denial of service\nDescription:  A null pointer dereference was addressed through\nimproved validation. \nCVE-ID\nCVE-2016-1745 : sweetchip of Grayhash\n\nIOGraphics\nAvailable for:  OS X El Capitan v10.11 to v10.11.3\nImpact:  An application may be able to execute arbitrary code with\nkernel privileges\nDescription:  A memory corruption issue was addressed through\nimproved input validation. \nCVE-ID\nCVE-2016-1746 : Peter Pi of Trend Micro working with Trend Micro's\nZero Day Initiative (ZDI)\nCVE-2016-1747 : Juwei Lin of Trend Micro working with Trend Micro's\nZero Day Initiative (ZDI)\n\nIOHIDFamily\nAvailable for:  OS X El Capitan v10.11 to v10.11.3\nImpact:  An application may be able to determine kernel memory layout\nDescription:  A memory corruption issue was addressed through\nimproved memory handling. \nCVE-ID\nCVE-2016-1748 : Brandon Azad\n\nIOUSBFamily\nAvailable for:  OS X El Capitan v10.11 to v10.11.3\nImpact:  An application may be able to execute arbitrary code with\nkernel privileges\nDescription:  Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-ID\nCVE-2016-1749 : Ian Beer of Google Project Zero and Juwei Lin of\nTrend Micro working with Trend Micro's Zero Day Initiative (ZDI)\n\nKernel\nAvailable for:  OS X El Capitan v10.11 to v10.11.3\nImpact:  An application may be able to execute arbitrary code with\nkernel privileges\nDescription:  A use after free issue was addressed through improved\nmemory management. \nCVE-ID\nCVE-2016-1750 : CESG\n\nKernel\nAvailable for:  OS X El Capitan v10.11 to v10.11.3\nImpact:  An application may be able to execute arbitrary code with\nkernel privileges\nDescription:  A race condition existed during the creation of new\nprocesses. This was addressed through improved state handling. \nCVE-ID\nCVE-2016-1757 : Ian Beer of Google Project Zero and Pedro Vilaca\n\nKernel\nAvailable for:  OS X El Capitan v10.11 to v10.11.3\nImpact:  An application may be able to execute arbitrary code with\nkernel privileges\nDescription:  A null pointer dereference was addressed through\nimproved input validation. \nCVE-ID\nCVE-2016-1756 : Lufeng Li of Qihoo 360 Vulcan Team\n\nKernel\nAvailable for:  OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nand OS X El Capitan v10.11 to v10.11.3\nImpact:  An application may be able to execute arbitrary code with\nkernel privileges\nDescription:  Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-ID\nCVE-2016-1754 : Lufeng Li of Qihoo 360 Vulcan Team\nCVE-2016-1755 : Ian Beer of Google Project Zero\nCVE-2016-1759 : lokihardt\n\nKernel\nAvailable for:  OS X El Capitan v10.11 to v10.11.3\nImpact:  An application may be able to determine kernel memory layout\nDescription:  An out-of-bounds read issue existed that led to the\ndisclosure of kernel memory. This was addressed through improved\ninput validation. \nCVE-ID\nCVE-2016-1758 : Brandon Azad\n\nKernel\nAvailable for:  OS X El Capitan v10.11 to v10.11.3\nImpact:  An application may be able to execute arbitrary code with\nkernel privileges\nDescription:  Multiple integer overflows were addressed through\nimproved input validation. \nCVE-ID\nCVE-2016-1753 : Juwei Lin Trend Micro working with Trend Micro's Zero\nDay Initiative (ZDI)\n\nKernel\nAvailable for:  OS X El Capitan v10.11 to v10.11.3\nImpact:  An application may be able to cause a denial of service\nDescription:  A denial of service issue was addressed through\nimproved validation. \nCVE-ID\nCVE-2016-1752 : CESG\n\nlibxml2\nAvailable for:  OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nand OS X El Capitan v10.11 to v10.11.3\nImpact:  Processing maliciously crafted XML may lead to unexpected\napplication termination or arbitrary code execution\nDescription:  Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-ID\nCVE-2015-1819\nCVE-2015-5312 : David Drysdale of Google\nCVE-2015-7499\nCVE-2015-7500 : Kostya Serebryany of Google\nCVE-2015-7942 : Kostya Serebryany of Google\nCVE-2015-8035 : gustavo.grieco\nCVE-2015-8242 : Hugh Davenport\nCVE-2016-1761 : wol0xff working with Trend Micro's Zero Day\nInitiative (ZDI)\nCVE-2016-1762\n\nMessages\nAvailable for:  OS X El Capitan v10.11 to v10.11.3\nImpact:  An attacker who is able to bypass Apple's certificate\npinning, intercept TLS connections, inject messages, and record\nencrypted attachment-type messages may be able to read attachments\nDescription:  A cryptographic issue was addressed by rejecting\nduplicate messages on the client. \nCVE-ID\nCVE-2016-1788 : Christina Garman, Matthew Green, Gabriel Kaptchuk,\nIan Miers, and Michael Rushanan of Johns Hopkins University\n\nMessages\nAvailable for:  OS X El Capitan v10.11 to v10.11.3\nImpact:  Clicking a JavaScript link can reveal sensitive user\ninformation\nDescription:  An issue existed in the processing of JavaScript links. \nThis issue was addressed through improved content security policy\nchecks. \nCVE-ID\nCVE-2016-1764 : Matthew Bryan of the Uber Security Team (formerly of\nBishop Fox), Joe DeMesy and Shubham Shah of Bishop Fox\n\nNVIDIA Graphics Drivers\nAvailable for:  OS X El Capitan v10.11 to v10.11.3\nImpact:  An application may be able to execute arbitrary code with\nkernel privileges\nDescription:  Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-ID\nCVE-2016-1741 : Ian Beer of Google Project Zero\n\nOpenSSH\nAvailable for:  OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nand OS X El Capitan v10.11 to v10.11.3\nImpact:  Connecting to a server may leak sensitive user information,\nsuch as a client's private keys\nDescription:  Roaming, which was on by default in the OpenSSH client,\nexposed an information leak and a buffer overflow. These issues were\naddressed by disabling roaming in the client. \nCVE-ID\nCVE-2016-0777 : Qualys\nCVE-2016-0778 : Qualys\n\nOpenSSH\nAvailable for:  OS X Mavericks v10.9.5 and OS X Yosemite v10.10.5\nImpact:  Multiple vulnerabilities in LibreSSL\nDescription:  Multiple vulnerabilities existed in LibreSSL versions\nprior to 2.1.8. These were addressed by updating LibreSSL to version\n2.1.8. \nCVE-ID\nCVE-2015-5333 : Qualys\nCVE-2015-5334 : Qualys\n\nOpenSSL\nAvailable for:  OS X El Capitan v10.11 to v10.11.3\nImpact:  A remote attacker may be able to cause a denial of service\nDescription:  A memory leak existed in OpenSSL versions prior to\n0.9.8zh. This issue was addressed by updating OpenSSL to version\n0.9.8zh. \nCVE-ID\nCVE-2015-3195\n\nPython\nAvailable for:  OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nand OS X El Capitan v10.11 to v10.11.3\nImpact:  Processing a maliciously crafted .png file may lead to\narbitrary code execution\nDescription:  Multiple vulnerabilities existed in libpng versions\nprior to 1.6.20. These were addressed by updating libpng to version\n1.6.20. \nCVE-ID\nCVE-2014-9495\nCVE-2015-0973\nCVE-2015-8126 : Adam Mariš\nCVE-2015-8472 : Adam Mariš\n\nQuickTime\nAvailable for:  OS X El Capitan v10.11 to v10.11.3\nImpact:  Processing a maliciously crafted FlashPix Bitmap Image may\nlead to unexpected application termination or arbitrary code\nexecution\nDescription:  Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-ID\nCVE-2016-1767 : Francis Provencher from COSIG\nCVE-2016-1768 : Francis Provencher from COSIG\n\nQuickTime\nAvailable for:  OS X El Capitan v10.11 to v10.11.3\nImpact:  Processing a maliciously crafted Photoshop document may lead\nto unexpected application termination or arbitrary code execution\nDescription:  Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-ID\nCVE-2016-1769 : Francis Provencher from COSIG\n\nReminders\nAvailable for:  OS X El Capitan v10.11 to v10.11.3\nImpact:  Clicking a tel link can make a call without prompting the\nuser\nDescription:  A user was not prompted before invoking a call. This\nwas addressed through improved entitlement checks. \nCVE-ID\nCVE-2016-1770 : Guillaume Ross of Rapid7 and Laurent Chouinard of\nLaurent.ca\n\nRuby\nAvailable for:  OS X El Capitan v10.11 to v10.11.3\nImpact:  A local attacker may be able to cause unexpected application\ntermination or arbitrary code execution\nDescription:  An unsafe tainted string usage vulnerability existed in\nversions prior to 2.0.0-p648. This issue was addressed by updating to\nversion 2.0.0-p648. \nCVE-ID\nCVE-2015-7551\n\nSecurity\nAvailable for:  OS X El Capitan v10.11 to v10.11.3\nImpact:  A local user may be able to check for the existence of\narbitrary files\nDescription:  A permissions issue existed in code signing tools. This\nwas addressed though additional ownership checks. \nCVE-ID\nCVE-2016-1773 : Mark Mentovai of Google Inc. \n\nSecurity\nAvailable for:  OS X El Capitan v10.11 to v10.11.3\nImpact:  Processing a maliciously crafted certificate may lead to\narbitrary code execution\nDescription:  A memory corruption issue existed in the ASN.1 decoder. \nThis issue was addressed through improved input validation. \nCVE-ID\nCVE-2016-1950 : Francis Gabriel of Quarkslab\n\nTcl\nAvailable for:  \nOS X Yosemite v10.10.5 and OS X El Capitan v10.11 to v10.11.3\nImpact:  Processing a maliciously crafted .png file may lead to\narbitrary code execution\nDescription:  Multiple vulnerabilities existed in libpng versions\nprior to 1.6.20. These were addressed by removing libpng. \nCVE-ID\nCVE-2015-8126 : Adam Mariš\n\nTrueTypeScaler\nAvailable for:  OS X El Capitan v10.11 to v10.11.3\nImpact:  Processing a maliciously crafted font file may lead to\narbitrary code execution\nDescription:  A memory corruption issue existed in the processing of\nfont files. This issue was addressed through improved input\nvalidation. \nCVE-ID\nCVE-2016-1775 : 0x1byte working with Trend Micro's Zero Day\nInitiative (ZDI)\n\nWi-Fi\nAvailable for:  OS X El Capitan v10.11 to v10.11.3\nImpact:  An attacker with a privileged network position may be able\nto execute arbitrary code\nDescription:  A frame validation and memory corruption issue existed\nfor a given ethertype. This issue was addressed through additional\nethertype validation and improved memory handling. \nCVE-ID\nCVE-2016-0801 : an anonymous researcher\nCVE-2016-0802 : an anonymous researcher\n\nOS X El Capitan 10.11.4 includes the security content of Safari 9.1. \nhttps://support.apple.com/kb/HT206171\n\nOS X El Capitan v10.11.4 and Security Update 2016-002 may be obtained\nfrom the Mac App Store or Apple's Software Downloads web site:\nhttp://www.apple.com/support/downloads/\n\nInformation will also be posted to the Apple Security Updates\nweb site: https://support.apple.com/kb/HT201222\n\nThis message is signed with Apple's Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n-----BEGIN PGP SIGNATURE-----\nComment: GPGTools - https://gpgtools.org\n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\nVZmOKa8qMxB1L/JmdCqy\n=mZR+\n-----END PGP SIGNATURE-----\n",
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-8659",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006812",
         },
         {
            db: "BID",
            id: "80438",
         },
         {
            db: "VULHUB",
            id: "VHN-86620",
         },
         {
            db: "VULMON",
            id: "CVE-2015-8659",
         },
         {
            db: "PACKETSTORM",
            id: "136344",
         },
         {
            db: "PACKETSTORM",
            id: "136343",
         },
         {
            db: "PACKETSTORM",
            id: "136342",
         },
         {
            db: "PACKETSTORM",
            id: "140013",
         },
         {
            db: "PACKETSTORM",
            id: "136346",
         },
      ],
      trust: 2.52,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2015-8659",
            trust: 3.4,
         },
         {
            db: "SECTRACK",
            id: "1035353",
            trust: 1.8,
         },
         {
            db: "OPENWALL",
            id: "OSS-SECURITY/2015/12/23/6",
            trust: 1.8,
         },
         {
            db: "OPENWALL",
            id: "OSS-SECURITY/2015/12/23/10",
            trust: 1.8,
         },
         {
            db: "JVN",
            id: "JVNVU97668313",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006812",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201601-189",
            trust: 0.7,
         },
         {
            db: "BID",
            id: "80438",
            trust: 0.5,
         },
         {
            db: "PACKETSTORM",
            id: "140013",
            trust: 0.2,
         },
         {
            db: "VULHUB",
            id: "VHN-86620",
            trust: 0.1,
         },
         {
            db: "VULMON",
            id: "CVE-2015-8659",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "136344",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "136343",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "136342",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "136346",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-86620",
         },
         {
            db: "VULMON",
            id: "CVE-2015-8659",
         },
         {
            db: "BID",
            id: "80438",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006812",
         },
         {
            db: "PACKETSTORM",
            id: "136344",
         },
         {
            db: "PACKETSTORM",
            id: "136343",
         },
         {
            db: "PACKETSTORM",
            id: "136342",
         },
         {
            db: "PACKETSTORM",
            id: "140013",
         },
         {
            db: "PACKETSTORM",
            id: "136346",
         },
         {
            db: "NVD",
            id: "CVE-2015-8659",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201601-189",
         },
      ],
   },
   id: "VAR-201601-0154",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-86620",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2023-12-18T11:29:31.738000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "APPLE-SA-2016-03-21-1 iOS 9.3",
            trust: 0.8,
            url: "http://lists.apple.com/archives/security-announce/2016/mar/msg00000.html",
         },
         {
            title: "APPLE-SA-2016-03-21-2 watchOS 2.2",
            trust: 0.8,
            url: "http://lists.apple.com/archives/security-announce/2016/mar/msg00001.html",
         },
         {
            title: "APPLE-SA-2016-03-21-3 tvOS 9.2",
            trust: 0.8,
            url: "http://lists.apple.com/archives/security-announce/2016/mar/msg00002.html",
         },
         {
            title: "APPLE-SA-2016-03-21-5 OS X El Capitan 10.11.4 and Security Update 2016-002",
            trust: 0.8,
            url: "http://lists.apple.com/archives/security-announce/2016/mar/msg00004.html",
         },
         {
            title: "HT206167",
            trust: 0.8,
            url: "https://support.apple.com/en-us/ht206167",
         },
         {
            title: "HT206168",
            trust: 0.8,
            url: "https://support.apple.com/en-us/ht206168",
         },
         {
            title: "HT206169",
            trust: 0.8,
            url: "https://support.apple.com/en-us/ht206169",
         },
         {
            title: "HT206166",
            trust: 0.8,
            url: "https://support.apple.com/en-us/ht206166",
         },
         {
            title: "HT206166",
            trust: 0.8,
            url: "https://support.apple.com/ja-jp/ht206166",
         },
         {
            title: "HT206167",
            trust: 0.8,
            url: "https://support.apple.com/ja-jp/ht206167",
         },
         {
            title: "HT206168",
            trust: 0.8,
            url: "https://support.apple.com/ja-jp/ht206168",
         },
         {
            title: "HT206169",
            trust: 0.8,
            url: "https://support.apple.com/ja-jp/ht206169",
         },
         {
            title: "Nghttp2 v1.6.0",
            trust: 0.8,
            url: "https://nghttp2.org/blog/2015/12/23/nghttp2-v1-6-0/",
         },
         {
            title: "nghttp2 Security vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=59541",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-006812",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201601-189",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-119",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-86620",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006812",
         },
         {
            db: "NVD",
            id: "CVE-2015-8659",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.9,
            url: "https://security.gentoo.org/glsa/201612-06",
         },
         {
            trust: 1.8,
            url: "http://lists.apple.com/archives/security-announce/2016/mar/msg00000.html",
         },
         {
            trust: 1.8,
            url: "http://lists.apple.com/archives/security-announce/2016/mar/msg00001.html",
         },
         {
            trust: 1.8,
            url: "http://lists.apple.com/archives/security-announce/2016/mar/msg00002.html",
         },
         {
            trust: 1.8,
            url: "http://lists.apple.com/archives/security-announce/2016/mar/msg00004.html",
         },
         {
            trust: 1.8,
            url: "https://support.apple.com/ht206166",
         },
         {
            trust: 1.8,
            url: "https://support.apple.com/ht206167",
         },
         {
            trust: 1.8,
            url: "https://support.apple.com/ht206168",
         },
         {
            trust: 1.8,
            url: "https://support.apple.com/ht206169",
         },
         {
            trust: 1.8,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-january/175085.html",
         },
         {
            trust: 1.8,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-january/175423.html",
         },
         {
            trust: 1.8,
            url: "http://www.openwall.com/lists/oss-security/2015/12/23/10",
         },
         {
            trust: 1.8,
            url: "http://www.openwall.com/lists/oss-security/2015/12/23/6",
         },
         {
            trust: 1.8,
            url: "http://www.securitytracker.com/id/1035353",
         },
         {
            trust: 1.2,
            url: "https://nghttp2.org/blog/2015/12/23/nghttp2-v1-6-0/",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8659",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/vu/jvnvu97668313/index.html",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8659",
         },
         {
            trust: 0.6,
            url: "http2-v1-6-0/",
         },
         {
            trust: 0.6,
            url: "http2.org/blog/2015/12/23/ng",
         },
         {
            trust: 0.6,
            url: "https://ng",
         },
         {
            trust: 0.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-8659",
         },
         {
            trust: 0.4,
            url: "https://gpgtools.org",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-8035",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1819",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-7499",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0801",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-8242",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-5312",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-7942",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-7500",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1740",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0802",
         },
         {
            trust: 0.3,
            url: "https://nghttp2.org",
         },
         {
            trust: 0.3,
            url: "https://bugzilla.redhat.com/show_bug.cgi?id=1295351",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1751",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1753",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1750",
         },
         {
            trust: 0.3,
            url: "https://www.apple.com/support/security/pgp/",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1752",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1754",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1748",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1755",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1762",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1775",
         },
         {
            trust: 0.2,
            url: "https://support.apple.com/kb/ht201222",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1734",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/119.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://www.securityfocus.com/bid/80438",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1784",
         },
         {
            trust: 0.1,
            url: "https://support.apple.com/kb/ht1222",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1950",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1783",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-7995",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1725",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1727",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1720",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1726",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1724",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1721",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1723",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1722",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1717",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1719",
         },
         {
            trust: 0.1,
            url: "https://www.apple.com/itunes/",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1756",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1757",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1760",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1766",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1761",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1758",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1763",
         },
         {
            trust: 0.1,
            url: "http://www.tencent.com)",
         },
         {
            trust: 0.1,
            url: "http://creativecommons.org/licenses/by-sa/2.5",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-8659",
         },
         {
            trust: 0.1,
            url: "https://security.gentoo.org/",
         },
         {
            trust: 0.1,
            url: "https://bugs.gentoo.org.",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-7551",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0777",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-8472",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-3195",
         },
         {
            trust: 0.1,
            url: "http://www.apple.com/support/downloads/",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-8126",
         },
         {
            trust: 0.1,
            url: "https://support.apple.com/kb/ht206171",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1732",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-9495",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-5334",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1733",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1736",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1735",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0778",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-5333",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1738",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1737",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0973",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-86620",
         },
         {
            db: "VULMON",
            id: "CVE-2015-8659",
         },
         {
            db: "BID",
            id: "80438",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006812",
         },
         {
            db: "PACKETSTORM",
            id: "136344",
         },
         {
            db: "PACKETSTORM",
            id: "136343",
         },
         {
            db: "PACKETSTORM",
            id: "136342",
         },
         {
            db: "PACKETSTORM",
            id: "140013",
         },
         {
            db: "PACKETSTORM",
            id: "136346",
         },
         {
            db: "NVD",
            id: "CVE-2015-8659",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201601-189",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-86620",
         },
         {
            db: "VULMON",
            id: "CVE-2015-8659",
         },
         {
            db: "BID",
            id: "80438",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006812",
         },
         {
            db: "PACKETSTORM",
            id: "136344",
         },
         {
            db: "PACKETSTORM",
            id: "136343",
         },
         {
            db: "PACKETSTORM",
            id: "136342",
         },
         {
            db: "PACKETSTORM",
            id: "140013",
         },
         {
            db: "PACKETSTORM",
            id: "136346",
         },
         {
            db: "NVD",
            id: "CVE-2015-8659",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201601-189",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-01-12T00:00:00",
            db: "VULHUB",
            id: "VHN-86620",
         },
         {
            date: "2016-01-12T00:00:00",
            db: "VULMON",
            id: "CVE-2015-8659",
         },
         {
            date: "2016-01-07T00:00:00",
            db: "BID",
            id: "80438",
         },
         {
            date: "2016-01-21T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-006812",
         },
         {
            date: "2016-03-22T15:12:44",
            db: "PACKETSTORM",
            id: "136344",
         },
         {
            date: "2016-03-22T15:09:54",
            db: "PACKETSTORM",
            id: "136343",
         },
         {
            date: "2016-03-22T15:05:15",
            db: "PACKETSTORM",
            id: "136342",
         },
         {
            date: "2016-12-05T16:57:59",
            db: "PACKETSTORM",
            id: "140013",
         },
         {
            date: "2016-03-22T15:18:02",
            db: "PACKETSTORM",
            id: "136346",
         },
         {
            date: "2016-01-12T19:59:13.223000",
            db: "NVD",
            id: "CVE-2015-8659",
         },
         {
            date: "2016-01-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201601-189",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2019-03-08T00:00:00",
            db: "VULHUB",
            id: "VHN-86620",
         },
         {
            date: "2019-03-08T00:00:00",
            db: "VULMON",
            id: "CVE-2015-8659",
         },
         {
            date: "2016-07-06T14:08:00",
            db: "BID",
            id: "80438",
         },
         {
            date: "2016-03-29T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-006812",
         },
         {
            date: "2019-03-08T16:06:36.980000",
            db: "NVD",
            id: "CVE-2015-8659",
         },
         {
            date: "2019-03-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201601-189",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201601-189",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "nghttp2 Vulnerabilities in idle stream processing",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-006812",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201601-189",
         },
      ],
      trust: 0.6,
   },
}

var-202310-0175
Vulnerability from variot

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

Description:

AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. For further information, refer to the release notes linked to in the References section.

Description:

Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.

Description:

Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.

Description:

nghttp2 contains the Hypertext Transfer Protocol version 2 (HTTP/2) client, server, and proxy programs as well as a library implementing the HTTP/2 protocol in C.

The following data is constructed from data provided by Red Hat's json file at:

https://access.redhat.com/security/data/csaf/v2/advisories/2023/rhsa-2023_5710.json

Red Hat officially shut down their mailing list notifications October 10, 2023. Due to this, Packet Storm has recreated the below data as a reference point to raise awareness. It must be noted that due to an inability to easily track revision updates without crawling Red Hat's archive, these advisories are single notifications and we strongly suggest that you visit the Red Hat provided links to ensure you have the latest information available if the subject matter listed pertains to your environment.

  • Packet Storm Staff

==================================================================== Red Hat Security Advisory

Synopsis: Important: dotnet6.0 security update Advisory ID: RHSA-2023:5710-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2023:5710 Issue date: 2023-10-16 Revision: 01 CVE Names: CVE-2023-44487 ====================================================================

Summary:

An update for dotnet6.0 is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description:

.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET that address a security vulnerability are now available. The updated versions are .NET 6.0 to SDK 6.0.123 and Runtime 6.0.23.

Security Fix(es):

  • HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution:

https://access.redhat.com/articles/11258

CVEs:

CVE-2023-44487

References:

https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/RHSB-2023-003

. ========================================================================== Ubuntu Security Notice USN-6754-1 April 25, 2024

nghttp2 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 23.10
  • Ubuntu 22.04 LTS
  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 LTS (Available with Ubuntu Pro)
  • Ubuntu 16.04 LTS (Available with Ubuntu Pro)

Summary:

Several security issues were fixed in nghttp2.

Software Description: - nghttp2: HTTP/2 C Library and tools

Details:

It was discovered that nghttp2 incorrectly handled the HTTP/2 implementation. A remote attacker could possibly use this issue to cause nghttp2 to consume resources, leading to a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-9511, CVE-2019-9513)

It was discovered that nghttp2 incorrectly handled request cancellation. A remote attacker could possibly use this issue to cause nghttp2 to consume resources, leading to a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2023-44487)

It was discovered that nghttp2 could be made to process an unlimited number of HTTP/2 CONTINUATION frames. A remote attacker could possibly use this issue to cause nghttp2 to consume resources, leading to a denial of service. (CVE-2024-28182)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 23.10: libnghttp2-14 1.55.1-1ubuntu0.2 nghttp2 1.55.1-1ubuntu0.2 nghttp2-client 1.55.1-1ubuntu0.2 nghttp2-proxy 1.55.1-1ubuntu0.2 nghttp2-server 1.55.1-1ubuntu0.2

Ubuntu 22.04 LTS: libnghttp2-14 1.43.0-1ubuntu0.2 nghttp2 1.43.0-1ubuntu0.2 nghttp2-client 1.43.0-1ubuntu0.2 nghttp2-proxy 1.43.0-1ubuntu0.2 nghttp2-server 1.43.0-1ubuntu0.2

Ubuntu 20.04 LTS: libnghttp2-14 1.40.0-1ubuntu0.3 nghttp2 1.40.0-1ubuntu0.3 nghttp2-client 1.40.0-1ubuntu0.3 nghttp2-proxy 1.40.0-1ubuntu0.3 nghttp2-server 1.40.0-1ubuntu0.3

Ubuntu 18.04 LTS (Available with Ubuntu Pro): libnghttp2-14 1.30.0-1ubuntu1+esm2 nghttp2 1.30.0-1ubuntu1+esm2 nghttp2-client 1.30.0-1ubuntu1+esm2 nghttp2-proxy 1.30.0-1ubuntu1+esm2 nghttp2-server 1.30.0-1ubuntu1+esm2

Ubuntu 16.04 LTS (Available with Ubuntu Pro): libnghttp2-14 1.7.1-1ubuntu0.1~esm2 nghttp2 1.7.1-1ubuntu0.1~esm2 nghttp2-client 1.7.1-1ubuntu0.1~esm2 nghttp2-proxy 1.7.1-1ubuntu0.1~esm2 nghttp2-server 1.7.1-1ubuntu0.1~esm2

In general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512

Debian Security Advisory DSA-5558-1 security@debian.org https://www.debian.org/security/ Markus Koschany November 18, 2023 https://www.debian.org/security/faq

Package : netty CVE ID : CVE-2023-34462 CVE-2023-44487 Debian Bug : 1038947 1054234

Two security vulnerabilities have been discovered in Netty, a Java NIO client/server socket framework.

CVE-2023-34462

It might be possible for a remote peer to send a client hello packet during
a TLS handshake which lead the server to buffer up to 16 MB of data per
connection. This could lead to a OutOfMemoryError and so result in a denial
of service. 
This problem is also known as Rapid Reset Attack.

For the oldstable distribution (bullseye), these problems have been fixed in version 1:4.1.48-4+deb11u2.

For the stable distribution (bookworm), these problems have been fixed in version 1:4.1.48-7+deb12u1.

We recommend that you upgrade your netty packages.

For the detailed security status of netty please refer to its security tracker page at: https://security-tracker.debian.org/tracker/netty

Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----

iQKTBAEBCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAmVY5TZfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7 UeRHiBAAzFhW85Ho37J02wrSDVwhIMTsVjNO9lnA08Pswdohr9K1wxeCJ/hBAx97 UNIrjTxyOfCJWi1Kj5pITXEHBRu6w1fj/5y9yoMpAKEu+oGQroHbSf4CPmqP2Of0 eamkfbGx2Dh7Ug3qYxe+elcqRtU3gu8I8DYcWJnm2VpWq7/pbNJ+9iqtmMjhkPLH 1etLI/5HAkwpPimZSrHzcimn39gEVaIbZLc86ZBAoAPghc+iJR1JFHERmkEutWkB eAnL3kD1mr6F711eZvDfPaRfEUVorW67ZEpPX68MJExuYHNXd268EhQOhf/ZYv8g SUSBJuKw4w2OnL4fn8lhqnQgYHUVkcYBtfYii6E9bEVAIPoaT+4gvdSg9zkF6cza Da8SXkEY2ysaX+A24iVnCNMpCMSOUOxWsFFvkCcfi8A4HxGGqWzVOsBbDJKjktS1 g6FyeqWsGh9QG/CPYeMN7LB7lW1l2XzO6GQ9QR1rzU/whgUVxprkye5wx2BaQmom rrWVHBijH1cNWd1IbryAm+prduL1l/CNR0785ZPTjB3SsMFPCAtRHf9G976rqVs0 P3jGg+BdeDj+sd3EFHcHnNXQOaETgR07RWzngbjEkgmJYhB2B43hCQ2LwsNlHsmg O6otUI2k274IF9KHh0T1h1hopbUTU8VPy3dpcLloCzk7KiAv1RI= =4ExT -----END PGP SIGNATURE----- . This software, such as Apache HTTP Server, is common to multiple JBoss middleware products and packaged under Red Hat JBoss Core Services, to allow for faster distribution of updates and for a more consistent update experience

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202310-0175",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "node maintenance operator",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: null,
         },
         {
            model: "big-ip ssl orchestrator",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "16.1.4",
         },
         {
            model: "jboss core services",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: null,
         },
         {
            model: "go",
            scope: "gte",
            trust: 1,
            vendor: "golang",
            version: "1.21.0",
         },
         {
            model: "istio",
            scope: "lt",
            trust: 1,
            vendor: "istio",
            version: "1.19.1",
         },
         {
            model: "big-ip advanced web application firewall",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "15.1.10",
         },
         {
            model: "crosswork zero touch provisioning",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "6.0.0",
         },
         {
            model: "big-ip policy enforcement manager",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "17.1.0",
         },
         {
            model: "integration camel for spring boot",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: null,
         },
         {
            model: "windows 10 1809",
            scope: "lt",
            trust: 1,
            vendor: "microsoft",
            version: "10.0.17763.4974",
         },
         {
            model: "big-ip global traffic manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "15.1.10",
         },
         {
            model: "big-ip application security manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "15.1.0",
         },
         {
            model: "big-ip ddos hybrid defender",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "14.1.0",
         },
         {
            model: "big-ip carrier-grade nat",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "16.1.4",
         },
         {
            model: "advanced cluster security",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "4.0",
         },
         {
            model: "expressway",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "x14.3.3",
         },
         {
            model: "ultra cloud core - policy control function",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2024.01.0",
         },
         {
            model: "traffic server",
            scope: "gte",
            trust: 1,
            vendor: "apache",
            version: "9.0.0",
         },
         {
            model: "big-ip policy enforcement manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "16.1.0",
         },
         {
            model: "visual studio 2022",
            scope: "gte",
            trust: 1,
            vendor: "microsoft",
            version: "17.6",
         },
         {
            model: "big-ip domain name system",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "15.1.0",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 1,
            vendor: "debian",
            version: "11.0",
         },
         {
            model: "big-ip application visibility and reporting",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "15.1.10",
         },
         {
            model: "openshift container platform",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "4.0",
         },
         {
            model: "big-ip advanced firewall manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "14.1.5",
         },
         {
            model: "big-ip advanced firewall manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "13.1.5",
         },
         {
            model: "satellite",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "6.0",
         },
         {
            model: "big-ip policy enforcement manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "15.1.0",
         },
         {
            model: "crosswork data gateway",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "4.1.3",
         },
         {
            model: "big-ip application security manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "14.1.0",
         },
         {
            model: "nx-os",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "10.2\\(7\\)",
         },
         {
            model: "nginx plus",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "r25",
         },
         {
            model: "big-ip advanced web application firewall",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "14.1.5",
         },
         {
            model: "big-ip websafe",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "15.1.10",
         },
         {
            model: "service interconnect",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "1.0",
         },
         {
            model: "fog director",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "1.22",
         },
         {
            model: "unified contact center domain manager",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: null,
         },
         {
            model: "big-ip access policy manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "16.1.4",
         },
         {
            model: "big-ip advanced web application firewall",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "13.1.5",
         },
         {
            model: "asp.net core",
            scope: "lt",
            trust: 1,
            vendor: "microsoft",
            version: "7.0.12",
         },
         {
            model: "migration toolkit for applications",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "6.0",
         },
         {
            model: "big-ip carrier-grade nat",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "16.1.0",
         },
         {
            model: "big-ip ddos hybrid defender",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "17.1.0",
         },
         {
            model: "crosswork data gateway",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.0",
         },
         {
            model: "big-ip global traffic manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "13.1.5",
         },
         {
            model: "go",
            scope: "lt",
            trust: 1,
            vendor: "golang",
            version: "1.20.10",
         },
         {
            model: "big-ip link controller",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "13.1.0",
         },
         {
            model: "big-ip local traffic manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "13.1.0",
         },
         {
            model: "big-ip webaccelerator",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "16.1.0",
         },
         {
            model: ".net",
            scope: "lt",
            trust: 1,
            vendor: "microsoft",
            version: "6.0.23",
         },
         {
            model: "ultra cloud core - policy control function",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "2024.01.0",
         },
         {
            model: "big-ip domain name system",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "14.1.0",
         },
         {
            model: "enterprise chat and email",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: null,
         },
         {
            model: "tomcat",
            scope: "lte",
            trust: 1,
            vendor: "apache",
            version: "8.5.93",
         },
         {
            model: "proxygen",
            scope: "lt",
            trust: 1,
            vendor: "facebook",
            version: "2023.10.16.00",
         },
         {
            model: "big-ip application acceleration manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "13.1.0",
         },
         {
            model: "big-ip link controller",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "15.1.10",
         },
         {
            model: "process automation",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.0",
         },
         {
            model: "big-ip local traffic manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "15.1.10",
         },
         {
            model: "big-ip application acceleration manager",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "17.1.0",
         },
         {
            model: "build of optaplanner",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "8.0",
         },
         {
            model: "jenkins",
            scope: "lte",
            trust: 1,
            vendor: "jenkins",
            version: "2.427",
         },
         {
            model: "visual studio 2022",
            scope: "lt",
            trust: 1,
            vendor: "microsoft",
            version: "17.7.5",
         },
         {
            model: "telepresence video communication server",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "x14.3.3",
         },
         {
            model: "big-ip analytics",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "15.1.0",
         },
         {
            model: "big-ip fraud protection service",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "15.1.10",
         },
         {
            model: "big-ip ssl orchestrator",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "17.1.0",
         },
         {
            model: "big-ip global traffic manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "16.1.4",
         },
         {
            model: "big-ip policy enforcement manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "14.1.0",
         },
         {
            model: "big-ip webaccelerator",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "15.1.0",
         },
         {
            model: "big-ip application visibility and reporting",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "14.1.5",
         },
         {
            model: "nginx plus",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "r30",
         },
         {
            model: "big-ip application visibility and reporting",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "13.1.5",
         },
         {
            model: "node.js",
            scope: "lt",
            trust: 1,
            vendor: "nodejs",
            version: "20.8.1",
         },
         {
            model: "big-ip carrier-grade nat",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "17.1.0",
         },
         {
            model: "swiftnio http\\/2",
            scope: "lt",
            trust: 1,
            vendor: "apple",
            version: "1.28.0",
         },
         {
            model: "linkerd",
            scope: "eq",
            trust: 1,
            vendor: "linkerd",
            version: "2.13.0",
         },
         {
            model: "caddy",
            scope: "lt",
            trust: 1,
            vendor: "caddyserver",
            version: "2.7.5",
         },
         {
            model: "tomcat",
            scope: "gte",
            trust: 1,
            vendor: "apache",
            version: "10.1.0",
         },
         {
            model: "astra control center",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "fence agents remediation operator",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: null,
         },
         {
            model: "cert-manager operator for red hat openshift",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: null,
         },
         {
            model: "big-ip ddos hybrid defender",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "13.1.0",
         },
         {
            model: "advanced cluster management for kubernetes",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "2.0",
         },
         {
            model: "big-ip analytics",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "14.1.0",
         },
         {
            model: "solr",
            scope: "lt",
            trust: 1,
            vendor: "apache",
            version: "9.4.0",
         },
         {
            model: "big-ip webaccelerator",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "14.1.0",
         },
         {
            model: "big-ip local traffic manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "14.1.5",
         },
         {
            model: "secure web appliance",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "15.1.0",
         },
         {
            model: "big-ip local traffic manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "13.1.5",
         },
         {
            model: "big-ip websafe",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "16.1.4",
         },
         {
            model: "big-ip global traffic manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "16.1.0",
         },
         {
            model: "3scale api management platform",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "2.0",
         },
         {
            model: "big-ip fraud protection service",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "13.1.5",
         },
         {
            model: "http",
            scope: "eq",
            trust: 1,
            vendor: "ietf",
            version: "2.0",
         },
         {
            model: "openshift",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: null,
         },
         {
            model: "big-ip access policy manager",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "17.1.0",
         },
         {
            model: "certification for red hat enterprise linux",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "8.0",
         },
         {
            model: "big-ip analytics",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "16.1.4",
         },
         {
            model: "big-ip advanced web application firewall",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "15.1.0",
         },
         {
            model: "big-ip application acceleration manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "15.1.10",
         },
         {
            model: "migration toolkit for containers",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: null,
         },
         {
            model: ".net",
            scope: "lt",
            trust: 1,
            vendor: "microsoft",
            version: "7.0.12",
         },
         {
            model: "big-ip global traffic manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "15.1.0",
         },
         {
            model: "big-ip link controller",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "16.1.4",
         },
         {
            model: "visual studio 2022",
            scope: "lt",
            trust: 1,
            vendor: "microsoft",
            version: "17.2.20",
         },
         {
            model: "big-ip local traffic manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "16.1.4",
         },
         {
            model: "go",
            scope: "lt",
            trust: 1,
            vendor: "golang",
            version: "1.21.3",
         },
         {
            model: "windows 11 21h2",
            scope: "lt",
            trust: 1,
            vendor: "microsoft",
            version: "10.0.22000.2538",
         },
         {
            model: "jetty",
            scope: "lt",
            trust: 1,
            vendor: "eclipse",
            version: "9.4.53",
         },
         {
            model: "big-ip fraud protection service",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "16.1.4",
         },
         {
            model: "big-ip webaccelerator",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "15.1.10",
         },
         {
            model: "jenkins",
            scope: "lte",
            trust: 1,
            vendor: "jenkins",
            version: "2.414.2",
         },
         {
            model: "traffic server",
            scope: "lt",
            trust: 1,
            vendor: "apache",
            version: "8.1.9",
         },
         {
            model: "tomcat",
            scope: "eq",
            trust: 1,
            vendor: "apache",
            version: "11.0.0",
         },
         {
            model: "apisix",
            scope: "lt",
            trust: 1,
            vendor: "apache",
            version: "3.6.1",
         },
         {
            model: "certification for red hat enterprise linux",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "9.0",
         },
         {
            model: "big-ip websafe",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "16.1.0",
         },
         {
            model: "jboss a-mq streams",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: null,
         },
         {
            model: "big-ip domain name system",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "17.1.0",
         },
         {
            model: "ios xr",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "7.11.2",
         },
         {
            model: "ultra cloud core - session management function",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "2024.02.0",
         },
         {
            model: "big-ip advanced web application firewall",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "14.1.0",
         },
         {
            model: "varnish cache",
            scope: "lt",
            trust: 1,
            vendor: "varnish cache",
            version: "2023-10-10",
         },
         {
            model: "single sign-on",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.0",
         },
         {
            model: "big-ip ssl orchestrator",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "16.1.0",
         },
         {
            model: "windows 10 1607",
            scope: "lt",
            trust: 1,
            vendor: "microsoft",
            version: "10.0.14393.6351",
         },
         {
            model: "linkerd",
            scope: "eq",
            trust: 1,
            vendor: "linkerd",
            version: "2.14.1",
         },
         {
            model: "envoy",
            scope: "eq",
            trust: 1,
            vendor: "envoyproxy",
            version: "1.25.9",
         },
         {
            model: "jboss data grid",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.0.0",
         },
         {
            model: "big-ip global traffic manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "14.1.0",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 1,
            vendor: "debian",
            version: "12.0",
         },
         {
            model: "big-ip policy enforcement manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "13.1.0",
         },
         {
            model: "machine deletion remediation operator",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: null,
         },
         {
            model: "big-ip application acceleration manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "14.1.5",
         },
         {
            model: "big-ip websafe",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "15.1.0",
         },
         {
            model: "visual studio 2022",
            scope: "gte",
            trust: 1,
            vendor: "microsoft",
            version: "17.4",
         },
         {
            model: "nginx plus",
            scope: "lt",
            trust: 1,
            vendor: "f5",
            version: "r29",
         },
         {
            model: "big-ip application acceleration manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "13.1.5",
         },
         {
            model: "grpc",
            scope: "lt",
            trust: 1,
            vendor: "grpc",
            version: "1.56.3",
         },
         {
            model: "big-ip application security manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "16.1.0",
         },
         {
            model: "openresty",
            scope: "lt",
            trust: 1,
            vendor: "openresty",
            version: "1.21.4.3",
         },
         {
            model: "nginx",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "1.9.5",
         },
         {
            model: "big-ip ssl orchestrator",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "15.1.0",
         },
         {
            model: "big-ip webaccelerator",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "14.1.5",
         },
         {
            model: "nginx plus",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "r29",
         },
         {
            model: "fedora",
            scope: "eq",
            trust: 1,
            vendor: "fedoraproject",
            version: "38",
         },
         {
            model: "big-ip webaccelerator",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "13.1.5",
         },
         {
            model: "windows 10 21h2",
            scope: "lt",
            trust: 1,
            vendor: "microsoft",
            version: "10.0.19044.3570",
         },
         {
            model: "big-ip application security manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "14.1.5",
         },
         {
            model: "istio",
            scope: "lt",
            trust: 1,
            vendor: "istio",
            version: "1.17.6",
         },
         {
            model: "advanced cluster security",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "3.0",
         },
         {
            model: "big-ip application security manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "13.1.5",
         },
         {
            model: "big-ip domain name system",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "16.1.0",
         },
         {
            model: "big-ip carrier-grade nat",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "13.1.0",
         },
         {
            model: "openstack platform",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "17.1",
         },
         {
            model: "windows server 2022",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "17.1.0",
         },
         {
            model: "big-ip webaccelerator",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "13.1.0",
         },
         {
            model: "big-ip advanced web application firewall",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "17.1.0",
         },
         {
            model: "big-ip websafe",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "14.1.0",
         },
         {
            model: "cbl-mariner",
            scope: "lt",
            trust: 1,
            vendor: "microsoft",
            version: "2023-10-11",
         },
         {
            model: "big-ip advanced firewall manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "14.1.0",
         },
         {
            model: "traefik",
            scope: "lt",
            trust: 1,
            vendor: "traefik",
            version: "2.10.5",
         },
         {
            model: "openshift data science",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: null,
         },
         {
            model: "big-ip global traffic manager",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "17.1.0",
         },
         {
            model: "big-ip ddos hybrid defender",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "14.1.5",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "17.1.0",
         },
         {
            model: "node healthcheck operator",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: null,
         },
         {
            model: "big-ip ddos hybrid defender",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "13.1.5",
         },
         {
            model: "openshift gitops",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: null,
         },
         {
            model: "big-ip access policy manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "16.1.0",
         },
         {
            model: "big-ip ssl orchestrator",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "14.1.0",
         },
         {
            model: "data center network manager",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: null,
         },
         {
            model: "openshift container platform assisted installer",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: null,
         },
         {
            model: "ultra cloud core - serving gateway function",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "2024.02.0",
         },
         {
            model: "jetty",
            scope: "lt",
            trust: 1,
            vendor: "eclipse",
            version: "12.0.2",
         },
         {
            model: "opensearch data prepper",
            scope: "lt",
            trust: 1,
            vendor: "amazon",
            version: "2.5.0",
         },
         {
            model: "prime network registrar",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "11.2",
         },
         {
            model: "nx-os",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "10.3\\(5\\)",
         },
         {
            model: "linkerd",
            scope: "eq",
            trust: 1,
            vendor: "linkerd",
            version: "2.13.1",
         },
         {
            model: "big-ip next service proxy for kubernetes",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "1.5.0",
         },
         {
            model: "openshift serverless",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: null,
         },
         {
            model: "big-ip policy enforcement manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "15.1.10",
         },
         {
            model: "http2",
            scope: "lt",
            trust: 1,
            vendor: "golang",
            version: "0.17.0",
         },
         {
            model: "big-ip access policy manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "15.1.0",
         },
         {
            model: "istio",
            scope: "gte",
            trust: 1,
            vendor: "istio",
            version: "1.18.0",
         },
         {
            model: "big-ip analytics",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "16.1.0",
         },
         {
            model: "oncommand insight",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "big-ip advanced firewall manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "16.1.4",
         },
         {
            model: "big-ip link controller",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "15.1.0",
         },
         {
            model: "big-ip local traffic manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "15.1.0",
         },
         {
            model: "jboss fuse",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "6.0.0",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 1,
            vendor: "debian",
            version: "10.0",
         },
         {
            model: "node.js",
            scope: "gte",
            trust: 1,
            vendor: "nodejs",
            version: "18.0.0",
         },
         {
            model: "traefik",
            scope: "eq",
            trust: 1,
            vendor: "traefik",
            version: "3.0.0",
         },
         {
            model: "big-ip fraud protection service",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "16.1.0",
         },
         {
            model: "big-ip advanced web application firewall",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "16.1.4",
         },
         {
            model: "windows 10 22h2",
            scope: "lt",
            trust: 1,
            vendor: "microsoft",
            version: "10.0.19045.3570",
         },
         {
            model: "big-ip carrier-grade nat",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "15.1.10",
         },
         {
            model: "http server",
            scope: "lt",
            trust: 1,
            vendor: "akka",
            version: "10.5.3",
         },
         {
            model: "big-ip global traffic manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "13.1.0",
         },
         {
            model: "ansible automation platform",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "2.0",
         },
         {
            model: "envoy",
            scope: "eq",
            trust: 1,
            vendor: "envoyproxy",
            version: "1.24.10",
         },
         {
            model: "http2",
            scope: "lt",
            trust: 1,
            vendor: "kazu yamamoto",
            version: "4.2.2",
         },
         {
            model: "big-ip access policy manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "14.1.0",
         },
         {
            model: "cryostat",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "2.0",
         },
         {
            model: "openshift distributed tracing",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: null,
         },
         {
            model: "unified contact center management portal",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: null,
         },
         {
            model: "big-ip fraud protection service",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "15.1.0",
         },
         {
            model: "kong gateway",
            scope: "lt",
            trust: 1,
            vendor: "konghq",
            version: "3.4.2",
         },
         {
            model: "istio",
            scope: "gte",
            trust: 1,
            vendor: "istio",
            version: "1.19.0",
         },
         {
            model: "big-ip policy enforcement manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "14.1.5",
         },
         {
            model: "big-ip policy enforcement manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "13.1.5",
         },
         {
            model: "big-ip link controller",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "14.1.0",
         },
         {
            model: "big-ip local traffic manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "14.1.0",
         },
         {
            model: "tomcat",
            scope: "gte",
            trust: 1,
            vendor: "apache",
            version: "8.5.0",
         },
         {
            model: "support for spring boot",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: null,
         },
         {
            model: "big-ip application visibility and reporting",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "16.1.4",
         },
         {
            model: "big-ip ssl orchestrator",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "14.1.5",
         },
         {
            model: "jboss fuse",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.0.0",
         },
         {
            model: "big-ip ssl orchestrator",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "13.1.5",
         },
         {
            model: "big-ip advanced web application firewall",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "16.1.0",
         },
         {
            model: "windows server 2016",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "big-ip access policy manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "15.1.10",
         },
         {
            model: "big-ip websafe",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "13.1.0",
         },
         {
            model: "grpc",
            scope: "gte",
            trust: 1,
            vendor: "grpc",
            version: "1.58.0",
         },
         {
            model: "build of quarkus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: null,
         },
         {
            model: "logging subsystem for red hat openshift",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: null,
         },
         {
            model: "big-ip carrier-grade nat",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "14.1.5",
         },
         {
            model: "jetty",
            scope: "lt",
            trust: 1,
            vendor: "eclipse",
            version: "11.0.17",
         },
         {
            model: "big-ip fraud protection service",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "14.1.0",
         },
         {
            model: "big-ip carrier-grade nat",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "13.1.5",
         },
         {
            model: "big-ip ssl orchestrator",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "13.1.0",
         },
         {
            model: "cost management",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: null,
         },
         {
            model: "traffic server",
            scope: "gte",
            trust: 1,
            vendor: "apache",
            version: "8.0.0",
         },
         {
            model: "service telemetry framework",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "1.5",
         },
         {
            model: "big-ip advanced firewall manager",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "17.1.0",
         },
         {
            model: "big-ip application security manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "13.1.0",
         },
         {
            model: "visual studio 2022",
            scope: "lt",
            trust: 1,
            vendor: "microsoft",
            version: "17.6.8",
         },
         {
            model: "secure malware analytics",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "2.19.2",
         },
         {
            model: "quay",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "3.0.0",
         },
         {
            model: "linkerd",
            scope: "eq",
            trust: 1,
            vendor: "linkerd",
            version: "2.14.0",
         },
         {
            model: "big-ip application visibility and reporting",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "16.1.0",
         },
         {
            model: "windows 11 22h2",
            scope: "lt",
            trust: 1,
            vendor: "microsoft",
            version: "10.0.22621.2428",
         },
         {
            model: "big-ip application security manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "15.1.10",
         },
         {
            model: "decision manager",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.0",
         },
         {
            model: "grpc",
            scope: "lte",
            trust: 1,
            vendor: "grpc",
            version: "1.59.2",
         },
         {
            model: "nghttp2",
            scope: "lt",
            trust: 1,
            vendor: "nghttp2",
            version: "1.57.0",
         },
         {
            model: "openshift service mesh",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "2.0",
         },
         {
            model: "big-ip domain name system",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "13.1.0",
         },
         {
            model: "grpc",
            scope: "lt",
            trust: 1,
            vendor: "grpc",
            version: "1.58.3",
         },
         {
            model: "openstack platform",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "16.2",
         },
         {
            model: "big-ip advanced firewall manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "16.1.0",
         },
         {
            model: "big-ip access policy manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "14.1.5",
         },
         {
            model: "prime cable provisioning",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "7.2.1",
         },
         {
            model: "visual studio 2022",
            scope: "gte",
            trust: 1,
            vendor: "microsoft",
            version: "17.0",
         },
         {
            model: "big-ip application visibility and reporting",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "15.1.0",
         },
         {
            model: "tomcat",
            scope: "gte",
            trust: 1,
            vendor: "apache",
            version: "9.0.0",
         },
         {
            model: "openshift virtualization",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "4",
         },
         {
            model: "big-ip access policy manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "13.1.5",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "6.0",
         },
         {
            model: "big-ip ddos hybrid defender",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "15.1.10",
         },
         {
            model: "openshift secondary scheduler operator",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: null,
         },
         {
            model: "jboss enterprise application platform",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "6.0.0",
         },
         {
            model: "big-ip advanced firewall manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "15.1.0",
         },
         {
            model: "big-ip application visibility and reporting",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "17.1.0",
         },
         {
            model: "big-ip access policy manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "13.1.0",
         },
         {
            model: "linkerd",
            scope: "gte",
            trust: 1,
            vendor: "linkerd",
            version: "2.12.0",
         },
         {
            model: "openshift api for data protection",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: null,
         },
         {
            model: "big-ip global traffic manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "14.1.5",
         },
         {
            model: "node.js",
            scope: "lt",
            trust: 1,
            vendor: "nodejs",
            version: "18.18.2",
         },
         {
            model: "jboss a-mq",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "fedora",
            scope: "eq",
            trust: 1,
            vendor: "fedoraproject",
            version: "37",
         },
         {
            model: "prime access registrar",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "9.3.3",
         },
         {
            model: "unified contact center enterprise - live data server",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "12.6.2",
         },
         {
            model: "networking",
            scope: "lt",
            trust: 1,
            vendor: "golang",
            version: "0.17.0",
         },
         {
            model: "armeria",
            scope: "lt",
            trust: 1,
            vendor: "linecorp",
            version: "1.26.0",
         },
         {
            model: "big-ip websafe",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "17.1.0",
         },
         {
            model: "big-ip analytics",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "15.1.10",
         },
         {
            model: "big-ip application visibility and reporting",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "14.1.0",
         },
         {
            model: "big-ip next",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "20.0.1",
         },
         {
            model: "ios xe",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "17.15.1",
         },
         {
            model: "nx-os",
            scope: "gte",
            trust: 1,
            vendor: "cisco",
            version: "10.3\\(1\\)",
         },
         {
            model: "openstack platform",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "16.1",
         },
         {
            model: "grpc",
            scope: "eq",
            trust: 1,
            vendor: "grpc",
            version: "1.57.0",
         },
         {
            model: "big-ip application acceleration manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "16.1.4",
         },
         {
            model: "openshift dev spaces",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: null,
         },
         {
            model: "jetty",
            scope: "gte",
            trust: 1,
            vendor: "eclipse",
            version: "12.0.0",
         },
         {
            model: "big-ip analytics",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "13.1.0",
         },
         {
            model: "big-ip carrier-grade nat",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "15.1.0",
         },
         {
            model: "prime infrastructure",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "3.10.4",
         },
         {
            model: "h2o",
            scope: "lt",
            trust: 1,
            vendor: "dena",
            version: "2023-10-10",
         },
         {
            model: "nginx ingress controller",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "3.0.0",
         },
         {
            model: "openshift pipelines",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: null,
         },
         {
            model: "big-ip webaccelerator",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "16.1.4",
         },
         {
            model: "big-ip local traffic manager",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "17.1.0",
         },
         {
            model: "jetty",
            scope: "gte",
            trust: 1,
            vendor: "eclipse",
            version: "10.0.0",
         },
         {
            model: "big-ip application security manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "16.1.4",
         },
         {
            model: "big-ip fraud protection service",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "13.1.0",
         },
         {
            model: "big-ip fraud protection service",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "17.1.0",
         },
         {
            model: "jboss enterprise application platform",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.0.0",
         },
         {
            model: "unified contact center enterprise",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: null,
         },
         {
            model: "big-ip domain name system",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "15.1.10",
         },
         {
            model: "istio",
            scope: "lt",
            trust: 1,
            vendor: "istio",
            version: "1.18.3",
         },
         {
            model: "big-ip websafe",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "14.1.5",
         },
         {
            model: "secure dynamic attributes connector",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "2.2.0",
         },
         {
            model: "big-ip websafe",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "13.1.5",
         },
         {
            model: "ceph storage",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "5.0",
         },
         {
            model: "run once duration override operator",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: null,
         },
         {
            model: "big-ip link controller",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "16.1.0",
         },
         {
            model: "big-ip local traffic manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "16.1.0",
         },
         {
            model: "integration camel k",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: null,
         },
         {
            model: "visual studio 2022",
            scope: "gte",
            trust: 1,
            vendor: "microsoft",
            version: "17.7",
         },
         {
            model: "big-ip carrier-grade nat",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "14.1.0",
         },
         {
            model: "big-ip ddos hybrid defender",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "16.1.4",
         },
         {
            model: "big-ip analytics",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "14.1.5",
         },
         {
            model: "envoy",
            scope: "eq",
            trust: 1,
            vendor: "envoyproxy",
            version: "1.27.0",
         },
         {
            model: "nginx ingress controller",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "2.4.2",
         },
         {
            model: "big-ip application acceleration manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "16.1.0",
         },
         {
            model: "integration service registry",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: null,
         },
         {
            model: "firepower threat defense",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "7.4.2",
         },
         {
            model: "big-ip analytics",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "13.1.5",
         },
         {
            model: "node.js",
            scope: "gte",
            trust: 1,
            vendor: "nodejs",
            version: "20.0.0",
         },
         {
            model: "tomcat",
            scope: "lte",
            trust: 1,
            vendor: "apache",
            version: "9.0.80",
         },
         {
            model: "iot field network director",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "4.11.0",
         },
         {
            model: "big-ip link controller",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "14.1.5",
         },
         {
            model: "asp.net core",
            scope: "gte",
            trust: 1,
            vendor: "microsoft",
            version: "6.0.0",
         },
         {
            model: "migration toolkit for virtualization",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: null,
         },
         {
            model: "big-ip link controller",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "13.1.5",
         },
         {
            model: "big-ip ssl orchestrator",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "15.1.10",
         },
         {
            model: "big-ip fraud protection service",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "14.1.5",
         },
         {
            model: ".net",
            scope: "gte",
            trust: 1,
            vendor: "microsoft",
            version: "6.0.0",
         },
         {
            model: "jetty",
            scope: "gte",
            trust: 1,
            vendor: "eclipse",
            version: "11.0.0",
         },
         {
            model: "big-ip application acceleration manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "15.1.0",
         },
         {
            model: "unified attendant console advanced",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: null,
         },
         {
            model: "big-ip advanced web application firewall",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "13.1.0",
         },
         {
            model: "big-ip domain name system",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "14.1.5",
         },
         {
            model: "web terminal",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: null,
         },
         {
            model: "big-ip domain name system",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "13.1.5",
         },
         {
            model: "traffic server",
            scope: "lt",
            trust: 1,
            vendor: "apache",
            version: "9.2.3",
         },
         {
            model: "windows server 2019",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "linkerd",
            scope: "lte",
            trust: 1,
            vendor: "linkerd",
            version: "2.12.5",
         },
         {
            model: "jetty",
            scope: "lt",
            trust: 1,
            vendor: "eclipse",
            version: "10.0.17",
         },
         {
            model: "network observability operator",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: null,
         },
         {
            model: "big-ip ddos hybrid defender",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "16.1.0",
         },
         {
            model: "visual studio 2022",
            scope: "lt",
            trust: 1,
            vendor: "microsoft",
            version: "17.4.12",
         },
         {
            model: "azure kubernetes service",
            scope: "lt",
            trust: 1,
            vendor: "microsoft",
            version: "2023-10-08",
         },
         {
            model: "openshift sandboxed containers",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: null,
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "17.1.0",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "8.0",
         },
         {
            model: "big-ip domain name system",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "16.1.4",
         },
         {
            model: "tomcat",
            scope: "lte",
            trust: 1,
            vendor: "apache",
            version: "10.1.13",
         },
         {
            model: "big-ip application visibility and reporting",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "13.1.0",
         },
         {
            model: "big-ip application acceleration manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "14.1.0",
         },
         {
            model: "big-ip application security manager",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "17.1.0",
         },
         {
            model: "big-ip next service proxy for kubernetes",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "1.8.2",
         },
         {
            model: "asp.net core",
            scope: "gte",
            trust: 1,
            vendor: "microsoft",
            version: "7.0.0",
         },
         {
            model: "big-ip ddos hybrid defender",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "15.1.0",
         },
         {
            model: "nginx ingress controller",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "2.0.0",
         },
         {
            model: "asp.net core",
            scope: "lt",
            trust: 1,
            vendor: "microsoft",
            version: "6.0.23",
         },
         {
            model: "openshift developer tools and services",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: null,
         },
         {
            model: "connected mobile experiences",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "11.1",
         },
         {
            model: "nginx ingress controller",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "3.3.0",
         },
         {
            model: ".net",
            scope: "gte",
            trust: 1,
            vendor: "microsoft",
            version: "7.0.0",
         },
         {
            model: "contour",
            scope: "lt",
            trust: 1,
            vendor: "projectcontour",
            version: "2023-10-11",
         },
         {
            model: "big-ip policy enforcement manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "16.1.4",
         },
         {
            model: "big-ip advanced firewall manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "13.1.0",
         },
         {
            model: "self node remediation operator",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: null,
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "9.0",
         },
         {
            model: "nginx",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "1.25.2",
         },
         {
            model: "big-ip advanced firewall manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "15.1.10",
         },
         {
            model: "envoy",
            scope: "eq",
            trust: 1,
            vendor: "envoyproxy",
            version: "1.26.4",
         },
         {
            model: "netty",
            scope: "lt",
            trust: 1,
            vendor: "netty",
            version: "4.1.100",
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2023-44487",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:ietf:http:2.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:nghttp2:nghttp2:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "1.57.0",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:netty:netty:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "4.1.100",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:envoyproxy:envoy:1.27.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:envoyproxy:envoy:1.26.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:envoyproxy:envoy:1.25.9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:envoyproxy:envoy:1.24.10:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "12.0.2",
                        versionStartIncluding: "12.0.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "11.0.17",
                        versionStartIncluding: "11.0.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "10.0.17",
                        versionStartIncluding: "10.0.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "9.4.53",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:caddyserver:caddy:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "2.7.5",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:golang:http2:*:*:*:*:*:go:*:*",
                        cpe_name: [],
                        versionEndExcluding: "0.17.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "1.21.3",
                        versionStartIncluding: "1.21.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "1.20.10",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:golang:networking:*:*:*:*:*:go:*:*",
                        cpe_name: [],
                        versionEndExcluding: "0.17.0",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "13.1.5",
                        versionStartIncluding: "13.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "13.1.5",
                        versionStartIncluding: "13.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "13.1.5",
                        versionStartIncluding: "13.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "13.1.5",
                        versionStartIncluding: "13.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "13.1.5",
                        versionStartIncluding: "13.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "13.1.5",
                        versionStartIncluding: "13.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "13.1.5",
                        versionStartIncluding: "13.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "13.1.5",
                        versionStartIncluding: "13.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "13.1.5",
                        versionStartIncluding: "13.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "13.1.5",
                        versionStartIncluding: "13.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "13.1.5",
                        versionStartIncluding: "13.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "13.1.5",
                        versionStartIncluding: "13.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "13.1.5",
                        versionStartIncluding: "13.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "13.1.5",
                        versionStartIncluding: "13.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "13.1.5",
                        versionStartIncluding: "13.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "13.1.5",
                        versionStartIncluding: "13.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "13.1.5",
                        versionStartIncluding: "13.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "13.1.5",
                        versionStartIncluding: "13.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "14.1.5",
                        versionStartIncluding: "14.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "14.1.5",
                        versionStartIncluding: "14.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "14.1.5",
                        versionStartIncluding: "14.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "14.1.5",
                        versionStartIncluding: "14.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "14.1.5",
                        versionStartIncluding: "14.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "14.1.5",
                        versionStartIncluding: "14.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "14.1.5",
                        versionStartIncluding: "14.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "14.1.5",
                        versionStartIncluding: "14.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "14.1.5",
                        versionStartIncluding: "14.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "14.1.5",
                        versionStartIncluding: "14.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "14.1.5",
                        versionStartIncluding: "14.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "14.1.5",
                        versionStartIncluding: "14.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "14.1.5",
                        versionStartIncluding: "14.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "14.1.5",
                        versionStartIncluding: "14.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "14.1.5",
                        versionStartIncluding: "14.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "14.1.5",
                        versionStartIncluding: "14.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "14.1.5",
                        versionStartIncluding: "14.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "14.1.5",
                        versionStartIncluding: "14.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "15.1.10",
                        versionStartIncluding: "15.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "16.1.4",
                        versionStartIncluding: "16.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "15.1.10",
                        versionStartIncluding: "15.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "16.1.4",
                        versionStartIncluding: "16.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "15.1.10",
                        versionStartIncluding: "15.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "16.1.4",
                        versionStartIncluding: "16.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "15.1.10",
                        versionStartIncluding: "15.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "16.1.4",
                        versionStartIncluding: "16.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "15.1.10",
                        versionStartIncluding: "15.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "16.1.4",
                        versionStartIncluding: "16.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "15.1.10",
                        versionStartIncluding: "15.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "16.1.4",
                        versionStartIncluding: "16.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "15.1.10",
                        versionStartIncluding: "15.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "16.1.4",
                        versionStartIncluding: "16.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "15.1.10",
                        versionStartIncluding: "15.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "16.1.4",
                        versionStartIncluding: "16.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "15.1.10",
                        versionStartIncluding: "15.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "16.1.4",
                        versionStartIncluding: "16.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "15.1.10",
                        versionStartIncluding: "15.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "16.1.4",
                        versionStartIncluding: "16.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "15.1.10",
                        versionStartIncluding: "15.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "16.1.4",
                        versionStartIncluding: "16.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "15.1.10",
                        versionStartIncluding: "15.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "16.1.4",
                        versionStartIncluding: "16.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "15.1.10",
                        versionStartIncluding: "15.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "16.1.4",
                        versionStartIncluding: "16.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "15.1.10",
                        versionStartIncluding: "15.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "16.1.4",
                        versionStartIncluding: "16.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "15.1.10",
                        versionStartIncluding: "15.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "16.1.4",
                        versionStartIncluding: "16.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "15.1.10",
                        versionStartIncluding: "15.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "16.1.4",
                        versionStartIncluding: "16.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "15.1.10",
                        versionStartIncluding: "15.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "16.1.4",
                        versionStartIncluding: "16.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "15.1.10",
                        versionStartIncluding: "15.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "16.1.4",
                        versionStartIncluding: "16.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "r29",
                        versionStartIncluding: "r25",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "1.8.2",
                        versionStartIncluding: "1.5.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "1.25.2",
                        versionStartIncluding: "1.9.5",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "2.4.2",
                        versionStartIncluding: "2.0.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "3.3.0",
                        versionStartIncluding: "3.0.0",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:apache:tomcat:11.0.0:milestone1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:apache:tomcat:11.0.0:milestone2:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:apache:tomcat:11.0.0:milestone4:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:apache:tomcat:11.0.0:milestone3:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:apache:tomcat:11.0.0:milestone5:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:apache:tomcat:11.0.0:milestone7:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:apache:tomcat:11.0.0:milestone8:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:apache:tomcat:11.0.0:milestone9:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:apache:tomcat:11.0.0:milestone10:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:apache:tomcat:11.0.0:milestone6:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:apache:tomcat:11.0.0:milestone11:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "9.0.80",
                        versionStartIncluding: "9.0.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "8.5.93",
                        versionStartIncluding: "8.5.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "10.1.13",
                        versionStartIncluding: "10.1.0",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:apple:swiftnio_http\\/2:*:*:*:*:*:swift:*:*",
                        cpe_name: [],
                        versionEndExcluding: "1.28.0",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:grpc:grpc:1.57.0:-:*:*:*:go:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:grpc:grpc:*:*:*:*:*:go:*:*",
                        cpe_name: [],
                        versionEndExcluding: "1.58.3",
                        versionStartIncluding: "1.58.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:grpc:grpc:*:*:*:*:*:go:*:*",
                        cpe_name: [],
                        versionEndExcluding: "1.56.3",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:grpc:grpc:*:*:*:*:*:-:*:*",
                        cpe_name: [],
                        versionEndIncluding: "1.59.2",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "10.0.19045.3570",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "10.0.17763.4974",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "10.0.22000.2538",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "10.0.22621.2428",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
                        cpe_name: [],
                        versionEndExcluding: "10.0.14393.6351",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
                        cpe_name: [],
                        versionEndExcluding: "10.0.14393.6351",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "7.0.12",
                        versionStartIncluding: "7.0.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "10.0.19044.3570",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "17.7.5",
                        versionStartIncluding: "17.7",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "17.6.8",
                        versionStartIncluding: "17.6",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "17.4.12",
                        versionStartIncluding: "17.4",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "17.2.20",
                        versionStartIncluding: "17.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "6.0.23",
                        versionStartIncluding: "6.0.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "7.0.12",
                        versionStartIncluding: "7.0.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "6.0.23",
                        versionStartIncluding: "6.0.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:microsoft:azure_kubernetes_service:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "2023-10-08",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "18.18.2",
                        versionStartIncluding: "18.0.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "20.8.1",
                        versionStartIncluding: "20.0.0",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:microsoft:cbl-mariner:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "2023-10-11",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:dena:h2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "2023-10-10",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:facebook:proxygen:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "2023.10.16.00",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "9.2.3",
                        versionStartIncluding: "9.0.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "8.1.9",
                        versionStartIncluding: "8.0.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:apache:apisix:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "3.6.1",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:amazon:opensearch_data_prepper:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "2.5.0",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:kazu-yamamoto:http2:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "4.2.2",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "1.19.1",
                        versionStartIncluding: "1.19.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "1.18.3",
                        versionStartIncluding: "1.18.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "1.17.6",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:varnish_cache_project:varnish_cache:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "2023-10-10",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:traefik:traefik:3.0.0:beta3:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:traefik:traefik:3.0.0:beta2:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:traefik:traefik:3.0.0:beta1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "2.10.5",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:projectcontour:contour:*:*:*:*:*:kubernetes:*:*",
                        cpe_name: [],
                        versionEndExcluding: "2023-10-11",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:linkerd:linkerd:2.13.0:*:*:*:stable:kubernetes:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:linkerd:linkerd:2.13.1:*:*:*:stable:kubernetes:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:linkerd:linkerd:2.14.0:*:*:*:stable:kubernetes:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:linkerd:linkerd:2.14.1:*:*:*:stable:kubernetes:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:linkerd:linkerd:*:*:*:*:stable:kubernetes:*:*",
                        cpe_name: [],
                        versionEndIncluding: "2.12.5",
                        versionStartIncluding: "2.12.0",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:linecorp:armeria:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "1.26.0",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:redhat:service_telemetry_framework:1.5:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:netapp:astra_control_center:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:akka:http_server:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "10.5.3",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:konghq:kong_gateway:*:*:*:*:enterprise:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "3.4.2",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "2.427",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "2.414.2",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "9.4.0",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:openresty:openresty:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "1.21.4.3",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "3.10.4",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "2.19.2",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "2.2.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "7.4.2",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "1.22",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "17.15.1",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "11.2",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "7.2.1",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "9.3.3",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "4.11.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "7.11.2",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "6.0.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "4.1.3",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "x14.3.3",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "11.1",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "x14.3.3",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "12.6.2",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "2024.02.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "2024.02.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "2024.01.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:secure_web_appliance_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "15.1.0",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:secure_web_appliance:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "10.2\\(7\\)",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "10.3\\(5\\)",
                              versionStartIncluding: "10.3\\(1\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3016q:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3064:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3064-32t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3064-t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3064-x:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3064t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3064x:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3100:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3100-v:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3100-z:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3100v:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_31108pc-v:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_31108pv-v:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_31108tc-v:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3132q-v:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3132q-x:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3132q-x\\/3132q-xl:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3132q-xl:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3172:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3172pq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3172pq-xl:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3172pq\\/pq-xl:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3172tq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3172tq-32t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3172tq-xl:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3232:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3232c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3232c_:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3264c-e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3408-s:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_34180yc:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_34200yc-sm:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3432d-s:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3464c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3524:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3524-x\\/xl:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3548-x\\/xl:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_36180yc-r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_3636c-r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "10.2\\(7\\)",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "10.3\\(5\\)",
                              versionStartIncluding: "10.3\\(1\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9000v:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9200yc:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_92160yc_switch:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9221c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_92300yc:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_92300yc_switch:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_92304qc_switch:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9232e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_92348gc-x:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9236c_switch:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9272q_switch:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_93108tc-ex-24:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_93108tc-ex_switch:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_93108tc-fx-24:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_93108tc-fx3h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_93108tc-fx3p:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_93120tx_switch:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_93128:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_93128tx_switch:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9316d-gx:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_93180lc-ex:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_93180lc-ex_switch:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_93180tc-ex:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_93180yc-ex-24:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_93180yc-ex_switch:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_93180yc-fx:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_93180yc-fx-24:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_93180yc-fx3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_93180yc-fx3h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_93180yc-fx3s:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_93216tc-fx2:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_93240tc-fx2:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_93240yc-fx2:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9332c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9332d-gx2b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9332d-h2r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9332pq_switch:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_93360yc-fx2:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9336c-fx2:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9336c-fx2-e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9336pq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9336pq_aci:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9336pq_aci_spine_switch:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9348d-gx2a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9348gc-fx3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9348gc-fxp:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_93600cd-gx:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9364c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9364c-gx:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9364d-gx2a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9372px-e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9372px-e_switch:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9372px_switch:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9372tx-e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9372tx-e_switch:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9372tx_switch:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9396px_switch:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9396tx_switch:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9408:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9432pq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9500_16-slot:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9500_4-slot:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9500_8-slot:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9500_supervisor_a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9500_supervisor_a\\+:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9500_supervisor_b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9500_supervisor_b\\+:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9500r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9504_switch:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9508_switch:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9516_switch:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9536pq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9636pq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9716d-gx:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9736pq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9800:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9804:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nexus_9808:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2023-44487",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Red Hat",
      sources: [
         {
            db: "PACKETSTORM",
            id: "175239",
         },
         {
            db: "PACKETSTORM",
            id: "175234",
         },
         {
            db: "PACKETSTORM",
            id: "175230",
         },
         {
            db: "PACKETSTORM",
            id: "175126",
         },
         {
            db: "PACKETSTORM",
            id: "175160",
         },
         {
            db: "PACKETSTORM",
            id: "175376",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2023-44487",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2023-44487",
                  trust: 1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2023-44487",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. \n\n\n\n\nDescription:\n\nAMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. For further information, refer to the release notes linked to in the References section. \n\n\n\n\nDescription:\n\nApache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. \n\n\n\n\nDescription:\n\nRed Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. \n\n\n\n\nDescription:\n\nnghttp2 contains the Hypertext Transfer Protocol version 2 (HTTP/2) client, server, and proxy programs as well as a library implementing the HTTP/2 protocol in C. \n\nThe following data is constructed from data provided by Red Hat's json file at:\n\nhttps://access.redhat.com/security/data/csaf/v2/advisories/2023/rhsa-2023_5710.json\n\nRed Hat officially shut down their mailing list notifications October 10, 2023.  Due to this, Packet Storm has recreated the below data as a reference point to raise awareness.  It must be noted that due to an inability to easily track revision updates without crawling Red Hat's archive, these advisories are single notifications and we strongly suggest that you visit the Red Hat provided links to ensure you have the latest information available if the subject matter listed pertains to your environment. \n\n- Packet Storm Staff\n\n\n\n\n====================================================================\nRed Hat Security Advisory\n\nSynopsis:           Important: dotnet6.0 security update\nAdvisory ID:        RHSA-2023:5710-01\nProduct:            Red Hat Enterprise Linux\nAdvisory URL:       https://access.redhat.com/errata/RHSA-2023:5710\nIssue date:         2023-10-16\nRevision:           01\nCVE Names:          CVE-2023-44487\n====================================================================\n\nSummary: \n\nAn update for dotnet6.0 is now available for Red Hat Enterprise Linux 8. \n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. \n\n\n\n\nDescription:\n\n.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. \n\nNew versions of .NET that address a security vulnerability are now available. The updated versions are .NET 6.0 to SDK 6.0.123 and Runtime 6.0.23. \n\nSecurity Fix(es):\n\n* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. \n\n\nSolution:\n\nhttps://access.redhat.com/articles/11258\n\n\n\nCVEs:\n\nCVE-2023-44487\n\nReferences:\n\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003\n\n. ==========================================================================\nUbuntu Security Notice USN-6754-1\nApril 25, 2024\n\nnghttp2 vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 23.10\n- Ubuntu 22.04 LTS\n- Ubuntu 20.04 LTS\n- Ubuntu 18.04 LTS (Available with Ubuntu Pro)\n- Ubuntu 16.04 LTS (Available with Ubuntu Pro)\n\nSummary:\n\nSeveral security issues were fixed in nghttp2. \n\nSoftware Description:\n- nghttp2: HTTP/2 C Library and tools\n\nDetails:\n\nIt was discovered that nghttp2 incorrectly handled the HTTP/2\nimplementation. A remote attacker could possibly use this issue to cause\nnghttp2 to consume resources, leading to a denial of service. This issue\nonly affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-9511,\nCVE-2019-9513)\n\nIt was discovered that nghttp2 incorrectly handled request cancellation. A\nremote attacker could possibly use this issue to cause nghttp2 to consume\nresources, leading to a denial of service. This issue only affected Ubuntu\n16.04 LTS and Ubuntu 18.04 LTS. (CVE-2023-44487)\n\nIt was discovered that nghttp2 could be made to process an unlimited number\nof HTTP/2 CONTINUATION frames. A remote attacker could possibly use this\nissue to cause nghttp2 to consume resources, leading to a denial of\nservice. (CVE-2024-28182)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 23.10:\n   libnghttp2-14                   1.55.1-1ubuntu0.2\n   nghttp2                         1.55.1-1ubuntu0.2\n   nghttp2-client                  1.55.1-1ubuntu0.2\n   nghttp2-proxy                   1.55.1-1ubuntu0.2\n   nghttp2-server                  1.55.1-1ubuntu0.2\n\nUbuntu 22.04 LTS:\n   libnghttp2-14                   1.43.0-1ubuntu0.2\n   nghttp2                         1.43.0-1ubuntu0.2\n   nghttp2-client                  1.43.0-1ubuntu0.2\n   nghttp2-proxy                   1.43.0-1ubuntu0.2\n   nghttp2-server                  1.43.0-1ubuntu0.2\n\nUbuntu 20.04 LTS:\n   libnghttp2-14                   1.40.0-1ubuntu0.3\n   nghttp2                         1.40.0-1ubuntu0.3\n   nghttp2-client                  1.40.0-1ubuntu0.3\n   nghttp2-proxy                   1.40.0-1ubuntu0.3\n   nghttp2-server                  1.40.0-1ubuntu0.3\n\nUbuntu 18.04 LTS (Available with Ubuntu Pro):\n   libnghttp2-14                   1.30.0-1ubuntu1+esm2\n   nghttp2                         1.30.0-1ubuntu1+esm2\n   nghttp2-client                  1.30.0-1ubuntu1+esm2\n   nghttp2-proxy                   1.30.0-1ubuntu1+esm2\n   nghttp2-server                  1.30.0-1ubuntu1+esm2\n\nUbuntu 16.04 LTS (Available with Ubuntu Pro):\n   libnghttp2-14                   1.7.1-1ubuntu0.1~esm2\n   nghttp2                         1.7.1-1ubuntu0.1~esm2\n   nghttp2-client                  1.7.1-1ubuntu0.1~esm2\n   nghttp2-proxy                   1.7.1-1ubuntu0.1~esm2\n   nghttp2-server                  1.7.1-1ubuntu0.1~esm2\n\nIn general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\n- -------------------------------------------------------------------------\nDebian Security Advisory DSA-5558-1                   security@debian.org\nhttps://www.debian.org/security/                          Markus Koschany\nNovember 18, 2023                     https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage        : netty\nCVE ID         : CVE-2023-34462 CVE-2023-44487\nDebian Bug     : 1038947 1054234\n\nTwo security vulnerabilities have been discovered in Netty, a Java NIO\nclient/server socket framework. \n\nCVE-2023-34462\n\n    It might be possible for a remote peer to send a client hello packet during\n    a TLS handshake which lead the server to buffer up to 16 MB of data per\n    connection. This could lead to a OutOfMemoryError and so result in a denial\n    of service. \n    This problem is also known as Rapid Reset Attack. \n\nFor the oldstable distribution (bullseye), these problems have been fixed\nin version 1:4.1.48-4+deb11u2. \n\nFor the stable distribution (bookworm), these problems have been fixed in\nversion 1:4.1.48-7+deb12u1. \n\nWe recommend that you upgrade your netty packages. \n\nFor the detailed security status of netty please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/netty\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n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\nO6otUI2k274IF9KHh0T1h1hopbUTU8VPy3dpcLloCzk7KiAv1RI=\n=4ExT\n-----END PGP SIGNATURE-----\n. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products and packaged under Red Hat JBoss Core Services, to allow for faster distribution of updates and for a more consistent update experience",
      sources: [
         {
            db: "NVD",
            id: "CVE-2023-44487",
         },
         {
            db: "PACKETSTORM",
            id: "175239",
         },
         {
            db: "PACKETSTORM",
            id: "175234",
         },
         {
            db: "PACKETSTORM",
            id: "175230",
         },
         {
            db: "PACKETSTORM",
            id: "175126",
         },
         {
            db: "PACKETSTORM",
            id: "175160",
         },
         {
            db: "PACKETSTORM",
            id: "178284",
         },
         {
            db: "PACKETSTORM",
            id: "175875",
         },
         {
            db: "PACKETSTORM",
            id: "175807",
         },
         {
            db: "PACKETSTORM",
            id: "175376",
         },
      ],
      trust: 1.71,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2023-44487",
            trust: 1.9,
         },
         {
            db: "OPENWALL",
            id: "OSS-SECURITY/2023/10/18/8",
            trust: 1,
         },
         {
            db: "OPENWALL",
            id: "OSS-SECURITY/2023/10/10/6",
            trust: 1,
         },
         {
            db: "OPENWALL",
            id: "OSS-SECURITY/2023/10/19/6",
            trust: 1,
         },
         {
            db: "OPENWALL",
            id: "OSS-SECURITY/2023/10/18/4",
            trust: 1,
         },
         {
            db: "OPENWALL",
            id: "OSS-SECURITY/2023/10/13/4",
            trust: 1,
         },
         {
            db: "OPENWALL",
            id: "OSS-SECURITY/2023/10/13/9",
            trust: 1,
         },
         {
            db: "OPENWALL",
            id: "OSS-SECURITY/2023/10/20/8",
            trust: 1,
         },
         {
            db: "PACKETSTORM",
            id: "175239",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "175234",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "175230",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "175126",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "175160",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "178284",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "175875",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "175807",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "175376",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "PACKETSTORM",
            id: "175239",
         },
         {
            db: "PACKETSTORM",
            id: "175234",
         },
         {
            db: "PACKETSTORM",
            id: "175230",
         },
         {
            db: "PACKETSTORM",
            id: "175126",
         },
         {
            db: "PACKETSTORM",
            id: "175160",
         },
         {
            db: "PACKETSTORM",
            id: "178284",
         },
         {
            db: "PACKETSTORM",
            id: "175875",
         },
         {
            db: "PACKETSTORM",
            id: "175807",
         },
         {
            db: "PACKETSTORM",
            id: "175376",
         },
         {
            db: "NVD",
            id: "CVE-2023-44487",
         },
      ],
   },
   id: "VAR-202310-0175",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.465728264,
   },
   last_update_date: "2024-07-23T21:36:24.758000Z",
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-400",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2023-44487",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1,
            url: "http://www.openwall.com/lists/oss-security/2023/10/13/4",
         },
         {
            trust: 1,
            url: "http://www.openwall.com/lists/oss-security/2023/10/13/9",
         },
         {
            trust: 1,
            url: "http://www.openwall.com/lists/oss-security/2023/10/18/4",
         },
         {
            trust: 1,
            url: "http://www.openwall.com/lists/oss-security/2023/10/18/8",
         },
         {
            trust: 1,
            url: "http://www.openwall.com/lists/oss-security/2023/10/19/6",
         },
         {
            trust: 1,
            url: "http://www.openwall.com/lists/oss-security/2023/10/20/8",
         },
         {
            trust: 1,
            url: "https://access.redhat.com/security/cve/cve-2023-44487",
         },
         {
            trust: 1,
            url: "https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/",
         },
         {
            trust: 1,
            url: "https://aws.amazon.com/security/security-bulletins/aws-2023-011/",
         },
         {
            trust: 1,
            url: "https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/",
         },
         {
            trust: 1,
            url: "https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/",
         },
         {
            trust: 1,
            url: "https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/",
         },
         {
            trust: 1,
            url: "https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack",
         },
         {
            trust: 1,
            url: "https://blog.vespa.ai/cve-2023-44487/",
         },
         {
            trust: 1,
            url: "https://bugzilla.proxmox.com/show_bug.cgi?id=4988",
         },
         {
            trust: 1,
            url: "https://bugzilla.redhat.com/show_bug.cgi?id=2242803",
         },
         {
            trust: 1,
            url: "https://bugzilla.suse.com/show_bug.cgi?id=1216123",
         },
         {
            trust: 1,
            url: "https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9",
         },
         {
            trust: 1,
            url: "https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/",
         },
         {
            trust: 1,
            url: "https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack",
         },
         {
            trust: 1,
            url: "https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125",
         },
         {
            trust: 1,
            url: "https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715",
         },
         {
            trust: 1,
            url: "https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve",
         },
         {
            trust: 1,
            url: "https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764",
         },
         {
            trust: 1,
            url: "https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088",
         },
         {
            trust: 1,
            url: "https://github.com/azure/aks/issues/3947",
         },
         {
            trust: 1,
            url: "https://github.com/kong/kong/discussions/11741",
         },
         {
            trust: 1,
            url: "https://github.com/advisories/ghsa-qppj-fm5r-hxr3",
         },
         {
            trust: 1,
            url: "https://github.com/advisories/ghsa-vx74-f528-fxqg",
         },
         {
            trust: 1,
            url: "https://github.com/advisories/ghsa-xpw8-rcwv-8f8p",
         },
         {
            trust: 1,
            url: "https://github.com/akka/akka-http/issues/4323",
         },
         {
            trust: 1,
            url: "https://github.com/alibaba/tengine/issues/1872",
         },
         {
            trust: 1,
            url: "https://github.com/apache/apisix/issues/10320",
         },
         {
            trust: 1,
            url: "https://github.com/apache/httpd-site/pull/10",
         },
         {
            trust: 1,
            url: "https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#l1101-l1113",
         },
         {
            trust: 1,
            url: "https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2",
         },
         {
            trust: 1,
            url: "https://github.com/apache/trafficserver/pull/10564",
         },
         {
            trust: 1,
            url: "https://github.com/arkrwn/poc/tree/main/cve-2023-44487",
         },
         {
            trust: 1,
            url: "https://github.com/bcdannyboy/cve-2023-44487",
         },
         {
            trust: 1,
            url: "https://github.com/caddyserver/caddy/issues/5877",
         },
         {
            trust: 1,
            url: "https://github.com/caddyserver/caddy/releases/tag/v2.7.5",
         },
         {
            trust: 1,
            url: "https://github.com/dotnet/announcements/issues/277",
         },
         {
            trust: 1,
            url: "https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#l73",
         },
         {
            trust: 1,
            url: "https://github.com/eclipse/jetty.project/issues/10679",
         },
         {
            trust: 1,
            url: "https://github.com/envoyproxy/envoy/pull/30055",
         },
         {
            trust: 1,
            url: "https://github.com/etcd-io/etcd/issues/16740",
         },
         {
            trust: 1,
            url: "https://github.com/facebook/proxygen/pull/466",
         },
         {
            trust: 1,
            url: "https://github.com/golang/go/issues/63417",
         },
         {
            trust: 1,
            url: "https://github.com/grpc/grpc-go/pull/6703",
         },
         {
            trust: 1,
            url: "https://github.com/h2o/h2o/pull/3291",
         },
         {
            trust: 1,
            url: "https://github.com/h2o/h2o/security/advisories/ghsa-2m7v-gc89-fjqf",
         },
         {
            trust: 1,
            url: "https://github.com/haproxy/haproxy/issues/2312",
         },
         {
            trust: 1,
            url: "https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/readme.md?plain=1#l239-l244",
         },
         {
            trust: 1,
            url: "https://github.com/junkurihara/rust-rpxy/issues/97",
         },
         {
            trust: 1,
            url: "https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1",
         },
         {
            trust: 1,
            url: "https://github.com/kazu-yamamoto/http2/issues/93",
         },
         {
            trust: 1,
            url: "https://github.com/kubernetes/kubernetes/pull/121120",
         },
         {
            trust: 1,
            url: "https://github.com/line/armeria/pull/5232",
         },
         {
            trust: 1,
            url: "https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632",
         },
         {
            trust: 1,
            url: "https://github.com/micrictor/http2-rst-stream",
         },
         {
            trust: 1,
            url: "https://github.com/microsoft/cbl-mariner/pull/6381",
         },
         {
            trust: 1,
            url: "https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61",
         },
         {
            trust: 1,
            url: "https://github.com/nghttp2/nghttp2/pull/1961",
         },
         {
            trust: 1,
            url: "https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0",
         },
         {
            trust: 1,
            url: "https://github.com/ninenines/cowboy/issues/1615",
         },
         {
            trust: 1,
            url: "https://github.com/nodejs/node/pull/50121",
         },
         {
            trust: 1,
            url: "https://github.com/openresty/openresty/issues/930",
         },
         {
            trust: 1,
            url: "https://github.com/opensearch-project/data-prepper/issues/3474",
         },
         {
            trust: 1,
            url: "https://github.com/oqtane/oqtane.framework/discussions/3367",
         },
         {
            trust: 1,
            url: "https://github.com/projectcontour/contour/pull/5826",
         },
         {
            trust: 1,
            url: "https://github.com/tempesta-tech/tempesta/issues/1986",
         },
         {
            trust: 1,
            url: "https://github.com/varnishcache/varnish-cache/issues/3996",
         },
         {
            trust: 1,
            url: "https://groups.google.com/g/golang-announce/c/innxdtcjzvo",
         },
         {
            trust: 1,
            url: "https://istio.io/latest/news/security/istio-security-2023-004/",
         },
         {
            trust: 1,
            url: "https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/",
         },
         {
            trust: 1,
            url: "https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q",
         },
         {
            trust: 1,
            url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html",
         },
         {
            trust: 1,
            url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html",
         },
         {
            trust: 1,
            url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html",
         },
         {
            trust: 1,
            url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00045.html",
         },
         {
            trust: 1,
            url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00047.html",
         },
         {
            trust: 1,
            url: "https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html",
         },
         {
            trust: 1,
            url: "https://lists.debian.org/debian-lts-announce/2023/11/msg00012.html",
         },
         {
            trust: 1,
            url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2mbeppc36ubvozznaxfhklfgslcmn5li/",
         },
         {
            trust: 1,
            url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3n4nj7fr4x4fpzugntqapstvb2hb2y4a/",
         },
         {
            trust: 1,
            url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/bfqd3kuemfbhpapbglwqc34l4owl5haz/",
         },
         {
            trust: 1,
            url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/clb4tw7kalb3eeqwnwcn7ouiwwvwwcg2/",
         },
         {
            trust: 1,
            url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/e72t67updrxhidlo3oror25yamn4ggw5/",
         },
         {
            trust: 1,
            url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/fna62q767cfafhbcdkynpbmzwb7twyvu/",
         },
         {
            trust: 1,
            url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ht7t2r4mqklif4odv4bdlparwfpcj5cz/",
         },
         {
            trust: 1,
            url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/jizsefc3ykcgaba2bzw6zjrmdzjmb7pj/",
         },
         {
            trust: 1,
            url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/jmexy22bfg5q64hqcm5ck2q7kdkvv4ty/",
         },
         {
            trust: 1,
            url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ksegd2iwknuo3dwy4kqguqm5bisrwhqe/",
         },
         {
            trust: 1,
            url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/lkyhszqfdnr7rsa7lhvlliaqmvycugbg/",
         },
         {
            trust: 1,
            url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/lnmzjcdhgljjlxo4oxwjmtvqrnwoc7ul/",
         },
         {
            trust: 1,
            url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/vhuhtsxlxgxs7jykbxta3vinuphtngvu/",
         },
         {
            trust: 1,
            url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/vsrdiv77hnkusm7sjc5bke5jshlhu2nk/",
         },
         {
            trust: 1,
            url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/we2i52rhnnu42px6nz2rbuhsffj2lvzx/",
         },
         {
            trust: 1,
            url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/wlprq5twuqqxywbjm7ecydail2yvkiuh/",
         },
         {
            trust: 1,
            url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/x6qxn4orivf6xbw4wwfe7vnpvc74s45y/",
         },
         {
            trust: 1,
            url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/xfoibb4yfichdm7ibop7pwxw3fx4hll2/",
         },
         {
            trust: 1,
            url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/zb43remkrqr62njei7i5nq4fsxnlbkrt/",
         },
         {
            trust: 1,
            url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/zkqsikiat5tj3wslu3rdbq35yx4gy4v3/",
         },
         {
            trust: 1,
            url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/zlu6u2r2ic2k64ndpnmv55auao65maf4/",
         },
         {
            trust: 1,
            url: "https://lists.w3.org/archives/public/ietf-http-wg/2023octdec/0025.html",
         },
         {
            trust: 1,
            url: "https://mailman.nginx.org/pipermail/nginx-devel/2023-october/s36q5hbxr7caimpllprsssyr4pcmwilk.html",
         },
         {
            trust: 1,
            url: "https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html",
         },
         {
            trust: 1,
            url: "https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/",
         },
         {
            trust: 1,
            url: "https://msrc.microsoft.com/update-guide/vulnerability/cve-2023-44487",
         },
         {
            trust: 1,
            url: "https://my.f5.com/manage/s/article/k000137106",
         },
         {
            trust: 1,
            url: "https://netty.io/news/2023/10/10/4-1-100-final.html",
         },
         {
            trust: 1,
            url: "https://news.ycombinator.com/item?id=37830987",
         },
         {
            trust: 1,
            url: "https://news.ycombinator.com/item?id=37830998",
         },
         {
            trust: 1,
            url: "https://news.ycombinator.com/item?id=37831062",
         },
         {
            trust: 1,
            url: "https://news.ycombinator.com/item?id=37837043",
         },
         {
            trust: 1,
            url: "https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/",
         },
         {
            trust: 1,
            url: "https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected",
         },
         {
            trust: 1,
            url: "https://security.gentoo.org/glsa/202311-09",
         },
         {
            trust: 1,
            url: "https://security.netapp.com/advisory/ntap-20231016-0001/",
         },
         {
            trust: 1,
            url: "https://security.netapp.com/advisory/ntap-20240426-0007/",
         },
         {
            trust: 1,
            url: "https://security.netapp.com/advisory/ntap-20240621-0006/",
         },
         {
            trust: 1,
            url: "https://security.netapp.com/advisory/ntap-20240621-0007/",
         },
         {
            trust: 1,
            url: "https://security.paloaltonetworks.com/cve-2023-44487",
         },
         {
            trust: 1,
            url: "https://tomcat.apache.org/security-10.html#fixed_in_apache_tomcat_10.1.14",
         },
         {
            trust: 1,
            url: "https://ubuntu.com/security/cve-2023-44487",
         },
         {
            trust: 1,
            url: "https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/",
         },
         {
            trust: 1,
            url: "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
         },
         {
            trust: 1,
            url: "https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event",
         },
         {
            trust: 1,
            url: "https://www.debian.org/security/2023/dsa-5521",
         },
         {
            trust: 1,
            url: "https://www.debian.org/security/2023/dsa-5522",
         },
         {
            trust: 1,
            url: "https://www.debian.org/security/2023/dsa-5540",
         },
         {
            trust: 1,
            url: "https://www.debian.org/security/2023/dsa-5549",
         },
         {
            trust: 1,
            url: "https://www.debian.org/security/2023/dsa-5558",
         },
         {
            trust: 1,
            url: "https://www.debian.org/security/2023/dsa-5570",
         },
         {
            trust: 1,
            url: "https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487",
         },
         {
            trust: 1,
            url: "https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/",
         },
         {
            trust: 1,
            url: "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
         },
         {
            trust: 1,
            url: "https://www.openwall.com/lists/oss-security/2023/10/10/6",
         },
         {
            trust: 1,
            url: "https://www.phoronix.com/news/http2-rapid-reset-attack",
         },
         {
            trust: 1,
            url: "https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/",
         },
         {
            trust: 0.9,
            url: "https://nvd.nist.gov/vuln/detail/cve-2023-44487",
         },
         {
            trust: 0.6,
            url: "https://access.redhat.com/security/updates/classification/#important",
         },
         {
            trust: 0.5,
            url: "https://access.redhat.com/articles/11258",
         },
         {
            trust: 0.5,
            url: "https://access.redhat.com/security/vulnerabilities/rhsb-2023-003",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/data/csaf/v2/advisories/2023/rhsa-2023_5945.json",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=distributions&product=jboss.amq.broker&version=7.10.4",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/documentation/en-us/red_hat_amq_broker/7.10",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/errata/rhsa-2023:5945",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/data/csaf/v2/advisories/2023/rhsa-2023_5928.json",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/errata/rhsa-2023:5928",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=securitypatches&product=appplatform&version=7.4",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/data/csaf/v2/advisories/2023/rhsa-2023_5922.json",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/errata/rhsa-2023:5922",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/errata/rhsa-2023:5766",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/data/csaf/v2/advisories/2023/rhsa-2023_5766.json",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/data/csaf/v2/advisories/2023/rhsa-2023_5710.json",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/errata/rhsa-2023:5710",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/nghttp2/1.40.0-1ubuntu0.3",
         },
         {
            trust: 0.1,
            url: "https://ubuntu.com/security/notices/usn-6754-1",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/nghttp2/1.43.0-1ubuntu0.2",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/nghttp2/1.55.1-1ubuntu0.2",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-9513",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-9511",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2024-28182",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/nghttp2/1.40.0-1ubuntu0.2",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/nghttp2/1.55.1-1ubuntu0.1",
         },
         {
            trust: 0.1,
            url: "https://ubuntu.com/security/notices/usn-6505-1",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/nghttp2/1.52.0-1ubuntu0.1",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/nghttp2/1.43.0-1ubuntu0.1",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2023-34462",
         },
         {
            trust: 0.1,
            url: "https://www.debian.org/security/faq",
         },
         {
            trust: 0.1,
            url: "https://security-tracker.debian.org/tracker/netty",
         },
         {
            trust: 0.1,
            url: "https://www.debian.org/security/",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/data/csaf/v2/advisories/2023/rhsa-2023_6105.json",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/errata/rhsa-2023:6105",
         },
      ],
      sources: [
         {
            db: "PACKETSTORM",
            id: "175239",
         },
         {
            db: "PACKETSTORM",
            id: "175234",
         },
         {
            db: "PACKETSTORM",
            id: "175230",
         },
         {
            db: "PACKETSTORM",
            id: "175126",
         },
         {
            db: "PACKETSTORM",
            id: "175160",
         },
         {
            db: "PACKETSTORM",
            id: "178284",
         },
         {
            db: "PACKETSTORM",
            id: "175875",
         },
         {
            db: "PACKETSTORM",
            id: "175807",
         },
         {
            db: "PACKETSTORM",
            id: "175376",
         },
         {
            db: "NVD",
            id: "CVE-2023-44487",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "PACKETSTORM",
            id: "175239",
         },
         {
            db: "PACKETSTORM",
            id: "175234",
         },
         {
            db: "PACKETSTORM",
            id: "175230",
         },
         {
            db: "PACKETSTORM",
            id: "175126",
         },
         {
            db: "PACKETSTORM",
            id: "175160",
         },
         {
            db: "PACKETSTORM",
            id: "178284",
         },
         {
            db: "PACKETSTORM",
            id: "175875",
         },
         {
            db: "PACKETSTORM",
            id: "175807",
         },
         {
            db: "PACKETSTORM",
            id: "175376",
         },
         {
            db: "NVD",
            id: "CVE-2023-44487",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2023-10-20T14:34:30",
            db: "PACKETSTORM",
            id: "175239",
         },
         {
            date: "2023-10-20T14:33:16",
            db: "PACKETSTORM",
            id: "175234",
         },
         {
            date: "2023-10-20T14:32:33",
            db: "PACKETSTORM",
            id: "175230",
         },
         {
            date: "2023-10-17T15:39:55",
            db: "PACKETSTORM",
            id: "175126",
         },
         {
            date: "2023-10-18T16:23:08",
            db: "PACKETSTORM",
            id: "175160",
         },
         {
            date: "2024-04-26T15:13:40",
            db: "PACKETSTORM",
            id: "178284",
         },
         {
            date: "2023-11-22T16:28:02",
            db: "PACKETSTORM",
            id: "175875",
         },
         {
            date: "2023-11-20T16:25:51",
            db: "PACKETSTORM",
            id: "175807",
         },
         {
            date: "2023-10-27T12:55:12",
            db: "PACKETSTORM",
            id: "175376",
         },
         {
            date: "2023-10-10T14:15:10.883000",
            db: "NVD",
            id: "CVE-2023-44487",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2024-06-27T18:34:22.110000",
            db: "NVD",
            id: "CVE-2023-44487",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "PACKETSTORM",
            id: "178284",
         },
         {
            db: "PACKETSTORM",
            id: "175875",
         },
      ],
      trust: 0.2,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Red Hat Security Advisory 2023-5945-01",
      sources: [
         {
            db: "PACKETSTORM",
            id: "175239",
         },
      ],
      trust: 0.1,
   },
}

cve-2023-35945
Vulnerability from cvelistv5
Published
2023-07-13 20:41
Modified
2024-10-31 16:24
Summary
Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy’s HTTP/2 codec may leak a header map and bookkeeping structures upon receiving `RST_STREAM` immediately followed by the `GOAWAY` frames from an upstream server. In nghttp2, cleanup of pending requests due to receipt of the `GOAWAY` frame skips de-allocation of the bookkeeping structure and pending compressed header. The error return [code path] is taken if connection is already marked for not sending more requests due to `GOAWAY` frame. The clean-up code is right after the return statement, causing memory leak. Denial of service through memory exhaustion. This vulnerability was patched in versions(s) 1.26.3, 1.25.8, 1.24.9, 1.23.11.
Impacted products
Vendor Product Version
envoyproxy envoy Version: >= 1.26.0, < 1.26.3
Version: >= 1.25.0, < 1.25.8
Version: >= 1.24.0, < 1.24.9
Version: >= 1.23.0, < 1.23.11
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T16:37:40.544Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "https://github.com/envoyproxy/envoy/security/advisories/GHSA-jfxv-29pc-x22r",
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/envoyproxy/envoy/security/advisories/GHSA-jfxv-29pc-x22r",
               },
               {
                  name: "https://github.com/nghttp2/nghttp2/blob/e7f59406556c80904b81b593d38508591bb7523a/lib/nghttp2_session.c#L3346",
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/nghttp2/nghttp2/blob/e7f59406556c80904b81b593d38508591bb7523a/lib/nghttp2_session.c#L3346",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-35945",
                        options: [
                           {
                              Exploitation: "poc",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-31T16:24:45.853511Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-31T16:24:53.808Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "envoy",
               vendor: "envoyproxy",
               versions: [
                  {
                     status: "affected",
                     version: ">= 1.26.0, < 1.26.3",
                  },
                  {
                     status: "affected",
                     version: ">= 1.25.0, < 1.25.8",
                  },
                  {
                     status: "affected",
                     version: ">= 1.24.0, < 1.24.9",
                  },
                  {
                     status: "affected",
                     version: ">= 1.23.0, < 1.23.11",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy’s HTTP/2 codec may leak a header map and bookkeeping structures upon receiving `RST_STREAM` immediately followed by the `GOAWAY` frames from an upstream server. In nghttp2, cleanup of pending requests due to receipt of the `GOAWAY` frame skips de-allocation of the bookkeeping structure and pending compressed header. The error return [code path] is taken if connection is already marked for not sending more requests due to `GOAWAY` frame. The clean-up code is right after the return statement, causing memory leak. Denial of service through memory exhaustion. This vulnerability was patched in versions(s) 1.26.3, 1.25.8, 1.24.9, 1.23.11.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-400",
                     description: "CWE-400: Uncontrolled Resource Consumption",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-07-13T20:41:15.690Z",
            orgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
            shortName: "GitHub_M",
         },
         references: [
            {
               name: "https://github.com/envoyproxy/envoy/security/advisories/GHSA-jfxv-29pc-x22r",
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/envoyproxy/envoy/security/advisories/GHSA-jfxv-29pc-x22r",
            },
            {
               name: "https://github.com/nghttp2/nghttp2/blob/e7f59406556c80904b81b593d38508591bb7523a/lib/nghttp2_session.c#L3346",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/nghttp2/nghttp2/blob/e7f59406556c80904b81b593d38508591bb7523a/lib/nghttp2_session.c#L3346",
            },
         ],
         source: {
            advisory: "GHSA-jfxv-29pc-x22r",
            discovery: "UNKNOWN",
         },
         title: "Envoy vulnerable to HTTP/2 memory leak in nghttp2 codec",
      },
   },
   cveMetadata: {
      assignerOrgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
      assignerShortName: "GitHub_M",
      cveId: "CVE-2023-35945",
      datePublished: "2023-07-13T20:41:15.690Z",
      dateReserved: "2023-06-20T14:02:45.597Z",
      dateUpdated: "2024-10-31T16:24:53.808Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-44487
Vulnerability from cvelistv5
Published
2023-10-10 00:00
Modified
2025-03-07 18:15
Summary
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
References
https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73
https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/
https://aws.amazon.com/security/security-bulletins/AWS-2023-011/
https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack
https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/
https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/
https://news.ycombinator.com/item?id=37831062
https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/
https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack
https://github.com/envoyproxy/envoy/pull/30055
https://github.com/haproxy/haproxy/issues/2312
https://github.com/eclipse/jetty.project/issues/10679
https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764
https://github.com/nghttp2/nghttp2/pull/1961
https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61
https://github.com/alibaba/tengine/issues/1872
https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2
https://news.ycombinator.com/item?id=37830987
https://news.ycombinator.com/item?id=37830998
https://github.com/caddyserver/caddy/issues/5877
https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/
https://github.com/bcdannyboy/CVE-2023-44487
https://github.com/grpc/grpc-go/pull/6703
https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244
https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0
https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html
https://my.f5.com/manage/s/article/K000137106
https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/
https://bugzilla.proxmox.com/show_bug.cgi?id=4988
https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9
http://www.openwall.com/lists/oss-security/2023/10/10/7mailing-list
http://www.openwall.com/lists/oss-security/2023/10/10/6mailing-list
https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected
https://github.com/microsoft/CBL-Mariner/pull/6381
https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo
https://github.com/facebook/proxygen/pull/466
https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088
https://github.com/micrictor/http2-rst-stream
https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve
https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/
https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf
https://github.com/h2o/h2o/pull/3291
https://github.com/nodejs/node/pull/50121
https://github.com/dotnet/announcements/issues/277
https://github.com/golang/go/issues/63417
https://github.com/advisories/GHSA-vx74-f528-fxqg
https://github.com/apache/trafficserver/pull/10564
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487
https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14
https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q
https://www.openwall.com/lists/oss-security/2023/10/10/6
https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487
https://github.com/opensearch-project/data-prepper/issues/3474
https://github.com/kubernetes/kubernetes/pull/121120
https://github.com/oqtane/oqtane.framework/discussions/3367
https://github.com/advisories/GHSA-xpw8-rcwv-8f8p
https://netty.io/news/2023/10/10/4-1-100-Final.html
https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487
https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/
https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack
https://news.ycombinator.com/item?id=37837043
https://github.com/kazu-yamamoto/http2/issues/93
https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html
https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1
https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113
https://www.debian.org/security/2023/dsa-5522vendor-advisory
https://www.debian.org/security/2023/dsa-5521vendor-advisory
https://access.redhat.com/security/cve/cve-2023-44487
https://github.com/ninenines/cowboy/issues/1615
https://github.com/varnishcache/varnish-cache/issues/3996
https://github.com/tempesta-tech/tempesta/issues/1986
https://blog.vespa.ai/cve-2023-44487/
https://github.com/etcd-io/etcd/issues/16740
https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event
https://istio.io/latest/news/security/istio-security-2023-004/
https://github.com/junkurihara/rust-rpxy/issues/97
https://bugzilla.suse.com/show_bug.cgi?id=1216123
https://bugzilla.redhat.com/show_bug.cgi?id=2242803
https://ubuntu.com/security/CVE-2023-44487
https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125
https://github.com/advisories/GHSA-qppj-fm5r-hxr3
https://github.com/apache/httpd-site/pull/10
https://github.com/projectcontour/contour/pull/5826
https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632
https://github.com/line/armeria/pull/5232
https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/
https://security.paloaltonetworks.com/CVE-2023-44487
https://github.com/akka/akka-http/issues/4323
https://github.com/openresty/openresty/issues/930
https://github.com/apache/apisix/issues/10320
https://github.com/Azure/AKS/issues/3947
https://github.com/Kong/kong/discussions/11741
https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487
https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/
https://github.com/caddyserver/caddy/releases/tag/v2.7.5
https://lists.debian.org/debian-lts-announce/2023/10/msg00020.htmlmailing-list
http://www.openwall.com/lists/oss-security/2023/10/13/4mailing-list
http://www.openwall.com/lists/oss-security/2023/10/13/9mailing-list
https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/
https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/vendor-advisory
https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/
https://lists.debian.org/debian-lts-announce/2023/10/msg00023.htmlmailing-list
https://security.netapp.com/advisory/ntap-20231016-0001/
https://lists.debian.org/debian-lts-announce/2023/10/msg00024.htmlmailing-list
http://www.openwall.com/lists/oss-security/2023/10/18/4mailing-list
http://www.openwall.com/lists/oss-security/2023/10/18/8mailing-list
http://www.openwall.com/lists/oss-security/2023/10/19/6mailing-list
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/vendor-advisory
http://www.openwall.com/lists/oss-security/2023/10/20/8mailing-list
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/vendor-advisory
https://lists.debian.org/debian-lts-announce/2023/10/msg00045.htmlmailing-list
https://www.debian.org/security/2023/dsa-5540vendor-advisory
https://lists.debian.org/debian-lts-announce/2023/10/msg00047.htmlmailing-list
https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/vendor-advisory
https://lists.debian.org/debian-lts-announce/2023/11/msg00001.htmlmailing-list
https://www.debian.org/security/2023/dsa-5549vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/vendor-advisory
https://www.debian.org/security/2023/dsa-5558vendor-advisory
https://lists.debian.org/debian-lts-announce/2023/11/msg00012.htmlmailing-list
https://security.gentoo.org/glsa/202311-09vendor-advisory
https://www.debian.org/security/2023/dsa-5570vendor-advisory
https://security.netapp.com/advisory/ntap-20240426-0007/
https://security.netapp.com/advisory/ntap-20240621-0006/
https://security.netapp.com/advisory/ntap-20240621-0007/
https://github.com/grpc/grpc/releases/tag/v1.59.2
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:ietf:http:2.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "http",
                  vendor: "ietf",
                  versions: [
                     {
                        status: "affected",
                        version: "2.0",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "NETWORK",
                     availabilityImpact: "HIGH",
                     baseScore: 7.5,
                     baseSeverity: "HIGH",
                     confidentialityImpact: "NONE",
                     integrityImpact: "NONE",
                     privilegesRequired: "NONE",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-44487",
                        options: [
                           {
                              Exploitation: "active",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-07-23T20:34:21.334116Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
               {
                  other: {
                     content: {
                        dateAdded: "2023-10-10",
                        reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2023-44487",
                     },
                     type: "kev",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-400",
                        description: "CWE-400 Uncontrolled Resource Consumption",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-07-23T20:35:03.253Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-19T07:48:04.546Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://aws.amazon.com/security/security-bulletins/AWS-2023-011/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://news.ycombinator.com/item?id=37831062",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/envoyproxy/envoy/pull/30055",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/haproxy/haproxy/issues/2312",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/eclipse/jetty.project/issues/10679",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/nghttp2/nghttp2/pull/1961",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/alibaba/tengine/issues/1872",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://news.ycombinator.com/item?id=37830987",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://news.ycombinator.com/item?id=37830998",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/caddyserver/caddy/issues/5877",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/bcdannyboy/CVE-2023-44487",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/grpc/grpc-go/pull/6703",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://my.f5.com/manage/s/article/K000137106",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://bugzilla.proxmox.com/show_bug.cgi?id=4988",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/microsoft/CBL-Mariner/pull/6381",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/facebook/proxygen/pull/466",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/micrictor/http2-rst-stream",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/h2o/h2o/pull/3291",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/nodejs/node/pull/50121",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/dotnet/announcements/issues/277",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/golang/go/issues/63417",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/advisories/GHSA-vx74-f528-fxqg",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/apache/trafficserver/pull/10564",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.openwall.com/lists/oss-security/2023/10/10/6",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/opensearch-project/data-prepper/issues/3474",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/kubernetes/kubernetes/pull/121120",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/oqtane/oqtane.framework/discussions/3367",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/advisories/GHSA-xpw8-rcwv-8f8p",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://netty.io/news/2023/10/10/4-1-100-Final.html",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://news.ycombinator.com/item?id=37837043",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/kazu-yamamoto/http2/issues/93",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113",
               },
               {
                  name: "DSA-5522",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2023/dsa-5522",
               },
               {
                  name: "DSA-5521",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2023/dsa-5521",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/security/cve/cve-2023-44487",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/ninenines/cowboy/issues/1615",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/varnishcache/varnish-cache/issues/3996",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/tempesta-tech/tempesta/issues/1986",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://blog.vespa.ai/cve-2023-44487/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/etcd-io/etcd/issues/16740",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://istio.io/latest/news/security/istio-security-2023-004/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/junkurihara/rust-rpxy/issues/97",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://bugzilla.suse.com/show_bug.cgi?id=1216123",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=2242803",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://ubuntu.com/security/CVE-2023-44487",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/advisories/GHSA-qppj-fm5r-hxr3",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/apache/httpd-site/pull/10",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/projectcontour/contour/pull/5826",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/line/armeria/pull/5232",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://security.paloaltonetworks.com/CVE-2023-44487",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/akka/akka-http/issues/4323",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/openresty/openresty/issues/930",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/apache/apisix/issues/10320",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/Azure/AKS/issues/3947",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/Kong/kong/discussions/11741",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/caddyserver/caddy/releases/tag/v2.7.5",
               },
               {
                  name: "[debian-lts-announce] 20231013 [SECURITY] [DLA 3617-1] tomcat9 security update",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html",
               },
               {
                  name: "[oss-security] 20231013 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2023/10/13/4",
               },
               {
                  name: "[oss-security] 20231013 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2023/10/13/9",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html",
               },
               {
                  name: "FEDORA-2023-ed2642fd58",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/",
               },
               {
                  name: "[debian-lts-announce] 20231016 [SECURITY] [DLA 3621-1] nghttp2 security update",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20231016-0001/",
               },
               {
                  name: "[debian-lts-announce] 20231016 [SECURITY] [DLA 3617-2] tomcat9 regression update",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html",
               },
               {
                  name: "[oss-security] 20231018 Vulnerability in Jenkins",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2023/10/18/4",
               },
               {
                  name: "[oss-security] 20231018 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2023/10/18/8",
               },
               {
                  name: "[oss-security] 20231019 CVE-2023-45802: Apache HTTP Server: HTTP/2 stream memory not reclaimed right away on RST",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2023/10/19/6",
               },
               {
                  name: "FEDORA-2023-54fadada12",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/",
               },
               {
                  name: "FEDORA-2023-5ff7bf1dd8",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/",
               },
               {
                  name: "[oss-security] 20231020 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2023/10/20/8",
               },
               {
                  name: "FEDORA-2023-17efd3f2cd",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/",
               },
               {
                  name: "FEDORA-2023-d5030c983c",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/",
               },
               {
                  name: "FEDORA-2023-0259c3f26f",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/",
               },
               {
                  name: "FEDORA-2023-2a9214af5f",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/",
               },
               {
                  name: "FEDORA-2023-e9c04d81c1",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/",
               },
               {
                  name: "FEDORA-2023-f66fc0f62a",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/",
               },
               {
                  name: "FEDORA-2023-4d2fd884ea",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/",
               },
               {
                  name: "FEDORA-2023-b2c50535cb",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/",
               },
               {
                  name: "FEDORA-2023-fe53e13b5b",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/",
               },
               {
                  name: "FEDORA-2023-4bf641255e",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/",
               },
               {
                  name: "[debian-lts-announce] 20231030 [SECURITY] [DLA 3641-1] jetty9 security update",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00045.html",
               },
               {
                  name: "DSA-5540",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2023/dsa-5540",
               },
               {
                  name: "[debian-lts-announce] 20231031 [SECURITY] [DLA 3638-1] h2o security update",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00047.html",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715",
               },
               {
                  name: "FEDORA-2023-1caffb88af",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/",
               },
               {
                  name: "FEDORA-2023-3f70b8d406",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/",
               },
               {
                  name: "FEDORA-2023-7b52921cae",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/",
               },
               {
                  name: "FEDORA-2023-7934802344",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/",
               },
               {
                  name: "FEDORA-2023-dbe64661af",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/",
               },
               {
                  name: "FEDORA-2023-822aab0a5a",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/",
               },
               {
                  name: "[debian-lts-announce] 20231105 [SECURITY] [DLA 3645-1] trafficserver security update",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html",
               },
               {
                  name: "DSA-5549",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2023/dsa-5549",
               },
               {
                  name: "FEDORA-2023-c0c6a91330",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/",
               },
               {
                  name: "FEDORA-2023-492b7be466",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/",
               },
               {
                  name: "DSA-5558",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2023/dsa-5558",
               },
               {
                  name: "[debian-lts-announce] 20231119 [SECURITY] [DLA 3656-1] netty security update",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2023/11/msg00012.html",
               },
               {
                  name: "GLSA-202311-09",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://security.gentoo.org/glsa/202311-09",
               },
               {
                  name: "DSA-5570",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2023/dsa-5570",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20240426-0007/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20240621-0006/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20240621-0007/",
               },
               {
                  url: "https://www.vicarius.io/vsociety/posts/rapid-reset-cve-2023-44487-dos-in-http2-understanding-the-root-cause",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-03-07T18:15:13.812Z",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               url: "https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73",
            },
            {
               url: "https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/",
            },
            {
               url: "https://aws.amazon.com/security/security-bulletins/AWS-2023-011/",
            },
            {
               url: "https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack",
            },
            {
               url: "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
            },
            {
               url: "https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/",
            },
            {
               url: "https://news.ycombinator.com/item?id=37831062",
            },
            {
               url: "https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/",
            },
            {
               url: "https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack",
            },
            {
               url: "https://github.com/envoyproxy/envoy/pull/30055",
            },
            {
               url: "https://github.com/haproxy/haproxy/issues/2312",
            },
            {
               url: "https://github.com/eclipse/jetty.project/issues/10679",
            },
            {
               url: "https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764",
            },
            {
               url: "https://github.com/nghttp2/nghttp2/pull/1961",
            },
            {
               url: "https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61",
            },
            {
               url: "https://github.com/alibaba/tengine/issues/1872",
            },
            {
               url: "https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2",
            },
            {
               url: "https://news.ycombinator.com/item?id=37830987",
            },
            {
               url: "https://news.ycombinator.com/item?id=37830998",
            },
            {
               url: "https://github.com/caddyserver/caddy/issues/5877",
            },
            {
               url: "https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/",
            },
            {
               url: "https://github.com/bcdannyboy/CVE-2023-44487",
            },
            {
               url: "https://github.com/grpc/grpc-go/pull/6703",
            },
            {
               url: "https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244",
            },
            {
               url: "https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0",
            },
            {
               url: "https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html",
            },
            {
               url: "https://my.f5.com/manage/s/article/K000137106",
            },
            {
               url: "https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/",
            },
            {
               url: "https://bugzilla.proxmox.com/show_bug.cgi?id=4988",
            },
            {
               url: "https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9",
            },
            {
               name: "[oss-security] 20231010 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations",
               tags: [
                  "mailing-list",
               ],
               url: "http://www.openwall.com/lists/oss-security/2023/10/10/7",
            },
            {
               name: "[oss-security] 20231010 CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations",
               tags: [
                  "mailing-list",
               ],
               url: "http://www.openwall.com/lists/oss-security/2023/10/10/6",
            },
            {
               url: "https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected",
            },
            {
               url: "https://github.com/microsoft/CBL-Mariner/pull/6381",
            },
            {
               url: "https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo",
            },
            {
               url: "https://github.com/facebook/proxygen/pull/466",
            },
            {
               url: "https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088",
            },
            {
               url: "https://github.com/micrictor/http2-rst-stream",
            },
            {
               url: "https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve",
            },
            {
               url: "https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/",
            },
            {
               url: "https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf",
            },
            {
               url: "https://github.com/h2o/h2o/pull/3291",
            },
            {
               url: "https://github.com/nodejs/node/pull/50121",
            },
            {
               url: "https://github.com/dotnet/announcements/issues/277",
            },
            {
               url: "https://github.com/golang/go/issues/63417",
            },
            {
               url: "https://github.com/advisories/GHSA-vx74-f528-fxqg",
            },
            {
               url: "https://github.com/apache/trafficserver/pull/10564",
            },
            {
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487",
            },
            {
               url: "https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14",
            },
            {
               url: "https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q",
            },
            {
               url: "https://www.openwall.com/lists/oss-security/2023/10/10/6",
            },
            {
               url: "https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487",
            },
            {
               url: "https://github.com/opensearch-project/data-prepper/issues/3474",
            },
            {
               url: "https://github.com/kubernetes/kubernetes/pull/121120",
            },
            {
               url: "https://github.com/oqtane/oqtane.framework/discussions/3367",
            },
            {
               url: "https://github.com/advisories/GHSA-xpw8-rcwv-8f8p",
            },
            {
               url: "https://netty.io/news/2023/10/10/4-1-100-Final.html",
            },
            {
               url: "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
            },
            {
               url: "https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/",
            },
            {
               url: "https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack",
            },
            {
               url: "https://news.ycombinator.com/item?id=37837043",
            },
            {
               url: "https://github.com/kazu-yamamoto/http2/issues/93",
            },
            {
               url: "https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html",
            },
            {
               url: "https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1",
            },
            {
               url: "https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113",
            },
            {
               name: "DSA-5522",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.debian.org/security/2023/dsa-5522",
            },
            {
               name: "DSA-5521",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.debian.org/security/2023/dsa-5521",
            },
            {
               url: "https://access.redhat.com/security/cve/cve-2023-44487",
            },
            {
               url: "https://github.com/ninenines/cowboy/issues/1615",
            },
            {
               url: "https://github.com/varnishcache/varnish-cache/issues/3996",
            },
            {
               url: "https://github.com/tempesta-tech/tempesta/issues/1986",
            },
            {
               url: "https://blog.vespa.ai/cve-2023-44487/",
            },
            {
               url: "https://github.com/etcd-io/etcd/issues/16740",
            },
            {
               url: "https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event",
            },
            {
               url: "https://istio.io/latest/news/security/istio-security-2023-004/",
            },
            {
               url: "https://github.com/junkurihara/rust-rpxy/issues/97",
            },
            {
               url: "https://bugzilla.suse.com/show_bug.cgi?id=1216123",
            },
            {
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2242803",
            },
            {
               url: "https://ubuntu.com/security/CVE-2023-44487",
            },
            {
               url: "https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125",
            },
            {
               url: "https://github.com/advisories/GHSA-qppj-fm5r-hxr3",
            },
            {
               url: "https://github.com/apache/httpd-site/pull/10",
            },
            {
               url: "https://github.com/projectcontour/contour/pull/5826",
            },
            {
               url: "https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632",
            },
            {
               url: "https://github.com/line/armeria/pull/5232",
            },
            {
               url: "https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/",
            },
            {
               url: "https://security.paloaltonetworks.com/CVE-2023-44487",
            },
            {
               url: "https://github.com/akka/akka-http/issues/4323",
            },
            {
               url: "https://github.com/openresty/openresty/issues/930",
            },
            {
               url: "https://github.com/apache/apisix/issues/10320",
            },
            {
               url: "https://github.com/Azure/AKS/issues/3947",
            },
            {
               url: "https://github.com/Kong/kong/discussions/11741",
            },
            {
               url: "https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487",
            },
            {
               url: "https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/",
            },
            {
               url: "https://github.com/caddyserver/caddy/releases/tag/v2.7.5",
            },
            {
               name: "[debian-lts-announce] 20231013 [SECURITY] [DLA 3617-1] tomcat9 security update",
               tags: [
                  "mailing-list",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html",
            },
            {
               name: "[oss-security] 20231013 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations",
               tags: [
                  "mailing-list",
               ],
               url: "http://www.openwall.com/lists/oss-security/2023/10/13/4",
            },
            {
               name: "[oss-security] 20231013 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations",
               tags: [
                  "mailing-list",
               ],
               url: "http://www.openwall.com/lists/oss-security/2023/10/13/9",
            },
            {
               url: "https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/",
            },
            {
               url: "https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html",
            },
            {
               name: "FEDORA-2023-ed2642fd58",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/",
            },
            {
               url: "https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/",
            },
            {
               name: "[debian-lts-announce] 20231016 [SECURITY] [DLA 3621-1] nghttp2 security update",
               tags: [
                  "mailing-list",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html",
            },
            {
               url: "https://security.netapp.com/advisory/ntap-20231016-0001/",
            },
            {
               name: "[debian-lts-announce] 20231016 [SECURITY] [DLA 3617-2] tomcat9 regression update",
               tags: [
                  "mailing-list",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html",
            },
            {
               name: "[oss-security] 20231018 Vulnerability in Jenkins",
               tags: [
                  "mailing-list",
               ],
               url: "http://www.openwall.com/lists/oss-security/2023/10/18/4",
            },
            {
               name: "[oss-security] 20231018 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations",
               tags: [
                  "mailing-list",
               ],
               url: "http://www.openwall.com/lists/oss-security/2023/10/18/8",
            },
            {
               name: "[oss-security] 20231019 CVE-2023-45802: Apache HTTP Server: HTTP/2 stream memory not reclaimed right away on RST",
               tags: [
                  "mailing-list",
               ],
               url: "http://www.openwall.com/lists/oss-security/2023/10/19/6",
            },
            {
               name: "FEDORA-2023-54fadada12",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/",
            },
            {
               name: "FEDORA-2023-5ff7bf1dd8",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/",
            },
            {
               name: "[oss-security] 20231020 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations",
               tags: [
                  "mailing-list",
               ],
               url: "http://www.openwall.com/lists/oss-security/2023/10/20/8",
            },
            {
               name: "FEDORA-2023-17efd3f2cd",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/",
            },
            {
               name: "FEDORA-2023-d5030c983c",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/",
            },
            {
               name: "FEDORA-2023-0259c3f26f",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/",
            },
            {
               name: "FEDORA-2023-2a9214af5f",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/",
            },
            {
               name: "FEDORA-2023-e9c04d81c1",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/",
            },
            {
               name: "FEDORA-2023-f66fc0f62a",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/",
            },
            {
               name: "FEDORA-2023-4d2fd884ea",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/",
            },
            {
               name: "FEDORA-2023-b2c50535cb",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/",
            },
            {
               name: "FEDORA-2023-fe53e13b5b",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/",
            },
            {
               name: "FEDORA-2023-4bf641255e",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/",
            },
            {
               name: "[debian-lts-announce] 20231030 [SECURITY] [DLA 3641-1] jetty9 security update",
               tags: [
                  "mailing-list",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00045.html",
            },
            {
               name: "DSA-5540",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.debian.org/security/2023/dsa-5540",
            },
            {
               name: "[debian-lts-announce] 20231031 [SECURITY] [DLA 3638-1] h2o security update",
               tags: [
                  "mailing-list",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00047.html",
            },
            {
               url: "https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715",
            },
            {
               name: "FEDORA-2023-1caffb88af",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/",
            },
            {
               name: "FEDORA-2023-3f70b8d406",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/",
            },
            {
               name: "FEDORA-2023-7b52921cae",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/",
            },
            {
               name: "FEDORA-2023-7934802344",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/",
            },
            {
               name: "FEDORA-2023-dbe64661af",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/",
            },
            {
               name: "FEDORA-2023-822aab0a5a",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/",
            },
            {
               name: "[debian-lts-announce] 20231105 [SECURITY] [DLA 3645-1] trafficserver security update",
               tags: [
                  "mailing-list",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html",
            },
            {
               name: "DSA-5549",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.debian.org/security/2023/dsa-5549",
            },
            {
               name: "FEDORA-2023-c0c6a91330",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/",
            },
            {
               name: "FEDORA-2023-492b7be466",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/",
            },
            {
               name: "DSA-5558",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.debian.org/security/2023/dsa-5558",
            },
            {
               name: "[debian-lts-announce] 20231119 [SECURITY] [DLA 3656-1] netty security update",
               tags: [
                  "mailing-list",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2023/11/msg00012.html",
            },
            {
               name: "GLSA-202311-09",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://security.gentoo.org/glsa/202311-09",
            },
            {
               name: "DSA-5570",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.debian.org/security/2023/dsa-5570",
            },
            {
               url: "https://security.netapp.com/advisory/ntap-20240426-0007/",
            },
            {
               url: "https://security.netapp.com/advisory/ntap-20240621-0006/",
            },
            {
               url: "https://security.netapp.com/advisory/ntap-20240621-0007/",
            },
            {
               url: "https://github.com/grpc/grpc/releases/tag/v1.59.2",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2023-44487",
      datePublished: "2023-10-10T00:00:00.000Z",
      dateReserved: "2023-09-29T00:00:00.000Z",
      dateUpdated: "2025-03-07T18:15:13.812Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-1000168
Vulnerability from cvelistv5
Published
2018-05-08 15:00
Modified
2024-08-05 12:33
Severity ?
Summary
nghttp2 version >= 1.10.0 and nghttp2 <= v1.31.0 contains an Improper Input Validation CWE-20 vulnerability in ALTSVC frame handling that can result in segmentation fault leading to denial of service. This attack appears to be exploitable via network client. This vulnerability appears to have been fixed in >= 1.31.1.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T12:33:49.411Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "RHSA-2019:0367",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2019:0367",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://nodejs.org/en/blog/vulnerability/june-2018-security-releases/",
               },
               {
                  name: "103952",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/103952",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://nghttp2.org/blog/2018/04/12/nghttp2-v1-31-1/",
               },
               {
                  name: "RHSA-2019:0366",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2019:0366",
               },
               {
                  name: "[debian-lts-announce] 20211017 [SECURITY] [DLA 2786-1] nghttp2 security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         dateAssigned: "2018-04-30T00:00:00",
         datePublic: "2018-04-12T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "nghttp2 version >= 1.10.0 and nghttp2 <= v1.31.0 contains an Improper Input Validation CWE-20 vulnerability in ALTSVC frame handling that can result in segmentation fault leading to denial of service. This attack appears to be exploitable via network client. This vulnerability appears to have been fixed in >= 1.31.1.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-10-17T07:06:17",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "RHSA-2019:0367",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2019:0367",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://nodejs.org/en/blog/vulnerability/june-2018-security-releases/",
            },
            {
               name: "103952",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/103952",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://nghttp2.org/blog/2018/04/12/nghttp2-v1-31-1/",
            },
            {
               name: "RHSA-2019:0366",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2019:0366",
            },
            {
               name: "[debian-lts-announce] 20211017 [SECURITY] [DLA 2786-1] nghttp2 security update",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               DATE_ASSIGNED: "2018-04-30T20:15:49.358836",
               DATE_REQUESTED: "2018-04-09T10:52:35",
               ID: "CVE-2018-1000168",
               REQUESTER: "tatsuhiro.t@gmail.com",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "nghttp2 version >= 1.10.0 and nghttp2 <= v1.31.0 contains an Improper Input Validation CWE-20 vulnerability in ALTSVC frame handling that can result in segmentation fault leading to denial of service. This attack appears to be exploitable via network client. This vulnerability appears to have been fixed in >= 1.31.1.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "RHSA-2019:0367",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2019:0367",
                  },
                  {
                     name: "https://nodejs.org/en/blog/vulnerability/june-2018-security-releases/",
                     refsource: "CONFIRM",
                     url: "https://nodejs.org/en/blog/vulnerability/june-2018-security-releases/",
                  },
                  {
                     name: "103952",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/103952",
                  },
                  {
                     name: "https://nghttp2.org/blog/2018/04/12/nghttp2-v1-31-1/",
                     refsource: "CONFIRM",
                     url: "https://nghttp2.org/blog/2018/04/12/nghttp2-v1-31-1/",
                  },
                  {
                     name: "RHSA-2019:0366",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2019:0366",
                  },
                  {
                     name: "[debian-lts-announce] 20211017 [SECURITY] [DLA 2786-1] nghttp2 security update",
                     refsource: "MLIST",
                     url: "https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2018-1000168",
      datePublished: "2018-05-08T15:00:00",
      dateReserved: "2018-04-09T00:00:00",
      dateUpdated: "2024-08-05T12:33:49.411Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2015-8659
Vulnerability from cvelistv5
Published
2016-01-12 19:00
Modified
2024-08-06 08:20
Severity ?
Summary
The idle stream handling in nghttp2 before 1.6.0 allows attackers to have unspecified impact via unknown vectors, aka a heap-use-after-free bug.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T08:20:43.666Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "APPLE-SA-2016-03-21-5",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_APPLE",
                     "x_transferred",
                  ],
                  url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html",
               },
               {
                  name: "GLSA-201612-06",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "https://security.gentoo.org/glsa/201612-06",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://support.apple.com/HT206167",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://support.apple.com/HT206168",
               },
               {
                  name: "[oss-security] 20151223 Re: Use after free in nghttp2",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2015/12/23/10",
               },
               {
                  name: "1035353",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1035353",
               },
               {
                  name: "[oss-security] 20151223 Use after free in nghttp2",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2015/12/23/6",
               },
               {
                  name: "APPLE-SA-2016-03-21-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_APPLE",
                     "x_transferred",
                  ],
                  url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html",
               },
               {
                  name: "FEDORA-2016-54f85ec6e8",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175085.html",
               },
               {
                  name: "APPLE-SA-2016-03-21-2",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_APPLE",
                     "x_transferred",
                  ],
                  url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://nghttp2.org/blog/2015/12/23/nghttp2-v1-6-0/",
               },
               {
                  name: "FEDORA-2016-8e13ac5754",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175423.html",
               },
               {
                  name: "APPLE-SA-2016-03-21-3",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_APPLE",
                     "x_transferred",
                  ],
                  url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://support.apple.com/HT206169",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://support.apple.com/HT206166",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2015-12-23T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The idle stream handling in nghttp2 before 1.6.0 allows attackers to have unspecified impact via unknown vectors, aka a heap-use-after-free bug.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-06-30T16:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "APPLE-SA-2016-03-21-5",
               tags: [
                  "vendor-advisory",
                  "x_refsource_APPLE",
               ],
               url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html",
            },
            {
               name: "GLSA-201612-06",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "https://security.gentoo.org/glsa/201612-06",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://support.apple.com/HT206167",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://support.apple.com/HT206168",
            },
            {
               name: "[oss-security] 20151223 Re: Use after free in nghttp2",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2015/12/23/10",
            },
            {
               name: "1035353",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1035353",
            },
            {
               name: "[oss-security] 20151223 Use after free in nghttp2",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2015/12/23/6",
            },
            {
               name: "APPLE-SA-2016-03-21-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_APPLE",
               ],
               url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html",
            },
            {
               name: "FEDORA-2016-54f85ec6e8",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175085.html",
            },
            {
               name: "APPLE-SA-2016-03-21-2",
               tags: [
                  "vendor-advisory",
                  "x_refsource_APPLE",
               ],
               url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://nghttp2.org/blog/2015/12/23/nghttp2-v1-6-0/",
            },
            {
               name: "FEDORA-2016-8e13ac5754",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175423.html",
            },
            {
               name: "APPLE-SA-2016-03-21-3",
               tags: [
                  "vendor-advisory",
                  "x_refsource_APPLE",
               ],
               url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://support.apple.com/HT206169",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://support.apple.com/HT206166",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2015-8659",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The idle stream handling in nghttp2 before 1.6.0 allows attackers to have unspecified impact via unknown vectors, aka a heap-use-after-free bug.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "APPLE-SA-2016-03-21-5",
                     refsource: "APPLE",
                     url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html",
                  },
                  {
                     name: "GLSA-201612-06",
                     refsource: "GENTOO",
                     url: "https://security.gentoo.org/glsa/201612-06",
                  },
                  {
                     name: "https://support.apple.com/HT206167",
                     refsource: "CONFIRM",
                     url: "https://support.apple.com/HT206167",
                  },
                  {
                     name: "https://support.apple.com/HT206168",
                     refsource: "CONFIRM",
                     url: "https://support.apple.com/HT206168",
                  },
                  {
                     name: "[oss-security] 20151223 Re: Use after free in nghttp2",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2015/12/23/10",
                  },
                  {
                     name: "1035353",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1035353",
                  },
                  {
                     name: "[oss-security] 20151223 Use after free in nghttp2",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2015/12/23/6",
                  },
                  {
                     name: "APPLE-SA-2016-03-21-1",
                     refsource: "APPLE",
                     url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html",
                  },
                  {
                     name: "FEDORA-2016-54f85ec6e8",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175085.html",
                  },
                  {
                     name: "APPLE-SA-2016-03-21-2",
                     refsource: "APPLE",
                     url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html",
                  },
                  {
                     name: "https://nghttp2.org/blog/2015/12/23/nghttp2-v1-6-0/",
                     refsource: "CONFIRM",
                     url: "https://nghttp2.org/blog/2015/12/23/nghttp2-v1-6-0/",
                  },
                  {
                     name: "FEDORA-2016-8e13ac5754",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175423.html",
                  },
                  {
                     name: "APPLE-SA-2016-03-21-3",
                     refsource: "APPLE",
                     url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html",
                  },
                  {
                     name: "https://support.apple.com/HT206169",
                     refsource: "CONFIRM",
                     url: "https://support.apple.com/HT206169",
                  },
                  {
                     name: "https://support.apple.com/HT206166",
                     refsource: "CONFIRM",
                     url: "https://support.apple.com/HT206166",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2015-8659",
      datePublished: "2016-01-12T19:00:00",
      dateReserved: "2015-12-23T00:00:00",
      dateUpdated: "2024-08-06T08:20:43.666Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-11080
Vulnerability from cvelistv5
Published
2020-06-03 00:00
Modified
2024-08-04 11:21
Summary
In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.
Impacted products
Vendor Product Version
nghttp2 nghttp2 Version: < 1.41.0
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T11:21:14.514Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "DSA-4696",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2020/dsa-4696",
               },
               {
                  name: "openSUSE-SU-2020:0802",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html",
               },
               {
                  name: "FEDORA-2020-f7d15c8b77",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpujul2020.html",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
               },
               {
                  name: "FEDORA-2020-43d5a372fc",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpujan2021.html",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com//security-alerts/cpujul2021.html",
               },
               {
                  name: "[debian-lts-announce] 20211017 [SECURITY] [DLA 2786-1] nghttp2 security update",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpuapr2022.html",
               },
               {
                  name: "[debian-lts-announce] 20231016 [SECURITY] [DLA 3621-1] nghttp2 security update",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "nghttp2",
               vendor: "nghttp2",
               versions: [
                  {
                     status: "affected",
                     version: "< 1.41.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "LOW",
                  baseScore: 3.7,
                  baseSeverity: "LOW",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-707",
                     description: "CWE-707 Improper Enforcement of Message or Data Structure",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-10-16T17:06:24.016570",
            orgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
            shortName: "GitHub_M",
         },
         references: [
            {
               name: "DSA-4696",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.debian.org/security/2020/dsa-4696",
            },
            {
               name: "openSUSE-SU-2020:0802",
               tags: [
                  "vendor-advisory",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html",
            },
            {
               name: "FEDORA-2020-f7d15c8b77",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/",
            },
            {
               url: "https://www.oracle.com/security-alerts/cpujul2020.html",
            },
            {
               url: "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr",
            },
            {
               url: "https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090",
            },
            {
               url: "https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394",
            },
            {
               url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
            },
            {
               name: "FEDORA-2020-43d5a372fc",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/",
            },
            {
               url: "https://www.oracle.com/security-alerts/cpujan2021.html",
            },
            {
               url: "https://www.oracle.com//security-alerts/cpujul2021.html",
            },
            {
               name: "[debian-lts-announce] 20211017 [SECURITY] [DLA 2786-1] nghttp2 security update",
               tags: [
                  "mailing-list",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html",
            },
            {
               url: "https://www.oracle.com/security-alerts/cpuapr2022.html",
            },
            {
               name: "[debian-lts-announce] 20231016 [SECURITY] [DLA 3621-1] nghttp2 security update",
               tags: [
                  "mailing-list",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html",
            },
         ],
         source: {
            advisory: "GHSA-q5wr-xfw9-q7xr",
            discovery: "UNKNOWN",
         },
         title: "Denial of service in nghttp2",
      },
   },
   cveMetadata: {
      assignerOrgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
      assignerShortName: "GitHub_M",
      cveId: "CVE-2020-11080",
      datePublished: "2020-06-03T00:00:00",
      dateReserved: "2020-03-30T00:00:00",
      dateUpdated: "2024-08-04T11:21:14.514Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-28182
Vulnerability from cvelistv5
Published
2024-04-04 14:41
Modified
2025-02-13 17:47
Summary
nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. The nghttp2 library prior to version 1.61.0 keeps reading the unbounded number of HTTP/2 CONTINUATION frames even after a stream is reset to keep HPACK context in sync. This causes excessive CPU usage to decode HPACK stream. nghttp2 v1.61.0 mitigates this vulnerability by limiting the number of CONTINUATION frames it accepts per stream. There is no workaround for this vulnerability.
Impacted products
Vendor Product Version
nghttp2 nghttp2 Version: < 1.61.0
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:nghttp2:nghttp2:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "nghttp2",
                  vendor: "nghttp2",
                  versions: [
                     {
                        lessThan: "1.61.0",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-28182",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-04-04T17:15:08.320689Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-07-15T15:54:31.848Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-09-27T16:02:59.311Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q",
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q",
               },
               {
                  name: "https://github.com/nghttp2/nghttp2/commit/00201ecd8f982da3b67d4f6868af72a1b03b14e0",
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/nghttp2/nghttp2/commit/00201ecd8f982da3b67d4f6868af72a1b03b14e0",
               },
               {
                  name: "https://github.com/nghttp2/nghttp2/commit/d71a4668c6bead55805d18810d633fbb98315af9",
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/nghttp2/nghttp2/commit/d71a4668c6bead55805d18810d633fbb98315af9",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGOME6ZXJG7664IPQNVE3DL67E3YP3HY/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J6ZMXUGB66VAXDW5J6QSTHM5ET25FGSA/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXJO2EASHM2OQQLGVDY5ZSO7UVDVHTDK/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2024/04/msg00026.html",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2024/04/03/16",
               },
               {
                  url: "https://lists.debian.org/debian-lts-announce/2024/09/msg00041.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "nghttp2",
               vendor: "nghttp2",
               versions: [
                  {
                     status: "affected",
                     version: "< 1.61.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. The nghttp2 library prior to version 1.61.0 keeps reading the unbounded number of HTTP/2 CONTINUATION frames even after a stream is reset to keep HPACK context in sync.  This causes excessive CPU usage to decode HPACK stream. nghttp2 v1.61.0 mitigates this vulnerability by limiting the number of CONTINUATION frames it accepts per stream. There is no workaround for this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "LOW",
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-770",
                     description: "CWE-770: Allocation of Resources Without Limits or Throttling",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-05-01T18:12:22.033Z",
            orgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
            shortName: "GitHub_M",
         },
         references: [
            {
               name: "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q",
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q",
            },
            {
               name: "https://github.com/nghttp2/nghttp2/commit/00201ecd8f982da3b67d4f6868af72a1b03b14e0",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/nghttp2/nghttp2/commit/00201ecd8f982da3b67d4f6868af72a1b03b14e0",
            },
            {
               name: "https://github.com/nghttp2/nghttp2/commit/d71a4668c6bead55805d18810d633fbb98315af9",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/nghttp2/nghttp2/commit/d71a4668c6bead55805d18810d633fbb98315af9",
            },
            {
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGOME6ZXJG7664IPQNVE3DL67E3YP3HY/",
            },
            {
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J6ZMXUGB66VAXDW5J6QSTHM5ET25FGSA/",
            },
            {
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXJO2EASHM2OQQLGVDY5ZSO7UVDVHTDK/",
            },
            {
               url: "https://lists.debian.org/debian-lts-announce/2024/04/msg00026.html",
            },
            {
               url: "http://www.openwall.com/lists/oss-security/2024/04/03/16",
            },
         ],
         source: {
            advisory: "GHSA-x6x3-gv8h-m57q",
            discovery: "UNKNOWN",
         },
         title: "Reading unbounded number of HTTP/2 CONTINUATION frames to cause excessive CPU usage",
      },
   },
   cveMetadata: {
      assignerOrgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
      assignerShortName: "GitHub_M",
      cveId: "CVE-2024-28182",
      datePublished: "2024-04-04T14:41:36.587Z",
      dateReserved: "2024-03-06T17:35:00.857Z",
      dateUpdated: "2025-02-13T17:47:27.639Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2016-1544
Vulnerability from cvelistv5
Published
2020-02-06 14:20
Modified
2024-08-05 23:02
Severity ?
Summary
nghttp2 before 1.7.1 allows remote attackers to cause a denial of service (memory exhaustion).
Impacted products
Vendor Product Version
nghttp2 nghttp2 Version: before 1.7.1
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T23:02:11.949Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=1308461",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/nghttp2/nghttp2/releases/tag/v1.7.1",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/nghttp2/nghttp2/compare/v1.7.0...v1.7.1",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.gentoo.org/glsa/201612-13",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177666.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177308.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "nghttp2",
               vendor: "nghttp2",
               versions: [
                  {
                     status: "affected",
                     version: "before 1.7.1",
                  },
               ],
            },
         ],
         datePublic: "2016-02-15T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "nghttp2 before 1.7.1 allows remote attackers to cause a denial of service (memory exhaustion).",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Other",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-02-06T14:20:29",
            orgId: "37e5125f-f79b-445b-8fad-9564f167944b",
            shortName: "certcc",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=1308461",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/nghttp2/nghttp2/releases/tag/v1.7.1",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/nghttp2/nghttp2/compare/v1.7.0...v1.7.1",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.gentoo.org/glsa/201612-13",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177666.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177308.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cert@cert.org",
               ID: "CVE-2016-1544",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "nghttp2",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "before 1.7.1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "nghttp2",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "nghttp2 before 1.7.1 allows remote attackers to cause a denial of service (memory exhaustion).",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Other",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://bugzilla.redhat.com/show_bug.cgi?id=1308461",
                     refsource: "CONFIRM",
                     url: "https://bugzilla.redhat.com/show_bug.cgi?id=1308461",
                  },
                  {
                     name: "https://github.com/nghttp2/nghttp2/releases/tag/v1.7.1",
                     refsource: "CONFIRM",
                     url: "https://github.com/nghttp2/nghttp2/releases/tag/v1.7.1",
                  },
                  {
                     name: "https://github.com/nghttp2/nghttp2/compare/v1.7.0...v1.7.1",
                     refsource: "CONFIRM",
                     url: "https://github.com/nghttp2/nghttp2/compare/v1.7.0...v1.7.1",
                  },
                  {
                     name: "https://security.gentoo.org/glsa/201612-13",
                     refsource: "CONFIRM",
                     url: "https://security.gentoo.org/glsa/201612-13",
                  },
                  {
                     name: "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177666.html",
                     refsource: "CONFIRM",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177666.html",
                  },
                  {
                     name: "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177308.html",
                     refsource: "CONFIRM",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177308.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "37e5125f-f79b-445b-8fad-9564f167944b",
      assignerShortName: "certcc",
      cveId: "CVE-2016-1544",
      datePublished: "2020-02-06T14:20:29",
      dateReserved: "2016-01-07T00:00:00",
      dateUpdated: "2024-08-05T23:02:11.949Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}