U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2023-44487

Change History

Modified Analysis by NIST 10/18/2023 11:20:46 AM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:amazon:opensearch_data_prepper:*:*:*:*:*:*:*:* versions up to (excluding) 2.5.0
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* versions from (including) 8.5.0 up to (including) 8.5.93
     *cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* versions from (including) 9.0.0 up to (including) 9.0.80
     *cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* versions from (including) 10.1.0 up to (including) 10.1.13
     *cpe:2.3:a:apache:tomcat:11.0.0:milestone1:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:11.0.0:milestone10:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:11.0.0:milestone11:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:11.0.0:milestone2:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:11.0.0:milestone3:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:11.0.0:milestone4:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:11.0.0:milestone5:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:11.0.0:milestone6:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:11.0.0:milestone7:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:11.0.0:milestone8:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:11.0.0:milestone9:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:* versions from (including) 8.0.0 up to (excluding) 8.1.9
     *cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:* versions from (including) 9.0.0 up to (excluding) 9.2.3
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:apple:swiftnio_http\/2:*:*:*:*:*:swift:*:* versions up to (excluding) 1.28.0
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:caddyserver:caddy:*:*:*:*:*:*:*:* versions up to (excluding) 2.5.7
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:dena:h2o:*:*:*:*:*:*:*:* versions up to (excluding) 2023-10-10
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:* versions up to (excluding) 9.4.53
     *cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:* versions from (including) 10.0.0 up to (excluding) 10.0.17
     *cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (excluding) 11.0.17
     *cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:* versions from (including) 12.0.0 up to (excluding) 12.0.2
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:envoyproxy:envoy:1.24.10:*:*:*:*:*:*:*
     *cpe:2.3:a:envoyproxy:envoy:1.25.9:*:*:*:*:*:*:*
     *cpe:2.3:a:envoyproxy:envoy:1.26.4:*:*:*:*:*:*:*
     *cpe:2.3:a:envoyproxy:envoy:1.27.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from (including) 13.1.0 up to (including) 13.1.5
     *cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from (including) 14.1.0 up to (including) 14.1.5
     *cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from (including) 15.1.0 up to (including) 15.1.10
     *cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from (including) 16.1.0 up to (including) 16.1.4
     *cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* versions from (including) 13.1.0 up to (including) 13.1.5
     *cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* versions from (including) 14.1.0 up to (including) 14.1.5
     *cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* versions from (including) 15.1.0 up to (including) 15.1.10
     *cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* versions from (including) 16.1.0 up to (including) 16.1.4
     *cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:* versions from (including) 13.1.0 up to (including) 13.1.5
     *cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:* versions from (including) 14.1.0 up to (including) 14.1.5
     *cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:* versions from (including) 15.1.0 up to (including) 15.1.10
     *cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:* versions from (including) 16.1.0 up to (including) 16.1.4
     *cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from (including) 13.1.0 up to (including) 13.1.5
     *cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from (including) 14.1.0 up to (including) 14.1.5
     *cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from (including) 15.1.0 up to (including) 15.1.10
     *cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from (including) 16.1.0 up to (including) 16.1.4
     *cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* versions from (including) 13.1.0 up to (including) 13.1.5
     *cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* versions from (including) 14.1.0 up to (including) 14.1.5
     *cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* versions from (including) 15.1.0 up to (including) 15.1.10
     *cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* versions from (including) 16.1.0 up to (including) 16.1.4
     *cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from (including) 13.1.0 up to (including) 13.1.5
     *cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from (including) 14.1.0 up to (including) 14.1.5
     *cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from (including) 15.1.0 up to (including) 15.1.10
     *cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from (including) 16.1.0 up to (including) 16.1.4
     *cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:* versions from (including) 13.1.0 up to (including) 13.1.5
     *cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:* versions from (including) 14.1.0 up to (including) 14.1.5
     *cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:* versions from (including) 15.1.0 up to (including) 15.1.10
     *cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:* versions from (including) 16.1.0 up to (including) 16.1.4
     *cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:* versions from (including) 13.1.0 up to (including) 13.1.5
     *cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:* versions from (including) 14.1.0 up to (including) 14.1.5
     *cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:* versions from (including) 15.1.0 up to (including) 15.1.10
     *cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:* versions from (including) 16.1.0 up to (including) 16.1.4
     *cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:* versions from (including) 13.1.0 up to (including) 13.1.5
     *cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:* versions from (including) 14.1.0 up to (including) 14.1.5
     *cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:* versions from (including) 15.1.0 up to (including) 15.1.10
     *cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:* versions from (including) 16.1.0 up to (including) 16.1.4
     *cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* versions from (including) 13.1.0 up to (including) 13.1.5
     *cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* versions from (including) 14.1.0 up to (including) 14.1.5
     *cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* versions from (including) 15.1.0 up to (including) 15.1.10
     *cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* versions from (including) 16.1.0 up to (including) 16.1.4
     *cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* versions from (including) 13.1.0 up to (including) 13.1.5
     *cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* versions from (including) 14.1.0 up to (including) 14.1.5
     *cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* versions from (including) 15.1.0 up to (including) 15.1.10
     *cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* versions from (including) 16.1.0 up to (including) 16.1.4
     *cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from (including) 13.1.0 up to (including) 13.1.5
     *cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from (including) 14.1.0 up to (including) 14.1.5
     *cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from (including) 15.1.0 up to (including) 15.1.10
     *cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from (including) 16.1.0 up to (including) 16.1.4
     *cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from (including) 13.1.0 up to (including) 13.1.5
     *cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from (including) 14.1.0 up to (including) 14.1.5
     *cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from (including) 15.1.0 up to (including) 15.1.10
     *cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from (including) 16.1.0 up to (including) 16.1.4
     *cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from (including) 13.1.0 up to (including) 13.1.5
     *cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from (including) 14.1.0 up to (including) 14.1.5
     *cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from (including) 15.1.0 up to (including) 15.1.10
     *cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from (including) 16.1.0 up to (including) 16.1.4
     *cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*
     *cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:* versions from (including) 1.5.0 up to (including) 1.8.2
     *cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* versions from (including) 13.1.0 up to (including) 13.1.5
     *cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* versions from (including) 14.1.0 up to (including) 14.1.5
     *cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* versions from (including) 15.1.0 up to (including) 15.1.10
     *cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* versions from (including) 16.1.0 up to (including) 16.1.4
     *cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:* versions from (including) 13.1.0 up to (including) 13.1.5
     *cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:* versions from (including) 14.1.0 up to (including) 14.1.5
     *cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:* versions from (including) 15.1.0 up to (including) 15.1.10
     *cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:* versions from (including) 16.1.0 up to (including) 16.1.4
     *cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from (including) 13.1.0 up to (including) 13.1.5
     *cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from (including) 14.1.0 up to (including) 14.1.5
     *cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from (including) 15.1.0 up to (including) 15.1.10
     *cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from (including) 16.1.0 up to (including) 16.1.4
     *cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:* versions from (including) 13.1.0 up to (including) 13.1.5
     *cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:* versions from (including) 14.1.0 up to (including) 14.1.5
     *cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:* versions from (including) 15.1.0 up to (including) 15.1.10
     *cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:* versions from (including) 16.1.0 up to (including) 16.1.4
     *cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:* versions from (including) 1.9.5 up to (including) 1.25.2
     *cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:* versions from (including) 2.0.0 up to (including) 2.4.2
     *cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:* versions from (including) 3.0.0 up to (including) 3.3.0
     *cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:* versions from (including) r25 up to (excluding) r29
     *cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*
     *cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:facebook:proxygen:*:*:*:*:*:*:*:* versions up to (excluding) 2023.10.16.00
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:golang:go:*:*:*:*:*:*:*:* versions up to (excluding) 1.20.10
     *cpe:2.3:a:golang:go:*:*:*:*:*:*:*:* versions from (including) 1.21.0 up to (excluding) 1.21.3
     *cpe:2.3:a:golang:http2:*:*:*:*:*:go:*:* versions up to (excluding) 0.17.0
     *cpe:2.3:a:golang:networking:*:*:*:*:*:go:*:* versions up to (excluding) 0.17.0
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:grpc:grpc:*:*:*:*:*:go:*:* versions up to (excluding) 1.56.3
     *cpe:2.3:a:grpc:grpc:1.57.0:-:*:*:*:go:*:*
     *cpe:2.3:a:grpc:grpc:*:*:*:*:*:go:*:* versions from (including) 1.58.0 up to (excluding) 1.58.3
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:* versions from (including) 6.0.0 up to (excluding) 6.0.23
     *cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:* versions from (including) 7.0.0 up to (excluding) 7.0.12
     *cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:* versions from (including) 6.0.0 up to (excluding) 6.0.23
     *cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:* versions from (including) 7.0.0 up to (excluding) 7.0.12
     *cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:* versions from (including) 17.0 up to (excluding) 17.2.20
     *cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:* versions from (including) 17.4 up to (excluding) 17.4.12
     *cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:* versions from (including) 17.6 up to (excluding) 17.6.8
     *cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:* versions from (including) 17.7 up to (excluding) 17.7.5
     *cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:* versions up to (excluding) 10.0.14393.6351
     *cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:* versions up to (excluding) 10.0.14393.6351
     *cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.17763.4974
     *cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.19044.3570
     *cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.19045.3570
     *cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.22000.2538
     *cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.22621.2428
     *cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:microsoft:cbl-mariner:*:*:*:*:*:*:*:* versions up to (excluding) 2023-10-11
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:netty:netty:*:*:*:*:*:*:*:* versions up to (excluding) 4.1.100
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:nghttp2:nghttp2:*:*:*:*:*:*:*:* versions up to (excluding) 1.57.0
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:* versions up to (excluding) 21.0.0
Changed Reference Type
http://www.openwall.com/lists/oss-security/2023/10/13/9 No Types Assigned
http://www.openwall.com/lists/oss-security/2023/10/13/9 Mailing List, Third Party Advisory
Changed Reference Type
https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/ No Types Assigned
https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/ Third Party Advisory
Changed Reference Type
https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9 Patch
https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9 Mailing List, Patch
Changed Reference Type
https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve Technical Description, Vendor Advisory
https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve Technical Description, Third Party Advisory
Changed Reference Type
https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088 Vendor Advisory
https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088 Third Party Advisory
Changed Reference Type
https://github.com/advisories/GHSA-vx74-f528-fxqg Vendor Advisory
https://github.com/advisories/GHSA-vx74-f528-fxqg Mitigation, Patch, Vendor Advisory
Changed Reference Type
https://github.com/advisories/GHSA-xpw8-rcwv-8f8p Vendor Advisory
https://github.com/advisories/GHSA-xpw8-rcwv-8f8p Patch, Vendor Advisory
Changed Reference Type
https://github.com/alibaba/tengine/issues/1872 Vendor Advisory
https://github.com/alibaba/tengine/issues/1872 Issue Tracking, Vendor Advisory
Changed Reference Type
https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2 Vendor Advisory
https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2 Product
Changed Reference Type
https://github.com/apache/trafficserver/pull/10564 Vendor Advisory
https://github.com/apache/trafficserver/pull/10564 Patch, Vendor Advisory
Changed Reference Type
https://github.com/bcdannyboy/CVE-2023-44487 Vendor Advisory
https://github.com/bcdannyboy/CVE-2023-44487 Third Party Advisory
Changed Reference Type
https://github.com/caddyserver/caddy/issues/5877 Vendor Advisory
https://github.com/caddyserver/caddy/issues/5877 Issue Tracking, Vendor Advisory
Changed Reference Type
https://github.com/dotnet/announcements/issues/277 Vendor Advisory
https://github.com/dotnet/announcements/issues/277 Mitigation, Vendor Advisory
Changed Reference Type
https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73 Vendor Advisory
https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73 Product, Release Notes, Vendor Advisory
Changed Reference Type
https://github.com/eclipse/jetty.project/issues/10679 Vendor Advisory
https://github.com/eclipse/jetty.project/issues/10679 Issue Tracking, Vendor Advisory
Changed Reference Type
https://github.com/envoyproxy/envoy/pull/30055 Vendor Advisory
https://github.com/envoyproxy/envoy/pull/30055 Patch, Vendor Advisory
Changed Reference Type
https://github.com/facebook/proxygen/pull/466 Vendor Advisory
https://github.com/facebook/proxygen/pull/466 Patch, Vendor Advisory
Changed Reference Type
https://github.com/golang/go/issues/63417 Vendor Advisory
https://github.com/golang/go/issues/63417 Issue Tracking, Vendor Advisory
Changed Reference Type
https://github.com/grpc/grpc-go/pull/6703 Vendor Advisory
https://github.com/grpc/grpc-go/pull/6703 Patch, Vendor Advisory
Changed Reference Type
https://github.com/h2o/h2o/pull/3291 Vendor Advisory
https://github.com/h2o/h2o/pull/3291 Patch
Changed Reference Type
https://github.com/haproxy/haproxy/issues/2312 Vendor Advisory
https://github.com/haproxy/haproxy/issues/2312 Issue Tracking, Vendor Advisory
Changed Reference Type
https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244 Vendor Advisory
https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244 Product, Vendor Advisory
Changed Reference Type
https://github.com/kubernetes/kubernetes/pull/121120 Vendor Advisory
https://github.com/kubernetes/kubernetes/pull/121120 Patch, Vendor Advisory
Changed Reference Type
https://github.com/micrictor/http2-rst-stream Vendor Advisory
https://github.com/micrictor/http2-rst-stream Exploit, Third Party Advisory
Changed Reference Type
https://github.com/microsoft/CBL-Mariner/pull/6381 Vendor Advisory
https://github.com/microsoft/CBL-Mariner/pull/6381 Patch, Vendor Advisory
Changed Reference Type
https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61 Vendor Advisory
https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61 Patch, Vendor Advisory
Changed Reference Type
https://github.com/nghttp2/nghttp2/pull/1961 Vendor Advisory
https://github.com/nghttp2/nghttp2/pull/1961 Patch, Vendor Advisory
Changed Reference Type
https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0 Vendor Advisory
https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0 Release Notes
Changed Reference Type
https://github.com/opensearch-project/data-prepper/issues/3474 Vendor Advisory
https://github.com/opensearch-project/data-prepper/issues/3474 Issue Tracking, Patch, Vendor Advisory
Changed Reference Type
https://github.com/oqtane/oqtane.framework/discussions/3367 Vendor Advisory
https://github.com/oqtane/oqtane.framework/discussions/3367 Issue Tracking, Vendor Advisory
Changed Reference Type
https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/ No Types Assigned
https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/ Third Party Advisory
Changed Reference Type
https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q Vendor Advisory
https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q Mailing List, Vendor Advisory
Changed Reference Type
https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html No Types Assigned
https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html Third Party Advisory
Changed Reference Type
https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html No Types Assigned
https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html Third Party Advisory
Changed Reference Type
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/ No Types Assigned
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/ Third Party Advisory
Changed Reference Type
https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html No Types Assigned
https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html Third Party Advisory
Changed Reference Type
https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html Mailing List
https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html Mailing List, Patch
Changed Reference Type
https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/ Vendor Advisory
https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/ Patch, Vendor Advisory
Changed Reference Type
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487 Patch, Vendor Advisory
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487 Mitigation, Patch, Vendor Advisory
Changed Reference Type
https://netty.io/news/2023/10/10/4-1-100-Final.html Vendor Advisory
https://netty.io/news/2023/10/10/4-1-100-Final.html Release Notes, Vendor Advisory
Changed Reference Type
https://news.ycombinator.com/item?id=37830987 Third Party Advisory
https://news.ycombinator.com/item?id=37830987 Issue Tracking, Third Party Advisory
Changed Reference Type
https://news.ycombinator.com/item?id=37830998 Press/Media Coverage
https://news.ycombinator.com/item?id=37830998 Issue Tracking, Press/Media Coverage
Changed Reference Type
https://news.ycombinator.com/item?id=37831062 Third Party Advisory
https://news.ycombinator.com/item?id=37831062 Issue Tracking, Third Party Advisory
Changed Reference Type
https://security.netapp.com/advisory/ntap-20231016-0001/ No Types Assigned
https://security.netapp.com/advisory/ntap-20231016-0001/ Third Party Advisory
Changed Reference Type
https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14 Vendor Advisory
https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14 Release Notes, Vendor Advisory
Changed Reference Type
https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/ Vendor Advisory
https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/ Mitigation, Vendor Advisory