{"api_version":"1","generated_at":"2026-04-21T14:08:22+00:00","cve":"CVE-2023-44487","urls":{"html":"https://cve.report/CVE-2023-44487","api":"https://cve.report/api/cve/CVE-2023-44487.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-44487","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-44487"},"summary":{"title":"HTTP/2 Rapid Reset Attack Vulnerability","description":"The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2023-10-10 14:15:00","updated_at":"2024-02-02 15:40:00"},"problem_types":["CWE-400"],"metrics":[],"references":[{"url":"https://my.f5.com/manage/s/article/K000137106","name":"https://my.f5.com/manage/s/article/K000137106","refsource":"MISC","tags":[],"title":"myF5","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/","name":"FEDORA-2023-822aab0a5a","refsource":"","tags":[],"title":"[SECURITY] Fedora 39 Update: golang-1.21.3-1.fc39 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/","name":"FEDORA-2023-4bf641255e","refsource":"","tags":[],"title":"[SECURITY] Fedora 37 Update: golang-1.20.10-3.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/","name":"FEDORA-2023-5ff7bf1dd8","refsource":"","tags":[],"title":"[SECURITY] Fedora 38 Update: trafficserver-9.2.3-1.fc38 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244","name":"https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244","refsource":"MISC","tags":[],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"404"},{"url":"https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack","name":"https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack","refsource":"MISC","tags":[],"title":"How it works: The novel HTTP/2 ‘Rapid Reset’ DDoS attack | Google Cloud Blog","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/apache/httpd-site/pull/10","name":"https://github.com/apache/httpd-site/pull/10","refsource":"MISC","tags":[],"title":"Document non-impact of CVE-2023-44487 by raboof · Pull Request #10 · apache/httpd-site · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/","name":"FEDORA-2023-c0c6a91330","refsource":"","tags":[],"title":"[SECURITY] Fedora 37 Update: mod_http2-2.0.25-1.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/","name":"https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/","refsource":"MISC","tags":[],"title":"New 'HTTP/2 Rapid Reset' zero-day attack breaks DDoS records","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.debian.org/security/2023/dsa-5521","name":"DSA-5521","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-5521-1 tomcat10","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113","name":"https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113","refsource":"MISC","tags":[],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/oqtane/oqtane.framework/discussions/3367","name":"https://github.com/oqtane/oqtane.framework/discussions/3367","refsource":"MISC","tags":[],"title":".NET 7 security vulernability Kestrel Server HTTP/2 · oqtane/oqtane.framework · Discussion #3367 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00047.html","name":"[debian-lts-announce] 20231031 [SECURITY] [DLA 3638-1] h2o security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 3638-1] h2o security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125","name":"https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125","refsource":"MISC","tags":[],"title":"Is Traefik vulnerable to CVE-2023-44487? - Traefik v2 (latest) - Traefik Labs Community Forum","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/","name":"FEDORA-2023-ed2642fd58","refsource":"","tags":[],"title":"[SECURITY] Fedora 38 Update: nghttp2-1.52.0-2.fc38 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.openwall.com/lists/oss-security/2023/10/20/8","name":"[oss-security] 20231020 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations","refsource":"MLIST","tags":[],"title":"oss-security - Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against\n many implementations","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://chaos.social/@icing/111210915918780532","name":"https://chaos.social/@icing/111210915918780532","refsource":"MISC","tags":[],"title":"Stefan Eissing: \"More details: httpd keeps a „mood“ counter for ea…\" - chaos.social","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://netty.io/news/2023/10/10/4-1-100-Final.html","name":"https://netty.io/news/2023/10/10/4-1-100-Final.html","refsource":"MISC","tags":[],"title":"Netty.news: Netty 4.1.100.Final released","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/","name":"FEDORA-2023-17efd3f2cd","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 38 Update: mcrouter-0.41.0.20231016-1.fc38 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/haproxy/haproxy/issues/2312","name":"https://github.com/haproxy/haproxy/issues/2312","refsource":"MISC","tags":[],"title":"h2 RST bug aka CVE-2023-44487 · Issue #2312 · haproxy/haproxy · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/","name":"FEDORA-2023-d5030c983c","refsource":"","tags":[],"title":"[SECURITY] Fedora 38 Update: nodejs18-18.18.2-1.fc38 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.debian.org/debian-lts-announce/2023/11/msg00012.html","name":"[debian-lts-announce] 20231119 [SECURITY] [DLA 3656-1] netty security update","refsource":"","tags":[],"title":"","mime":"","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/","name":"FEDORA-2023-e9c04d81c1","refsource":"","tags":[],"title":"[SECURITY] Fedora 37 Update: nodejs18-18.18.2-1.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/","name":"FEDORA-2023-5ff7bf1dd8","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 38 Update: trafficserver-9.2.3-1.fc38 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo","name":"https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo","refsource":"MISC","tags":[],"title":"[security] Go 1.21.3 and Go 1.20.10 are released","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html","name":"https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html","refsource":"MISC","tags":[],"title":"[PATCH] HTTP/2: per-iteration stream handling limit","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/line/armeria/pull/5232","name":"https://github.com/line/armeria/pull/5232","refsource":"MISC","tags":[],"title":"Limit max reset frames to mitigate HTTP/2 RST floods by ikhoon · Pull Request #5232 · line/armeria · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://aws.amazon.com/security/security-bulletins/AWS-2023-011/","name":"https://aws.amazon.com/security/security-bulletins/AWS-2023-011/","refsource":"MISC","tags":[],"title":"CVE-2023-44487 - HTTP/2 Rapid Reset Attack","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/","name":"FEDORA-2023-17efd3f2cd","refsource":"","tags":[],"title":"[SECURITY] Fedora 38 Update: mcrouter-0.41.0.20231016-1.fc38 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/eclipse/jetty.project/issues/10679","name":"https://github.com/eclipse/jetty.project/issues/10679","refsource":"MISC","tags":[],"title":"Allow HTTP/2 rate control to mitigate HTTP/2 floods (CVE-2023-44487) · Issue #10679 · eclipse/jetty.project · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/","name":"https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/","refsource":"MISC","tags":[],"title":"How Linkerd became resilient to CVE-2023-44487, a HTTP/2 DDOS vulnerability, six months prior to its disclosure | Linkerd","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2242803","name":"https://bugzilla.redhat.com/show_bug.cgi?id=2242803","refsource":"MISC","tags":[],"title":"2242803 – (CVE-2023-44487) CVE-2023-44487 HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html","name":"[debian-lts-announce] 20231016 [SECURITY] [DLA 3617-2] tomcat9 regression update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 3617-2] tomcat9 regression update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.debian.org/security/2023/dsa-5570","name":"DSA-5570","refsource":"","tags":[],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00045.html","name":"[debian-lts-announce] 20231030 [SECURITY] [DLA 3641-1] jetty9 security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 3641-1] jetty9 security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack","name":"https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack","refsource":"MISC","tags":[],"title":"CVE-2023-44487 HTTP/2 Rapid Reset Attack | Qualys Security Blog","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://news.ycombinator.com/item?id=37831062","name":"https://news.ycombinator.com/item?id=37831062","refsource":"MISC","tags":[],"title":"Google mitigated the largest DDoS attack to date, peaking above 398M rps | Hacker News","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/","name":"FEDORA-2023-e9c04d81c1","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 37 Update: nodejs18-18.18.2-1.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/hyperium/hyper/issues/3337","name":"https://github.com/hyperium/hyper/issues/3337","refsource":"MISC","tags":[],"title":"Pick a default for HTTP/2 server max concurrent streams · Issue #3337 · hyperium/hyper · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/tempesta-tech/tempesta/issues/1986","name":"https://github.com/tempesta-tech/tempesta/issues/1986","refsource":"MISC","tags":[],"title":"HTTP/2 Rapid Reset DDoS Mitigaton · Issue #1986 · tempesta-tech/tempesta · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/","name":"FEDORA-2023-3f70b8d406","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 39 Update: nghttp2-1.55.1-4.fc39 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/","name":"FEDORA-2023-2a9214af5f","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 37 Update: folly-2023.10.16.00-1.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/ninenines/cowboy/issues/1615","name":"https://github.com/ninenines/cowboy/issues/1615","refsource":"MISC","tags":[],"title":"Is Cowboy affected by the HTTP/2 Rapid Reset attack? · Issue #1615 · ninenines/cowboy · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/","name":"FEDORA-2023-7b52921cae","refsource":"","tags":[],"title":"[SECURITY] Fedora 39 Update: nodejs20-20.8.1-1.fc39 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/bcdannyboy/CVE-2023-44487","name":"https://github.com/bcdannyboy/CVE-2023-44487","refsource":"MISC","tags":[],"title":"GitHub - bcdannyboy/CVE-2023-44487: Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/etcd-io/etcd/issues/16740","name":"https://github.com/etcd-io/etcd/issues/16740","refsource":"MISC","tags":[],"title":"Resolve CVE-2023-44487 · Issue #16740 · etcd-io/etcd · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/","name":"https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/","refsource":"MISC","tags":[],"title":"Biggest DDoSes of all time generated by protocol 0-day in HTTP/2 | Ars Technica","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632","name":"https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632","refsource":"MISC","tags":[],"title":"initial draft of CVE-2023-44487 blog post by wmorgan · Pull Request #1695 · linkerd/website · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.openwall.com/lists/oss-security/2023/10/10/6","name":"https://www.openwall.com/lists/oss-security/2023/10/10/6","refsource":"MISC","tags":[],"title":"oss-security - CVE-2023-44487: HTTP/2 Rapid Reset attack against many\n implementations","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/","name":"FEDORA-2023-f66fc0f62a","refsource":"","tags":[],"title":"[SECURITY] Fedora 37 Update: nodejs20-20.8.1-1.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/","name":"FEDORA-2023-dbe64661af","refsource":"","tags":[],"title":"[SECURITY] Fedora 39 Update: nodejs18-18.18.2-1.fc39 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/projectcontour/contour/pull/5826","name":"https://github.com/projectcontour/contour/pull/5826","refsource":"MISC","tags":[],"title":"Set stream limits for HTTP2 protocol - CVE CVE-2023-44487 by akshaysngupta · Pull Request #5826 · projectcontour/contour · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088","name":"https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088","refsource":"MISC","tags":[],"title":"HTTP/2 Rapid Reset DDoS Attack · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security.netapp.com/advisory/ntap-20231016-0001/","name":"https://security.netapp.com/advisory/ntap-20231016-0001/","refsource":"CONFIRM","tags":[],"title":"CVE-2023-44487 HTTP/2 Vulnerability in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/h2o/h2o/pull/3291","name":"https://github.com/h2o/h2o/pull/3291","refsource":"MISC","tags":[],"title":"[http2] rapid reset attack by kazuho · Pull Request #3291 · h2o/h2o · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/","name":"FEDORA-2023-4d2fd884ea","refsource":"","tags":[],"title":"[SECURITY] Fedora 38 Update: nodejs20-20.8.1-1.fc38 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/","name":"https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/","refsource":"MISC","tags":[],"title":"HTTP/2 Rapid Reset: deconstructing the record-breaking attack","mime":"text/html","httpstatus":"403","archivestatus":"200"},{"url":"https://github.com/dotnet/announcements/issues/277","name":"https://github.com/dotnet/announcements/issues/277","refsource":"MISC","tags":[],"title":"Microsoft Security Advisory CVE-2023-44487: .NET Denial of Service Vulnerability · Issue #277 · dotnet/announcements · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/kubernetes/kubernetes/pull/121120","name":"https://github.com/kubernetes/kubernetes/pull/121120","refsource":"MISC","tags":[],"title":"Prevent rapid reset http2 DOS on API server by enj · Pull Request #121120 · kubernetes/kubernetes · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/envoyproxy/envoy/pull/30055","name":"https://github.com/envoyproxy/envoy/pull/30055","refsource":"MISC","tags":[],"title":"http: Fix CVE CVE-2023-44487 by phlax · Pull Request #30055 · envoyproxy/envoy · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://blog.vespa.ai/cve-2023-44487/","name":"https://blog.vespa.ai/cve-2023-44487/","refsource":"MISC","tags":[],"title":"HTTP/2 Rapid Reset (CVE-2023-44487) | Vespa Blog","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715","name":"https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715","refsource":"MISC","tags":[],"title":"HCSEC-2023-32 - Vault, Consul, and Boundary Affected By HTTP/2 “Rapid Reset” Denial of Service Vulnerability (CVE-2023-44487) - Security - HashiCorp Discuss","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/","name":"FEDORA-2023-0259c3f26f","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 38 Update: mod_http2-2.0.25-1.fc38 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.debian.org/security/2023/dsa-5558","name":"DSA-5558","refsource":"","tags":[],"title":"","mime":"","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/golang/go/issues/63417","name":"https://github.com/golang/go/issues/63417","refsource":"MISC","tags":[],"title":"net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-39325) · Issue #63417 · golang/go · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0","name":"https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0","refsource":"MISC","tags":[],"title":"Release nghttp2 v1.57.0 · nghttp2/nghttp2 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/alibaba/tengine/issues/1872","name":"https://github.com/alibaba/tengine/issues/1872","refsource":"MISC","tags":[],"title":"CVE-2023-44487: HTTP/2 Rapid Reset Attack · Issue #1872 · alibaba/tengine · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/advisories/GHSA-xpw8-rcwv-8f8p","name":"https://github.com/advisories/GHSA-xpw8-rcwv-8f8p","refsource":"MISC","tags":[],"title":"io.netty:netty-codec-http2 vulnerable to HTTP/2 Rapid Reset Attack · GHSA-xpw8-rcwv-8f8p · GitHub Advisory Database · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/apache/trafficserver/pull/10564","name":"https://github.com/apache/trafficserver/pull/10564","refsource":"MISC","tags":[],"title":"Add an HTTP/2 related rate limiting by maskit · Pull Request #10564 · apache/trafficserver · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/varnishcache/varnish-cache/issues/3996","name":"https://github.com/varnishcache/varnish-cache/issues/3996","refsource":"MISC","tags":[],"title":"Handling of CVE-2023-44487 / HTTP2 Rapid Reset · Issue #3996 · varnishcache/varnish-cache · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/","name":"FEDORA-2023-2a9214af5f","refsource":"","tags":[],"title":"[SECURITY] Fedora 37 Update: folly-2023.10.16.00-1.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14","name":"https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14","refsource":"MISC","tags":[],"title":"Apache Tomcat® - Apache Tomcat 10 vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve","name":"https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve","refsource":"MISC","tags":[],"title":"Resets, Leaks, DDoS and the Tale of a Hidden CVE - Edgio","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://ubuntu.com/security/CVE-2023-44487","name":"https://ubuntu.com/security/CVE-2023-44487","refsource":"MISC","tags":[],"title":"CVE-2023-44487 | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://access.redhat.com/security/cve/cve-2023-44487","name":"https://access.redhat.com/security/cve/cve-2023-44487","refsource":"MISC","tags":[],"title":"cve-details","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/","name":"FEDORA-2023-0259c3f26f","refsource":"","tags":[],"title":"[SECURITY] Fedora 38 Update: mod_http2-2.0.25-1.fc38 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.gentoo.org/glsa/202311-09","name":"GLSA-202311-09","refsource":"","tags":["Third Party Advisory"],"title":"Go: Multiple Vulnerabilities (GLSA 202311-09) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/","name":"FEDORA-2023-4bf641255e","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 37 Update: golang-1.20.10-3.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/advisories/GHSA-qppj-fm5r-hxr3","name":"https://github.com/advisories/GHSA-qppj-fm5r-hxr3","refsource":"MISC","tags":[],"title":"swift-nio-http2 vulnerable to HTTP/2 Stream Cancellation Attack · CVE-2023-44487 · GitHub Advisory Database · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/caddyserver/caddy/issues/5877","name":"https://github.com/caddyserver/caddy/issues/5877","refsource":"MISC","tags":[],"title":"HTTP/2 Rapid Reset : CVE-2023-44487 · Issue #5877 · caddyserver/caddy · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/","name":"FEDORA-2023-ed2642fd58","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 38 Update: nghttp2-1.52.0-2.fc38 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/facebook/proxygen/pull/466","name":"https://github.com/facebook/proxygen/pull/466","refsource":"MISC","tags":[],"title":"Re-sync with internal repository following CVE-2023-44487 by facebook-github-bot · Pull Request #466 · facebook/proxygen · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/","name":"https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/","refsource":"MISC","tags":[],"title":"Microsoft Response to Distributed Denial of Service (DDoS) Attacks against HTTP/2 | MSRC Blog\n        | Microsoft Security Response Center","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/Kong/kong/discussions/11741","name":"https://github.com/Kong/kong/discussions/11741","refsource":"MISC","tags":[],"title":"HTTP2 Rapid Reset - CVE-2023-44487 · Kong/kong · Discussion #11741 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487","name":"https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487","refsource":"MISC","tags":[],"title":"HTTP/2 Rapid Reset Vulnerability, CVE-2023-44487 | CISA","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/","name":"FEDORA-2023-d5030c983c","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 38 Update: nodejs18-18.18.2-1.fc38 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.debian.org/security/2023/dsa-5522","name":"DSA-5522","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-5522-1 tomcat9","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/","name":"FEDORA-2023-54fadada12","refsource":"","tags":[],"title":"[SECURITY] Fedora 37 Update: trafficserver-9.2.3-1.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/nghttp2/nghttp2/pull/1961","name":"https://github.com/nghttp2/nghttp2/pull/1961","refsource":"MISC","tags":[],"title":"Rework session management by tatsuhiro-t · Pull Request #1961 · nghttp2/nghttp2 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/","name":"https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/","refsource":"MISC","tags":[],"title":"HTTP/2 Rapid Reset Attack Impacting NGINX Products - NGINX","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.paloaltonetworks.com/CVE-2023-44487","name":"https://security.paloaltonetworks.com/CVE-2023-44487","refsource":"MISC","tags":[],"title":"CVE-2023-44487 Impact of Rapid Reset and HTTP/2 DoS Vulnerabilities (CVE-2023-44487, CVE-2023-35945)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/","name":"FEDORA-2023-f66fc0f62a","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 37 Update: nodejs20-20.8.1-1.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9","name":"https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9","refsource":"MISC","tags":[],"title":"ports - FreeBSD ports tree","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/","name":"FEDORA-2023-b2c50535cb","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 37 Update: nghttp2-1.51.0-2.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/openresty/openresty/issues/930","name":"https://github.com/openresty/openresty/issues/930","refsource":"MISC","tags":[],"title":"CVE-2023-44487 issue/fix? · Issue #930 · openresty/openresty · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html","name":"https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html","refsource":"MISC","tags":[],"title":"Prague side meeting: HTTP/2 concurrency and request cancellation  (CVE-2023-44487) from Mark Nottingham on 2023-10-10 (ietf-http-wg@w3.org from October to December 2023)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/","name":"FEDORA-2023-1caffb88af","refsource":"","tags":[],"title":"[SECURITY] Fedora 39 Update: trafficserver-9.2.3-1.fc39 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/","name":"https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/","refsource":"MISC","tags":[],"title":"Google Cloud mitigated largest DDoS attack, peaking above 398 million rps | Google Cloud Blog","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/","name":"FEDORA-2023-7b52921cae","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 39 Update: nodejs20-20.8.1-1.fc39 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/","name":"FEDORA-2023-7934802344","refsource":"","tags":[],"title":"[SECURITY] Fedora 39 Update: mvfst-2023.10.16.00-1.fc39 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2023/10/18/4","name":"[oss-security] 20231018 Vulnerability in Jenkins","refsource":"MLIST","tags":[],"title":"oss-security - Vulnerability in Jenkins","mime":"text/html","httpstatus":"200","archivestatus":"429"},{"url":"https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764","name":"https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764","refsource":"MISC","tags":[],"title":"Swift-nio-http2 security update: CVE-2023-44487 HTTP/2 DOS - SwiftNIO - Swift Forums","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html","name":"[debian-lts-announce] 20231016 [SECURITY] [DLA 3621-1] nghttp2 security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 3621-1] nghttp2 security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/microsoft/CBL-Mariner/pull/6381","name":"https://github.com/microsoft/CBL-Mariner/pull/6381","refsource":"MISC","tags":[],"title":"Fix for nginx and golang for CVE-2023-44487 by ddstreetmicrosoft · Pull Request #6381 · microsoft/CBL-Mariner · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2023/10/13/9","name":"[oss-security] 20231013 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations","refsource":"MLIST","tags":[],"title":"oss-security - Re: CVE-2023-44487: HTTP/2 Rapid Reset attack\n against many implementations","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487","name":"https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487","refsource":"MISC","tags":[],"title":"HAProxy is not affected by the HTTP/2 Rapid Reset Attack (CVE-2023-44487)","mime":"text/html","httpstatus":"200","archivestatus":"403"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/","name":"FEDORA-2023-b2c50535cb","refsource":"","tags":[],"title":"[SECURITY] Fedora 37 Update: nghttp2-1.51.0-2.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.debian.org/security/2023/dsa-5549","name":"DSA-5549","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-5549-1 trafficserver","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html","name":"https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html","refsource":"MISC","tags":[],"title":"Using HTTP/3 Stream Limits in HTTP/2","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2023/10/18/8","name":"[oss-security] 20231018 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations","refsource":"MLIST","tags":[],"title":"oss-security - Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against\n many implementations","mime":"text/html","httpstatus":"200","archivestatus":"429"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/","name":"FEDORA-2023-fe53e13b5b","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 38 Update: golang-1.20.10-2.fc38 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487","name":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487","refsource":"MISC","tags":[],"title":"Security Update Guide - Microsoft Security Response Center","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/","name":"FEDORA-2023-7934802344","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 39 Update: mvfst-2023.10.16.00-1.fc39 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/","name":"FEDORA-2023-3f70b8d406","refsource":"","tags":[],"title":"[SECURITY] Fedora 39 Update: nghttp2-1.55.1-4.fc39 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/caddyserver/caddy/releases/tag/v2.7.5","name":"https://github.com/caddyserver/caddy/releases/tag/v2.7.5","refsource":"MISC","tags":[],"title":"Release v2.7.5 · caddyserver/caddy · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/Azure/AKS/issues/3947","name":"https://github.com/Azure/AKS/issues/3947","refsource":"MISC","tags":[],"title":"CVE-2023-44487: Distributed Denial of Service (DDoS) Attacks against HTTP/2 · Issue #3947 · Azure/AKS · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/micrictor/http2-rst-stream","name":"https://github.com/micrictor/http2-rst-stream","refsource":"MISC","tags":[],"title":"GitHub - micrictor/http2-rst-stream","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://bugzilla.suse.com/show_bug.cgi?id=1216123","name":"https://bugzilla.suse.com/show_bug.cgi?id=1216123","refsource":"MISC","tags":[],"title":"1216123 – (CVE-2023-44487) VUL-0: CVE-2023-44487: TRACKER-BUG: HTTP/2 Rapid Reset Attack","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/","name":"FEDORA-2023-822aab0a5a","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 39 Update: golang-1.21.3-1.fc39 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://news.ycombinator.com/item?id=37830987","name":"https://news.ycombinator.com/item?id=37830987","refsource":"MISC","tags":[],"title":"The novel HTTP/2 'Rapid Reset' DDoS attack | Hacker News","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html","name":"[debian-lts-announce] 20231105 [SECURITY] [DLA 3645-1] trafficserver security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 3645-1] trafficserver security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack","name":"https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack","refsource":"MISC","tags":[],"title":"HTTP/2 \"Rapid Reset\" DDoS Attack Disclosed By Google, Cloudflare & AWS - Phoronix","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/","name":"https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/","refsource":"MISC","tags":[],"title":"HTTP/2 Zero-Day Vulnerability Results in Record-Breaking DDoS Attacks","mime":"text/html","httpstatus":"403","archivestatus":"200"},{"url":"https://github.com/nodejs/node/pull/50121","name":"https://github.com/nodejs/node/pull/50121","refsource":"MISC","tags":[],"title":"deps: update nghttp2 to 1.57.0 by jasnell · Pull Request #50121 · nodejs/node · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487","name":"https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487","refsource":"MISC","tags":[],"title":"","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/","name":"FEDORA-2023-492b7be466","refsource":"","tags":[],"title":"[SECURITY] Fedora 39 Update: mod_http2-2.0.25-1.fc39 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/junkurihara/rust-rpxy/issues/97","name":"https://github.com/junkurihara/rust-rpxy/issues/97","refsource":"MISC","tags":[],"title":"[Announcement] CVE-2023-44487 (HTTP/2 Rapid Reset Attack) does not affect `rpxy` · Issue #97 · junkurihara/rust-rpxy · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://bugzilla.proxmox.com/show_bug.cgi?id=4988","name":"https://bugzilla.proxmox.com/show_bug.cgi?id=4988","refsource":"MISC","tags":[],"title":"4988 – HTTP/2 Rapid Reset : CVE-2023-44487","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/","name":"FEDORA-2023-dbe64661af","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 39 Update: nodejs18-18.18.2-1.fc39 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/grpc/grpc-go/pull/6703","name":"https://github.com/grpc/grpc-go/pull/6703","refsource":"MISC","tags":[],"title":"server: prohibit more than MaxConcurrentStreams handlers from running at once by dfawley · Pull Request #6703 · grpc/grpc-go · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://news.ycombinator.com/item?id=37830998","name":"https://news.ycombinator.com/item?id=37830998","refsource":"MISC","tags":[],"title":"HTTP/2 Zero-Day Vulnerability Results in Record-Breaking DDoS Attacks | Hacker News","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/","name":"FEDORA-2023-54fadada12","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 37 Update: trafficserver-9.2.3-1.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html","name":"[debian-lts-announce] 20231013 [SECURITY] [DLA 3617-1] tomcat9 security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 3617-1] tomcat9 security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/advisories/GHSA-vx74-f528-fxqg","name":"https://github.com/advisories/GHSA-vx74-f528-fxqg","refsource":"MISC","tags":[],"title":"github.com/nghttp2/nghttp2 has HTTP/2 Rapid Reset · GHSA-vx74-f528-fxqg · GitHub Advisory Database · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/","name":"FEDORA-2023-1caffb88af","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 39 Update: trafficserver-9.2.3-1.fc39 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/opensearch-project/data-prepper/issues/3474","name":"https://github.com/opensearch-project/data-prepper/issues/3474","refsource":"MISC","tags":[],"title":"CVE-2023-44487 (High) detected in multiple libraries · Issue #3474 · opensearch-project/data-prepper · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.debian.org/security/2023/dsa-5540","name":"DSA-5540","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-5540-1 jetty9","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected","name":"https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected","refsource":"MISC","tags":[],"title":"hyper HTTP/2 Rapid Reset Attack: Unaffected - seanmonstar","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.openwall.com/lists/oss-security/2023/10/13/4","name":"[oss-security] 20231013 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations","refsource":"MLIST","tags":["Mailing List","Third Party Advisory"],"title":"oss-security - Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against\n many implementations","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2023/10/19/6","name":"[oss-security] 20231019 CVE-2023-45802: Apache HTTP Server: HTTP/2 stream memory not reclaimed right away on RST","refsource":"MLIST","tags":[],"title":"oss-security - CVE-2023-45802: Apache HTTP Server: HTTP/2 stream memory not\n reclaimed right away on RST","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61","name":"https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61","refsource":"MISC","tags":[],"title":"Merge pull request from GHSA-xpw8-rcwv-8f8p · netty/netty@58f75f6 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/","name":"https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/","refsource":"MISC","tags":[],"title":"Netlify Successfully Mitigates CVE-2023-44487","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event","name":"https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event","refsource":"MISC","tags":[],"title":"Internet-Wide Zero-Day Bug Fuels Largest-Ever DDoS Event","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/","name":"https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/","refsource":"MISC","tags":[],"title":"Rapid Reset HTTP/2 Vulnerablilty ⋆ LiteSpeed Blog","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/kazu-yamamoto/http2/issues/93","name":"https://github.com/kazu-yamamoto/http2/issues/93","refsource":"MISC","tags":[],"title":"Does this recent http2 CVE affect this package? · Issue #93 · kazu-yamamoto/http2 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q","name":"https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q","refsource":"MISC","tags":[],"title":"","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://istio.io/latest/news/security/istio-security-2023-004/","name":"https://istio.io/latest/news/security/istio-security-2023-004/","refsource":"MISC","tags":[],"title":"Istio / ISTIO-SECURITY-2023-004","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/","name":"FEDORA-2023-4d2fd884ea","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 38 Update: nodejs20-20.8.1-1.fc38 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1","name":"https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1","refsource":"MISC","tags":[],"title":"ver bump up · kazu-yamamoto/http2@f61d41a · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/","name":"https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/","refsource":"MISC","tags":[],"title":"HTTP/2 'Rapid Reset' zero-day exploited in biggest DDoS yet • The Register","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/","name":"FEDORA-2023-fe53e13b5b","refsource":"","tags":[],"title":"[SECURITY] Fedora 38 Update: golang-1.20.10-2.fc38 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://news.ycombinator.com/item?id=37837043","name":"https://news.ycombinator.com/item?id=37837043","refsource":"MISC","tags":[],"title":"HAProxy is not affected by the HTTP/2 Rapid Reset Attack | Hacker News","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/akka/akka-http/issues/4323","name":"https://github.com/akka/akka-http/issues/4323","refsource":"MISC","tags":[],"title":"CVE-2023-44487   · Issue #4323 · akka/akka-http · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/","name":"https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/","refsource":"MISC","tags":[],"title":"HTTP/2 Rapid Reset Vulnerability Highlights Need for Rapid Response - Open Source Security Foundation","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/apache/apisix/issues/10320","name":"https://github.com/apache/apisix/issues/10320","refsource":"MISC","tags":[],"title":"help request:  What's the action for CVE-2023-44487 ? · Issue #10320 · apache/apisix · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2","name":"https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2","refsource":"MISC","tags":[],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf","name":"https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf","refsource":"MISC","tags":[],"title":"HTTP/2 Rapid Reset · Advisory · h2o/h2o · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73","name":"https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73","refsource":"MISC","tags":[],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/","name":"FEDORA:FEDORA-2023-492b7be466","refsource":"MITRE","tags":[],"title":"[SECURITY] Fedora 39 Update: mod_http2-2.0.25-1.fc39 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/","name":"FEDORA:FEDORA-2023-c0c6a91330","refsource":"MITRE","tags":[],"title":"[SECURITY] Fedora 37 Update: mod_http2-2.0.25-1.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-44487","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-44487","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"akka","cpe5":"http_server","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"amazon","cpe5":"opensearch_data_prepper","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"apisix","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"solr","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"tomcat","cpe6":"11.0.0","cpe7":"milestone1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"tomcat","cpe6":"11.0.0","cpe7":"milestone10","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"tomcat","cpe6":"11.0.0","cpe7":"milestone11","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"tomcat","cpe6":"11.0.0","cpe7":"milestone2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"tomcat","cpe6":"11.0.0","cpe7":"milestone3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"tomcat","cpe6":"11.0.0","cpe7":"milestone4","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"tomcat","cpe6":"11.0.0","cpe7":"milestone5","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"tomcat","cpe6":"11.0.0","cpe7":"milestone6","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"tomcat","cpe6":"11.0.0","cpe7":"milestone7","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"tomcat","cpe6":"11.0.0","cpe7":"milestone8","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"tomcat","cpe6":"11.0.0","cpe7":"milestone9","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"10.1.13","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"tomcat","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"8.5.93","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"tomcat","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"9.0.80","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"tomcat","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"traffic_server","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apple","cpe5":"swiftnio_http\\/2","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"swift","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"caddyserver","cpe5":"caddy","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"connected_mobile_experiences","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"crosswork_data_gateway","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"crosswork_data_gateway","cpe6":"5.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"crosswork_zero_touch_provisioning","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"data_center_network_manager","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"enterprise_chat_and_email","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"expressway","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"firepower_threat_defense","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"fog_director","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios_xe","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios_xr","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"iot_field_network_director","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3016","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3016q","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3048","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3064","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3064-32t","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3064-t","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3064-x","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3064t","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3064x","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3100","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3100-v","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3100-z","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3100v","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_31108pc-v","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_31108pv-v","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_31108tc-v","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_31128pq","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3132c-z","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3132q","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3132q-v","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3132q-x","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3132q-xl","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3132q-x\\/3132q-xl","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3164q","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3172","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3172pq","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3172pq-xl","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3172pq\\/pq-xl","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3172tq","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3172tq-32t","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3172tq-xl","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3200","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3232","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3232c","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3232c_","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3264c-e","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3264q","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3400","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3408-s","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_34180yc","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_34200yc-sm","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3432d-s","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3464c","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3500","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3524","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3524-x","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3524-xl","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3524-x\\/xl","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3548","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3548-x","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3548-xl","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3548-x\\/xl","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3600","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_36180yc-r","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_3636c-r","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9000v","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9200","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9200yc","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_92160yc-x","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_92160yc_switch","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9221c","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_92300yc","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_92300yc_switch","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_92304qc","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_92304qc_switch","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9232e","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_92348gc-x","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9236c","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9236c_switch","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9272q","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9272q_switch","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9300","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_93108tc-ex","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_93108tc-ex-24","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_93108tc-ex_switch","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_93108tc-fx","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_93108tc-fx-24","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_93108tc-fx3h","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_93108tc-fx3p","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_93120tx","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_93120tx_switch","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_93128","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_93128tx","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_93128tx_switch","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9316d-gx","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_93180lc-ex","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_93180lc-ex_switch","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_93180tc-ex","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_93180yc-ex","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_93180yc-ex-24","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_93180yc-ex_switch","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_93180yc-fx","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_93180yc-fx-24","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_93180yc-fx3","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_93180yc-fx3h","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_93180yc-fx3s","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_93216tc-fx2","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_93240tc-fx2","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_93240yc-fx2","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9332c","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9332d-gx2b","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9332d-h2r","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9332pq","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9332pq_switch","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_93360yc-fx2","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9336c-fx2","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9336c-fx2-e","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9336pq","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9336pq_aci","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9336pq_aci_spine","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9336pq_aci_spine_switch","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9348d-gx2a","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9348gc-fx3","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9348gc-fxp","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_93600cd-gx","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9364c","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9364c-gx","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9364d-gx2a","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9372px","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9372px-e","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9372px-e_switch","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9372px_switch","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9372tx","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9372tx-e","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9372tx-e_switch","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9372tx_switch","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9396px","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9396px_switch","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9396tx","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9396tx_switch","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9408","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9432pq","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9500","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9500r","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9500_16-slot","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9500_4-slot","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9500_8-slot","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9500_supervisor_a","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9500_supervisor_a\\+","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9500_supervisor_b","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9500_supervisor_b\\+","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9504","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9504_switch","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9508","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9508_switch","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9516","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9516_switch","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9536pq","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9636pq","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9716d-gx","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9736pq","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9800","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9804","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"nexus_9808","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"nx-os","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"prime_access_registrar","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"prime_cable_provisioning","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"prime_infrastructure","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"prime_network_registrar","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"secure_dynamic_attributes_connector","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"secure_malware_analytics","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"secure_web_appliance","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"secure_web_appliance_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"telepresence_video_communication_server","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"ultra_cloud_core_-_policy_control_function","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"ultra_cloud_core_-_policy_control_function","cpe6":"2024.01.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"ultra_cloud_core_-_serving_gateway_function","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"ultra_cloud_core_-_session_management_function","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"unified_attendant_console_advanced","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"unified_contact_center_domain_manager","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"unified_contact_center_enterprise","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"unified_contact_center_enterprise_-_live_data_server","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"unified_contact_center_management_portal","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"11.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"12.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dena","cpe5":"h2o","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"eclipse","cpe5":"jetty","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"envoyproxy","cpe5":"envoy","cpe6":"1.24.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"envoyproxy","cpe5":"envoy","cpe6":"1.25.9","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"envoyproxy","cpe5":"envoy","cpe6":"1.26.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"envoyproxy","cpe5":"envoy","cpe6":"1.27.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_access_policy_manager","cpe6":"17.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"13.1.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_access_policy_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"14.1.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_access_policy_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"15.1.10","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_access_policy_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"16.1.4","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_access_policy_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_advanced_firewall_manager","cpe6":"17.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"13.1.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_advanced_firewall_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"14.1.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_advanced_firewall_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"15.1.10","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_advanced_firewall_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"16.1.4","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_advanced_firewall_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_advanced_web_application_firewall","cpe6":"17.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"13.1.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_advanced_web_application_firewall","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"14.1.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_advanced_web_application_firewall","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"15.1.10","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_advanced_web_application_firewall","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"16.1.4","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_advanced_web_application_firewall","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_analytics","cpe6":"17.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"13.1.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_analytics","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"14.1.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_analytics","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"15.1.10","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_analytics","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"16.1.4","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_analytics","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_application_acceleration_manager","cpe6":"17.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"13.1.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_application_acceleration_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"14.1.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_application_acceleration_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"15.1.10","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_application_acceleration_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"16.1.4","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_application_acceleration_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_application_security_manager","cpe6":"17.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"13.1.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_application_security_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"14.1.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_application_security_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"15.1.10","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_application_security_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"16.1.4","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_application_security_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_application_visibility_and_reporting","cpe6":"17.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"13.1.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_application_visibility_and_reporting","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"14.1.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_application_visibility_and_reporting","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"15.1.10","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_application_visibility_and_reporting","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"16.1.4","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_application_visibility_and_reporting","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_carrier-grade_nat","cpe6":"17.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"13.1.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_carrier-grade_nat","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"14.1.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_carrier-grade_nat","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"15.1.10","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_carrier-grade_nat","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"16.1.4","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_carrier-grade_nat","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_ddos_hybrid_defender","cpe6":"17.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"13.1.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_ddos_hybrid_defender","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"14.1.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_ddos_hybrid_defender","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"15.1.10","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_ddos_hybrid_defender","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"16.1.4","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_ddos_hybrid_defender","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_domain_name_system","cpe6":"17.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"13.1.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_domain_name_system","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"14.1.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_domain_name_system","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"15.1.10","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_domain_name_system","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"16.1.4","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_domain_name_system","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_fraud_protection_service","cpe6":"17.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"13.1.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_fraud_protection_service","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"14.1.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_fraud_protection_service","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"15.1.10","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_fraud_protection_service","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"16.1.4","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_fraud_protection_service","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_global_traffic_manager","cpe6":"17.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"13.1.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_global_traffic_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"14.1.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_global_traffic_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"15.1.10","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_global_traffic_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"16.1.4","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_global_traffic_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_link_controller","cpe6":"17.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"13.1.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_link_controller","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"14.1.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_link_controller","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"15.1.10","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_link_controller","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"16.1.4","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_link_controller","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_local_traffic_manager","cpe6":"17.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"13.1.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_local_traffic_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"14.1.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_local_traffic_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"15.1.10","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_local_traffic_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"16.1.4","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_local_traffic_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_next","cpe6":"20.0.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"1.8.2","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_next_service_proxy_for_kubernetes","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_policy_enforcement_manager","cpe6":"17.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"13.1.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_policy_enforcement_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"14.1.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_policy_enforcement_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"15.1.10","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_policy_enforcement_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"16.1.4","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_policy_enforcement_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_ssl_orchestrator","cpe6":"17.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"13.1.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_ssl_orchestrator","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"14.1.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_ssl_orchestrator","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"15.1.10","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_ssl_orchestrator","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"16.1.4","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_ssl_orchestrator","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_webaccelerator","cpe6":"17.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"13.1.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_webaccelerator","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"14.1.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_webaccelerator","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"15.1.10","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_webaccelerator","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"16.1.4","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_webaccelerator","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_websafe","cpe6":"17.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"13.1.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_websafe","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"14.1.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_websafe","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"15.1.10","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_websafe","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"16.1.4","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_websafe","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"1.25.2","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"nginx","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"2.4.2","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"nginx_ingress_controller","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"3.3.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"nginx_ingress_controller","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"nginx_plus","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"nginx_plus","cpe6":"r29","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"nginx_plus","cpe6":"r30","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"facebook","cpe5":"proxygen","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"37","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"38","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"golang","cpe5":"go","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"golang","cpe5":"http2","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"go","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"golang","cpe5":"networking","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"go","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"grpc","cpe5":"grpc","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"go","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"grpc","cpe5":"grpc","cpe6":"1.57.0","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"go","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"1.59.2","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"grpc","cpe5":"grpc","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"-","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ietf","cpe5":"http","cpe6":"2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"istio","cpe5":"istio","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"2.414.2","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jenkins","cpe5":"jenkins","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"lts","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"2.427","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jenkins","cpe5":"jenkins","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"-","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"kazu-yamamoto","cpe5":"http2","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"konghq","cpe5":"kong_gateway","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"enterprise","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linecorp","cpe5":"armeria","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linkerd","cpe5":"linkerd","cpe6":"2.13.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linkerd","cpe5":"linkerd","cpe6":"2.13.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"stable","cpe11":"kubernetes","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linkerd","cpe5":"linkerd","cpe6":"2.13.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linkerd","cpe5":"linkerd","cpe6":"2.13.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"stable","cpe11":"kubernetes","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linkerd","cpe5":"linkerd","cpe6":"2.14.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linkerd","cpe5":"linkerd","cpe6":"2.14.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"stable","cpe11":"kubernetes","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linkerd","cpe5":"linkerd","cpe6":"2.14.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linkerd","cpe5":"linkerd","cpe6":"2.14.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"stable","cpe11":"kubernetes","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"2.12.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linkerd","cpe5":"linkerd","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"2.12.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linkerd","cpe5":"linkerd","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"stable","cpe11":"kubernetes","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":".net","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"asp.net_core","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"azure_kubernetes_service","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"cbl-mariner","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"visual_studio_2022","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"microsoft","cpe5":"windows_10_1607","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"x64","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"microsoft","cpe5":"windows_10_1607","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"x86","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"microsoft","cpe5":"windows_10_1809","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"microsoft","cpe5":"windows_10_21h2","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"microsoft","cpe5":"windows_10_22h2","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"microsoft","cpe5":"windows_11_21h2","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"microsoft","cpe5":"windows_11_22h2","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"microsoft","cpe5":"windows_server_2016","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"microsoft","cpe5":"windows_server_2019","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"microsoft","cpe5":"windows_server_2022","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netapp","cpe5":"astra_control_center","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netty","cpe5":"netty","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"nghttp2","cpe5":"nghttp2","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"nodejs","cpe5":"node.js","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"nodejs","cpe5":"node.js","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"lts","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openresty","cpe5":"openresty","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"projectcontour","cpe5":"contour","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"kubernetes","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"3scale_api_management_platform","cpe6":"2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"advanced_cluster_management_for_kubernetes","cpe6":"2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"advanced_cluster_security","cpe6":"3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"advanced_cluster_security","cpe6":"4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"ansible_automation_platform","cpe6":"2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"build_of_optaplanner","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"build_of_quarkus","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"ceph_storage","cpe6":"5.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"cert-manager_operator_for_red_hat_openshift","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"certification_for_red_hat_enterprise_linux","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"certification_for_red_hat_enterprise_linux","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"cost_management","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"cryostat","cpe6":"2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"decision_manager","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"fence_agents_remediation_operator","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"integration_camel_for_spring_boot","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"integration_camel_k","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"integration_service_registry","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"jboss_a-mq","cpe6":"7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"jboss_a-mq_streams","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"jboss_core_services","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"jboss_data_grid","cpe6":"7.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"jboss_enterprise_application_platform","cpe6":"6.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"jboss_enterprise_application_platform","cpe6":"7.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"jboss_fuse","cpe6":"6.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"jboss_fuse","cpe6":"7.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"logging_subsystem_for_red_hat_openshift","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"machine_deletion_remediation_operator","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"migration_toolkit_for_applications","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"migration_toolkit_for_containers","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"migration_toolkit_for_virtualization","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"network_observability_operator","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"node_healthcheck_operator","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"node_maintenance_operator","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openshift","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"aws","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openshift_api_for_data_protection","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openshift_container_platform","cpe6":"4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openshift_container_platform_assisted_installer","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openshift_data_science","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openshift_developer_tools_and_services","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openshift_dev_spaces","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openshift_distributed_tracing","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openshift_gitops","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openshift_pipelines","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openshift_sandboxed_containers","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openshift_secondary_scheduler_operator","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openshift_serverless","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openshift_service_mesh","cpe6":"2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openshift_virtualization","cpe6":"4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openstack_platform","cpe6":"16.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openstack_platform","cpe6":"16.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openstack_platform","cpe6":"17.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"process_automation","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"quay","cpe6":"3.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"run_once_duration_override_operator","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"satellite","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"self_node_remediation_operator","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"service_interconnect","cpe6":"1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"service_telemetry_framework","cpe6":"1.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"single_sign-on","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"support_for_spring_boot","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"web_terminal","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"traefik","cpe5":"traefik","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"traefik","cpe5":"traefik","cpe6":"3.0.0","cpe7":"beta1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"traefik","cpe5":"traefik","cpe6":"3.0.0","cpe7":"beta2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"traefik","cpe5":"traefik","cpe6":"3.0.0","cpe7":"beta3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44487","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"varnish_cache_project","cpe5":"varnish_cache","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":{"cve_year":"2023","cve_id":"44487","cve":"CVE-2023-44487","vendorProject":"IETF","product":"HTTP/2","vulnerabilityName":"HTTP/2 Rapid Reset Attack Vulnerability","dateAdded":"2023-10-10","shortDescription":"HTTP/2 contains a rapid reset vulnerability that allows for a distributed denial-of-service attack (DDoS).","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2023-10-31","knownRansomwareCampaignUse":"Unknown","notes":"This vulnerability affects a common open-source component, third-party library, or protocol used by different products. For more information, please see: HTTP/2 Rapid Reset Vulnerability, CVE-2023-44487 | CISA: https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487; https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/;  https://nvd.nist.gov/vuln/detail/CVE-2023-44487","cwes":"CWE-400","catalogVersion":"2026.04.21","updated_at":"2026-04-21 13:32:18"},"epss":{"cve_year":"2023","cve_id":"44487","cve":"CVE-2023-44487","epss":"0.943950000","percentile":"0.999750000","score_date":"2026-04-20","updated_at":"2026-04-21 00:07:49"},"legacy_qids":[{"cve":"CVE-2023-44487","qid":"150732","title":"Apache Tomcat Multiple Vulnerabilities (CVE-2023-42795, CVE-2023-44487, CVE-2023-45648)"},{"cve":"CVE-2023-44487","qid":"160986","title":"Oracle Enterprise Linux Security Update for nginx:1.22 (ELSA-2023-5713)"},{"cve":"CVE-2023-44487","qid":"160988","title":"Oracle Enterprise Linux Security Update for nginx:1.20 (ELSA-2023-5712)"},{"cve":"CVE-2023-44487","qid":"160990","title":"Oracle Enterprise Linux Security Update for nginx (ELSA-2023-5711)"},{"cve":"CVE-2023-44487","qid":"160992","title":"Oracle Enterprise Linux Security Update for dotnet6.0 (ELSA-2023-5708)"},{"cve":"CVE-2023-44487","qid":"160993","title":"Oracle Enterprise Linux Security Update for dotnet6.0 (ELSA-2023-5710)"},{"cve":"CVE-2023-44487","qid":"160995","title":"Oracle Enterprise Linux Security Update for .net 7.0 (ELSA-2023-5749)"},{"cve":"CVE-2023-44487","qid":"160996","title":"Oracle Enterprise Linux Security Update for go-toolset:ol8 (ELSA-2023-5721)"},{"cve":"CVE-2023-44487","qid":"160998","title":"Oracle Enterprise Linux Security Update for go-toolset and golang (ELSA-2023-5738)"},{"cve":"CVE-2023-44487","qid":"161002","title":"Oracle Enterprise Linux Security Update for dotnet7.0 (ELSA-2023-5709)"},{"cve":"CVE-2023-44487","qid":"161003","title":"Oracle Enterprise Linux Security Update for nghttp2 (ELSA-2023-5837)"},{"cve":"CVE-2023-44487","qid":"161004","title":"Oracle Enterprise Linux Security Update for nghttp2 (ELSA-2023-5838)"},{"cve":"CVE-2023-44487","qid":"161006","title":"Oracle Enterprise Linux Security Update for nodejs (ELSA-2023-5765)"},{"cve":"CVE-2023-44487","qid":"161007","title":"Oracle Enterprise Linux Security Update for 18 (ELSA-2023-5849)"},{"cve":"CVE-2023-44487","qid":"161009","title":"Oracle Enterprise Linux Security Update for grafana (ELSA-2023-5867)"},{"cve":"CVE-2023-44487","qid":"161010","title":"Oracle Enterprise Linux Security Update for nodejs:18 (ELSA-2023-5869)"},{"cve":"CVE-2023-44487","qid":"161011","title":"Oracle Enterprise Linux Security Update for grafana (ELSA-2023-5863)"},{"cve":"CVE-2023-44487","qid":"161012","title":"Oracle Enterprise Linux Security Update for nodejs:16 (ELSA-2023-5850)"},{"cve":"CVE-2023-44487","qid":"161013","title":"Oracle Enterprise Linux Security Update for tomcat (ELSA-2023-5929)"},{"cve":"CVE-2023-44487","qid":"161017","title":"Oracle Enterprise Linux Security Update for varnish (ELSA-2023-5989)"},{"cve":"CVE-2023-44487","qid":"161018","title":"Oracle Enterprise Linux Security Update for varnish (ELSA-2023-5924)"},{"cve":"CVE-2023-44487","qid":"161021","title":"Oracle Enterprise Linux Security Update for tomcat (ELSA-2023-5928)"},{"cve":"CVE-2023-44487","qid":"161025","title":"Oracle Enterprise Linux Security Update for nginx:1.22 (ELSA-2023-6120)"},{"cve":"CVE-2023-44487","qid":"161071","title":"Oracle Enterprise Linux Security Update for nghttp2 (ELSA-2023-6746)"},{"cve":"CVE-2023-44487","qid":"161192","title":"Oracle Enterprise Linux Security Update for nodejs:20 (ELSA-2023-7205)"},{"cve":"CVE-2023-44487","qid":"161216","title":"Oracle Enterprise Linux Security Update for conmon (ELSA-2023-13029)"},{"cve":"CVE-2023-44487","qid":"161217","title":"Oracle Enterprise Linux Security Update for conmon (ELSA-2023-13028)"},{"cve":"CVE-2023-44487","qid":"161254","title":"Oracle Enterprise Linux Security Update for conmon (ELSA-2023-13053)"},{"cve":"CVE-2023-44487","qid":"161255","title":"Oracle Enterprise Linux Security Update for conmon (ELSA-2023-13054)"},{"cve":"CVE-2023-44487","qid":"161431","title":"Oracle Enterprise Linux Security Update for nodejs:16 (ELSA-2024-1444)"},{"cve":"CVE-2023-44487","qid":"199823","title":"Ubuntu Security Notification for .NET Vulnerability (USN-6427-1)"},{"cve":"CVE-2023-44487","qid":"199905","title":"Ubuntu Security Notification for .NET Vulnerabilities (USN-6438-1)"},{"cve":"CVE-2023-44487","qid":"199910","title":"Ubuntu Security Notification for .NET Vulnerability (USN-6427-2)"},{"cve":"CVE-2023-44487","qid":"199941","title":"Ubuntu Security Notification for nghttp2 Vulnerability (USN-6505-1)"},{"cve":"CVE-2023-44487","qid":"200040","title":"Ubuntu Security Notification for Go Vulnerabilities (USN-6574-1)"},{"cve":"CVE-2023-44487","qid":"20399","title":"Oracle Database 19c Critical OJVM Patch Update - January 2024"},{"cve":"CVE-2023-44487","qid":"20400","title":"Oracle Database 19c Critical Patch Update - January 2024"},{"cve":"CVE-2023-44487","qid":"20401","title":"Oracle Database 21c Critical Patch Update - January 2024"},{"cve":"CVE-2023-44487","qid":"242166","title":"Red Hat Update for nginx (RHSA-2023:5714)"},{"cve":"CVE-2023-44487","qid":"242167","title":"Red Hat Update for rh-dotnet60-dotnet security (RHSA-2023:5705)"},{"cve":"CVE-2023-44487","qid":"242168","title":"Red Hat Update for dotnet6.0 (RHSA-2023:5706)"},{"cve":"CVE-2023-44487","qid":"242169","title":"Red Hat Update for nginx:1.20 (RHSA-2023:5715)"},{"cve":"CVE-2023-44487","qid":"242170","title":"Red Hat Update for dotnet6.0 (RHSA-2023:5710)"},{"cve":"CVE-2023-44487","qid":"242171","title":"Red Hat Update for dotnet6.0 (RHSA-2023:5708)"},{"cve":"CVE-2023-44487","qid":"242172","title":"Red Hat Update for dotnet6.0 (RHSA-2023:5707)"},{"cve":"CVE-2023-44487","qid":"242173","title":"Red Hat Update for go-toolset:rhel8 (RHSA-2023:5721)"},{"cve":"CVE-2023-44487","qid":"242174","title":"Red Hat Update for rh-nginx120-nginx (RHSA-2023:5720)"},{"cve":"CVE-2023-44487","qid":"242175","title":"Red Hat Update for .net 7.0 (RHSA-2023:5749)"},{"cve":"CVE-2023-44487","qid":"242176","title":"Red Hat Update for go-toolset and golang (RHSA-2023:5738)"},{"cve":"CVE-2023-44487","qid":"242177","title":"Red Hat Update for nghttp2 (RHSA-2023:5769)"},{"cve":"CVE-2023-44487","qid":"242178","title":"Red Hat Update for nghttp2 (RHSA-2023:5768)"},{"cve":"CVE-2023-44487","qid":"242181","title":"Red Hat Update for nodejs (RHSA-2023:5764)"},{"cve":"CVE-2023-44487","qid":"242182","title":"Red Hat Update for nodejs (RHSA-2023:5765)"},{"cve":"CVE-2023-44487","qid":"242184","title":"Red Hat Update for nghttp2 (RHSA-2023:5766)"},{"cve":"CVE-2023-44487","qid":"242189","title":"Red Hat Update for nodejs:16 (RHSA-2023:5803)"},{"cve":"CVE-2023-44487","qid":"242193","title":"Red Hat Update for rhc-worker-script enhancement and (RHSA-2023:5835)"},{"cve":"CVE-2023-44487","qid":"242194","title":"Red Hat Update for rh-nodejs14 (RHSA-2023:5840)"},{"cve":"CVE-2023-44487","qid":"242195","title":"Red Hat Update for nghttp2 (RHSA-2023:5838)"},{"cve":"CVE-2023-44487","qid":"242196","title":"Red Hat Update for httpd24-httpd (RHSA-2023:5841)"},{"cve":"CVE-2023-44487","qid":"242197","title":"Red Hat Update for nghttp2 (RHSA-2023:5837)"},{"cve":"CVE-2023-44487","qid":"242198","title":"Red Hat OpenShift Container Platform 4.12 Security Update (RHSA-2023:5679)"},{"cve":"CVE-2023-44487","qid":"242206","title":"Red Hat Update for nodejs:16 (RHSA-2023:5850)"},{"cve":"CVE-2023-44487","qid":"242208","title":"Red Hat OpenShift Container Platform 4.11 Security Update (RHSA-2023:5717)"},{"cve":"CVE-2023-44487","qid":"242212","title":"Red Hat Update for grafana (RHSA-2023:5866)"},{"cve":"CVE-2023-44487","qid":"242214","title":"Red Hat Update for grafana (RHSA-2023:5864)"},{"cve":"CVE-2023-44487","qid":"242219","title":"Red Hat Update for grafana (RHSA-2023:5863)"},{"cve":"CVE-2023-44487","qid":"242222","title":"Red Hat Update for JBoss Enterprise Application Platform 7.4 (RHSA-2023:5920)"},{"cve":"CVE-2023-44487","qid":"242224","title":"Red Hat Update for varnish (RHSA-2023:5924)"},{"cve":"CVE-2023-44487","qid":"242225","title":"Red Hat Update for varnish (RHSA-2023:5930)"},{"cve":"CVE-2023-44487","qid":"242226","title":"Red Hat Update for tomcat (RHSA-2023:5928)"},{"cve":"CVE-2023-44487","qid":"242228","title":"Red Hat Update for OpenStack Platform 17.1.1 (RHSA-2023:5969)"},{"cve":"CVE-2023-44487","qid":"242229","title":"Red Hat Update for Satellite 6.11.5.6 (RHSA-2023:5980)"},{"cve":"CVE-2023-44487","qid":"242230","title":"Red Hat Update for Satellite 6.12.5.2 (RHSA-2023:5979)"},{"cve":"CVE-2023-44487","qid":"242231","title":"Red Hat Update for varnish (RHSA-2023:5989)"},{"cve":"CVE-2023-44487","qid":"242234","title":"Red Hat Update for varnish:6 (RHSA-2023:6020)"},{"cve":"CVE-2023-44487","qid":"242237","title":"Red Hat Update for varnish:6 (RHSA-2023:6023)"},{"cve":"CVE-2023-44487","qid":"242238","title":"Red Hat Update for varnish:6 (RHSA-2023:6022)"},{"cve":"CVE-2023-44487","qid":"242239","title":"Red Hat Update for varnish:6 (RHSA-2023:6021)"},{"cve":"CVE-2023-44487","qid":"242241","title":"Red Hat Update for toolbox (RHSA-2023:6057)"},{"cve":"CVE-2023-44487","qid":"242244","title":"Red Hat Update for toolbox (RHSA-2023:6077)"},{"cve":"CVE-2023-44487","qid":"242245","title":"Red Hat Update for nginx:1.22 (RHSA-2023:6120)"},{"cve":"CVE-2023-44487","qid":"242246","title":"Red Hat Update for JBoss Core Services (RHSA-2023:6105)"},{"cve":"CVE-2023-44487","qid":"242307","title":"Red Hat Update for nghttp2 (RHSA-2023:6746)"},{"cve":"CVE-2023-44487","qid":"242347","title":"Red Hat Update for Satellite 6.14 (RHSA-2023:6818)"},{"cve":"CVE-2023-44487","qid":"242351","title":"Red Hat Update for nginx:1.20 (RHSA-2023:5712)"},{"cve":"CVE-2023-44487","qid":"242357","title":"Red Hat Update for OpenStack Platform 17.1.1 (RHSA-2023:5970)"},{"cve":"CVE-2023-44487","qid":"242362","title":"Red Hat Update for grafana (RHSA-2023:5867)"},{"cve":"CVE-2023-44487","qid":"242363","title":"Red Hat Update for Satellite 6.13.5 (RHSA-2023:5931)"},{"cve":"CVE-2023-44487","qid":"242365","title":"Red Hat Update for OpenStack Platform 16.2.5 (RHSA-2023:5964)"},{"cve":"CVE-2023-44487","qid":"242367","title":"Red Hat Update for nghttp2 (RHSA-2023:5770)"},{"cve":"CVE-2023-44487","qid":"242370","title":"Red Hat Update for dotnet7.0 (RHSA-2023:5709)"},{"cve":"CVE-2023-44487","qid":"242373","title":"Red Hat Update for nginx (RHSA-2023:5711)"},{"cve":"CVE-2023-44487","qid":"242374","title":"Red Hat OpenShift Container Platform 4.14 Security Update (RHSA-2023:5009)"},{"cve":"CVE-2023-44487","qid":"242376","title":"Red Hat Update for nodejs:18 (RHSA-2023:5849)"},{"cve":"CVE-2023-44487","qid":"242378","title":"Red Hat Update for OpenStack Platform 16.1.9 (RHSA-2023:5967)"},{"cve":"CVE-2023-44487","qid":"242381","title":"Red Hat Update for OpenStack Platform 16.2.5 (RHSA-2023:5965)"},{"cve":"CVE-2023-44487","qid":"242385","title":"Red Hat Update for nodejs:18 (RHSA-2023:5869)"},{"cve":"CVE-2023-44487","qid":"242387","title":"Red Hat Update for nginx:1.22 (RHSA-2023:5713)"},{"cve":"CVE-2023-44487","qid":"242391","title":"Red Hat Update for tomcat (RHSA-2023:5929)"},{"cve":"CVE-2023-44487","qid":"242394","title":"Red Hat Update for nghttp2 (RHSA-2023:5767)"},{"cve":"CVE-2023-44487","qid":"242401","title":"Red Hat Update for grafana (RHSA-2023:5865)"},{"cve":"CVE-2023-44487","qid":"242429","title":"Red Hat Update for nodejs:20 (RHSA-2023:7205)"},{"cve":"CVE-2023-44487","qid":"242464","title":"Red Hat OpenShift Container Platform 4.14 Security Update (RHSA-2023:6840)"},{"cve":"CVE-2023-44487","qid":"242465","title":"Red Hat OpenShift Container Platform 4.14 Security Update (RHSA-2023:6839)"},{"cve":"CVE-2023-44487","qid":"242479","title":"Red Hat Update for rh-varnish6-varnish (RHSA-2023:7334)"},{"cve":"CVE-2023-44487","qid":"242493","title":"Red Hat OpenShift Container Platform 4.13 Security Update (RHSA-2023:7325)"},{"cve":"CVE-2023-44487","qid":"242533","title":"Red Hat OpenShift Container Platform 4.11 Security Update (RHSA-2023:7481)"},{"cve":"CVE-2023-44487","qid":"242542","title":"Red Hat Update for JBoss Enterprise Application Platform 7.4.1 on RHEL 9 (RHSA-2023:7639)"},{"cve":"CVE-2023-44487","qid":"242543","title":"Red Hat Update for JBoss Enterprise Application Platform 7.4.1 on RHEL 8 (RHSA-2023:7638)"},{"cve":"CVE-2023-44487","qid":"242551","title":"Red Hat OpenShift Container Platform 4.12 Security Update (RHSA-2023:7610)"},{"cve":"CVE-2023-44487","qid":"242565","title":"Red Hat Update for JBoss Enterprise Application Platform 7.4.1 on RHEL 7 (RHSA-2023:7637)"},{"cve":"CVE-2023-44487","qid":"243104","title":"Red Hat Update for nodejs:16 (RHSA-2024:1444)"},{"cve":"CVE-2023-44487","qid":"284629","title":"Fedora Security Update for nghttp2 (FEDORA-2023-ed2642fd58)"},{"cve":"CVE-2023-44487","qid":"284641","title":"Fedora Security Update for trafficserver (FEDORA-2023-5ff7bf1dd8)"},{"cve":"CVE-2023-44487","qid":"284643","title":"Fedora Security Update for trafficserver (FEDORA-2023-54fadada12)"},{"cve":"CVE-2023-44487","qid":"284656","title":"Fedora Security Update for mod_http2 (FEDORA-2023-0259c3f26f)"},{"cve":"CVE-2023-44487","qid":"284658","title":"Fedora Security Update for cachelib (FEDORA-2023-2a9214af5f)"},{"cve":"CVE-2023-44487","qid":"284659","title":"Fedora Security Update for cachelib (FEDORA-2023-17efd3f2cd)"},{"cve":"CVE-2023-44487","qid":"284660","title":"Fedora Security Update for nodejs18 (FEDORA-2023-d5030c983c)"},{"cve":"CVE-2023-44487","qid":"284672","title":"Fedora Security Update for nodejs20 (FEDORA-2023-f66fc0f62a)"},{"cve":"CVE-2023-44487","qid":"284673","title":"Fedora Security Update for nodejs20 (FEDORA-2023-4d2fd884ea)"},{"cve":"CVE-2023-44487","qid":"284674","title":"Fedora Security Update for nodejs18 (FEDORA-2023-e9c04d81c1)"},{"cve":"CVE-2023-44487","qid":"284683","title":"Fedora Security Update for nghttp2 (FEDORA-2023-b2c50535cb)"},{"cve":"CVE-2023-44487","qid":"284688","title":"Fedora Security Update for golang (FEDORA-2023-fe53e13b5b)"},{"cve":"CVE-2023-44487","qid":"284689","title":"Fedora Security Update for golang (FEDORA-2023-4bf641255e)"},{"cve":"CVE-2023-44487","qid":"284710","title":"Fedora Security Update for mod_http2 (FEDORA-2023-c0c6a91330)"},{"cve":"CVE-2023-44487","qid":"285180","title":"Fedora Security Update for mod_http2 (FEDORA-2023-492b7be466)"},{"cve":"CVE-2023-44487","qid":"285182","title":"Fedora Security Update for golang (FEDORA-2023-822aab0a5a)"},{"cve":"CVE-2023-44487","qid":"285184","title":"Fedora Security Update for cachelib (FEDORA-2023-7934802344)"},{"cve":"CVE-2023-44487","qid":"285187","title":"Fedora Security Update for nodejs20 (FEDORA-2023-7b52921cae)"},{"cve":"CVE-2023-44487","qid":"285188","title":"Fedora Security Update for nodejs18 (FEDORA-2023-dbe64661af)"},{"cve":"CVE-2023-44487","qid":"285199","title":"Fedora Security Update for nghttp2 (FEDORA-2023-3f70b8d406)"},{"cve":"CVE-2023-44487","qid":"285203","title":"Fedora Security Update for trafficserver (FEDORA-2023-1caffb88af)"},{"cve":"CVE-2023-44487","qid":"296105","title":"Oracle Solaris 11.4 Support Repository Update (SRU) 63.157.1 Missing (CPUOCT2023)"},{"cve":"CVE-2023-44487","qid":"296106","title":"Oracle Solaris 11.4 Support Repository Update (SRU) 64.157.2 Missing (CPUOCT2023)"},{"cve":"CVE-2023-44487","qid":"296108","title":"Oracle Solaris 11.4 Support Repository Update (SRU) 66.164.1 Missing (CPUJAN2024)"},{"cve":"CVE-2023-44487","qid":"317402","title":"Cisco Secure Web Appliance HTTP/2 Rapid Reset Attack Vulnerability (CSCwh88595)"},{"cve":"CVE-2023-44487","qid":"356400","title":"Amazon Linux Security Advisory for nghttp2 : ALAS2-2023-2312"},{"cve":"CVE-2023-44487","qid":"356411","title":"Amazon Linux Security Advisory for golang : ALAS2-2023-2313"},{"cve":"CVE-2023-44487","qid":"356446","title":"Amazon Linux Security Advisory for nginx : ALAS-2023-1870"},{"cve":"CVE-2023-44487","qid":"356453","title":"Amazon Linux Security Advisory for nghttp2 : ALAS-2023-1869"},{"cve":"CVE-2023-44487","qid":"356455","title":"Amazon Linux Security Advisory for golang : ALAS-2023-1871"},{"cve":"CVE-2023-44487","qid":"356456","title":"Amazon Linux Security Advisory for tomcat8 : ALAS-2023-1868"},{"cve":"CVE-2023-44487","qid":"356513","title":"Amazon Linux Security Advisory for golang : ALAS2023-2023-394"},{"cve":"CVE-2023-44487","qid":"356520","title":"Amazon Linux Security Advisory for tomcat9 : ALAS2023-2023-390"},{"cve":"CVE-2023-44487","qid":"356523","title":"Amazon Linux Security Advisory for nginx : ALAS2023-2023-393"},{"cve":"CVE-2023-44487","qid":"356526","title":"Amazon Linux Security Advisory for nodejs : ALAS2023-2023-391"},{"cve":"CVE-2023-44487","qid":"356540","title":"Amazon Linux Security Advisory for nghttp2 : ALAS2023-2023-392"},{"cve":"CVE-2023-44487","qid":"356541","title":"Amazon Linux Security Advisory for dotnet6.0 : ALAS2023-2023-389"},{"cve":"CVE-2023-44487","qid":"356556","title":"Amazon Linux Security Advisory for tomcat : ALAS2TOMCAT8.5-2023-016"},{"cve":"CVE-2023-44487","qid":"356581","title":"Amazon Linux Security Advisory for tomcat : ALAS2TOMCAT9-2023-010"},{"cve":"CVE-2023-44487","qid":"356587","title":"Amazon Linux Security Advisory for nginx : ALAS2NGINX1-2023-006"},{"cve":"CVE-2023-44487","qid":"356597","title":"Amazon Linux Security Advisory for ecs-service-connect-agent : ALAS2ECS-2023-016"},{"cve":"CVE-2023-44487","qid":"356624","title":"Amazon Linux Security Advisory for ecs-service-connect-agent : ALAS2023-2023-420"},{"cve":"CVE-2023-44487","qid":"378951","title":"Node.js Multiple Security Vulnerabilties (October 13, 2023 Security Release)"},{"cve":"CVE-2023-44487","qid":"378964","title":"Alibaba Cloud Linux Security Update for grafana (ALINUX3-SA-2023:0131)"},{"cve":"CVE-2023-44487","qid":"379045","title":"Alibaba Cloud Linux Security Update for varnish (ALINUX3-SA-2023:0137)"},{"cve":"CVE-2023-44487","qid":"379047","title":"Alibaba Cloud Linux Security Update for nghttp2 (ALINUX3-SA-2023:0132)"},{"cve":"CVE-2023-44487","qid":"379267","title":"Oracle Coherence January 2024 Critical Patch Update (CPUJAN2024)"},{"cve":"CVE-2023-44487","qid":"379437","title":"Alibaba Cloud Linux Security Update for nginx:1.20 (ALINUX3-SA-2024:0016)"},{"cve":"CVE-2023-44487","qid":"379452","title":"IBM Cognos Analytics Multiple Vulnerabilities (7123154)"},{"cve":"CVE-2023-44487","qid":"379516","title":"IBM Sterling Secure Proxy Multiple Vulnerabilities (7142038)"},{"cve":"CVE-2023-44487","qid":"379590","title":"Gitlab Multiple Vulnerabilities (prior to gitlab- 16.5.1, 16.4.2, 16.3.6)"},{"cve":"CVE-2023-44487","qid":"379646","title":"Alibaba Cloud Linux Security Update for go-toolset:rhel8 (ALINUX3-SA-2024:0033)"},{"cve":"CVE-2023-44487","qid":"44173","title":"FortiOS Rapid Reset HTTP/2 Vulnerability (FG-IR-23-397)"},{"cve":"CVE-2023-44487","qid":"503377","title":"Alpine Linux Security Update for nghttp2"},{"cve":"CVE-2023-44487","qid":"503378","title":"Alpine Linux Security Update for nghttp2"},{"cve":"CVE-2023-44487","qid":"503380","title":"Alpine Linux Security Update for dotnet6-build"},{"cve":"CVE-2023-44487","qid":"503381","title":"Alpine Linux Security Update for dotnet6-runtime"},{"cve":"CVE-2023-44487","qid":"503382","title":"Alpine Linux Security Update for dotnet7-build"},{"cve":"CVE-2023-44487","qid":"503383","title":"Alpine Linux Security Update for dotnet7-runtime"},{"cve":"CVE-2023-44487","qid":"503385","title":"Alpine Linux Security Update for h2o"},{"cve":"CVE-2023-44487","qid":"503386","title":"Alpine Linux Security Update for go"},{"cve":"CVE-2023-44487","qid":"503387","title":"Alpine Linux Security Update for nghttp2"},{"cve":"CVE-2023-44487","qid":"503390","title":"Alpine Linux Security Update for jetty-runner"},{"cve":"CVE-2023-44487","qid":"503391","title":"Alpine Linux Security Update for nginx"},{"cve":"CVE-2023-44487","qid":"503393","title":"Alpine Linux Security Update for nginx"},{"cve":"CVE-2023-44487","qid":"503419","title":"Alpine Linux Security Update for nginx"},{"cve":"CVE-2023-44487","qid":"503440","title":"Alpine Linux Security Update for dotnet6-build"},{"cve":"CVE-2023-44487","qid":"503441","title":"Alpine Linux Security Update for dotnet6-runtime"},{"cve":"CVE-2023-44487","qid":"503442","title":"Alpine Linux Security Update for dotnet7-build"},{"cve":"CVE-2023-44487","qid":"503443","title":"Alpine Linux Security Update for dotnet7-runtime"},{"cve":"CVE-2023-44487","qid":"503444","title":"Alpine Linux Security Update for dotnet7-runtime"},{"cve":"CVE-2023-44487","qid":"503468","title":"Alpine Linux Security Update for lighttpd"},{"cve":"CVE-2023-44487","qid":"503469","title":"Alpine Linux Security Update for nghttp2"},{"cve":"CVE-2023-44487","qid":"503629","title":"Alpine Linux Security Update for varnish"},{"cve":"CVE-2023-44487","qid":"505898","title":"Alpine Linux Security Update for nghttp2"},{"cve":"CVE-2023-44487","qid":"505899","title":"Alpine Linux Security Update for nginx"},{"cve":"CVE-2023-44487","qid":"505950","title":"Alpine Linux Security Update for varnish"},{"cve":"CVE-2023-44487","qid":"506007","title":"Alpine Linux Security Update for dotnet6-build"},{"cve":"CVE-2023-44487","qid":"506008","title":"Alpine Linux Security Update for dotnet6-build"},{"cve":"CVE-2023-44487","qid":"506015","title":"Alpine Linux Security Update for dotnet6-runtime"},{"cve":"CVE-2023-44487","qid":"506016","title":"Alpine Linux Security Update for dotnet6-runtime"},{"cve":"CVE-2023-44487","qid":"506023","title":"Alpine Linux Security Update for dotnet7-build"},{"cve":"CVE-2023-44487","qid":"506024","title":"Alpine Linux Security Update for dotnet7-build"},{"cve":"CVE-2023-44487","qid":"506028","title":"Alpine Linux Security Update for dotnet7-runtime"},{"cve":"CVE-2023-44487","qid":"506029","title":"Alpine Linux Security Update for dotnet7-runtime"},{"cve":"CVE-2023-44487","qid":"506088","title":"Alpine Linux Security Update for go"},{"cve":"CVE-2023-44487","qid":"506098","title":"Alpine Linux Security Update for h2o"},{"cve":"CVE-2023-44487","qid":"506101","title":"Alpine Linux Security Update for jetty-runner"},{"cve":"CVE-2023-44487","qid":"506124","title":"Alpine Linux Security Update for netdata"},{"cve":"CVE-2023-44487","qid":"510683","title":"Alpine Linux Security Update for openjdk21"},{"cve":"CVE-2023-44487","qid":"510805","title":"Alpine Linux Security Update for varnish"},{"cve":"CVE-2023-44487","qid":"6000246","title":"Debian Security Update for tomcat9 (DSA 5522-1)"},{"cve":"CVE-2023-44487","qid":"6000247","title":"Debian Security Update for tomcat10 (DSA 5521-1)"},{"cve":"CVE-2023-44487","qid":"6000251","title":"Debian Security Update for tomcat9 (DLA 3617-2)"},{"cve":"CVE-2023-44487","qid":"6000257","title":"Debian Security Update for tomcat9 (DLA 3617-1)"},{"cve":"CVE-2023-44487","qid":"6000263","title":"Debian Security Update for h2o (DLA 3638-1)"},{"cve":"CVE-2023-44487","qid":"6000267","title":"Debian Security Update for jetty9 (DLA 3641-1)"},{"cve":"CVE-2023-44487","qid":"6000268","title":"Debian Security Update for trafficserver (DLA 3645-1)"},{"cve":"CVE-2023-44487","qid":"6000281","title":"Debian Security Update for nghttp2 (DLA 3621-1)"},{"cve":"CVE-2023-44487","qid":"6000299","title":"Debian Security Update for jetty9 (DSA 5540-1)"},{"cve":"CVE-2023-44487","qid":"6000301","title":"Debian Security Update for tomcat9 (DSA 5522-3)"},{"cve":"CVE-2023-44487","qid":"6000303","title":"Debian Security Update for tomcat9 (DSA 5522-2)"},{"cve":"CVE-2023-44487","qid":"6000312","title":"Debian Security Update for trafficserver (DSA 5549-1)"},{"cve":"CVE-2023-44487","qid":"6000331","title":"Debian Security Update for netty (DSA 5558-1)"},{"cve":"CVE-2023-44487","qid":"6000332","title":"Debian Security Update for netty (DLA 3656-1)"},{"cve":"CVE-2023-44487","qid":"6000368","title":"Debian Security Update for nghttp2 (DSA 5570-1)"},{"cve":"CVE-2023-44487","qid":"673322","title":"EulerOS Security Update for nghttp2 (EulerOS-SA-2024-1092)"},{"cve":"CVE-2023-44487","qid":"673404","title":"EulerOS Security Update for nghttp2 (EulerOS-SA-2024-1068)"},{"cve":"CVE-2023-44487","qid":"673464","title":"EulerOS Security Update for nghttp2 (EulerOS-SA-2023-3282)"},{"cve":"CVE-2023-44487","qid":"673519","title":"EulerOS Security Update for golang (EulerOS-SA-2023-3270)"},{"cve":"CVE-2023-44487","qid":"673612","title":"EulerOS Security Update for golang (EulerOS-SA-2024-1082)"},{"cve":"CVE-2023-44487","qid":"673636","title":"EulerOS Security Update for nghttp2 (EulerOS-SA-2023-3346)"},{"cve":"CVE-2023-44487","qid":"673762","title":"EulerOS Security Update for nghttp2 (EulerOS-SA-2023-3254)"},{"cve":"CVE-2023-44487","qid":"673850","title":"EulerOS Security Update for golang (EulerOS-SA-2024-1140)"},{"cve":"CVE-2023-44487","qid":"673892","title":"EulerOS Security Update for nginx (EulerOS-SA-2024-1154)"},{"cve":"CVE-2023-44487","qid":"673979","title":"EulerOS Security Update for golang (EulerOS-SA-2023-3299)"},{"cve":"CVE-2023-44487","qid":"673981","title":"EulerOS Security Update for golang (EulerOS-SA-2024-1058)"},{"cve":"CVE-2023-44487","qid":"673988","title":"EulerOS Security Update for golang (EulerOS-SA-2023-3331)"},{"cve":"CVE-2023-44487","qid":"674095","title":"EulerOS Security Update for nghttp2 (EulerOS-SA-2023-3314)"},{"cve":"CVE-2023-44487","qid":"674107","title":"EulerOS Security Update for golang (EulerOS-SA-2023-3242)"},{"cve":"CVE-2023-44487","qid":"691321","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for h2o (bf545001-b96d-42e4-9d2e-60fdee204a43)"},{"cve":"CVE-2023-44487","qid":"691327","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for traefik (7a1b2624-6a89-11ee-af06-5404a68ad561)"},{"cve":"CVE-2023-44487","qid":"691330","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for jenkins (1ee26d45-6ddb-11ee-9898-00e081b7aa2d)"},{"cve":"CVE-2023-44487","qid":"691368","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for varnish (f25a34b1-910d-11ee-a1a2-641c67a117d8)"},{"cve":"CVE-2023-44487","qid":"710791","title":"Gentoo Linux Go Multiple Vulnerabilities (GLSA 202311-09)"},{"cve":"CVE-2023-44487","qid":"730934","title":"Apache Tomcat Denial of Service Vulnerability (CVE-2023-42794)"},{"cve":"CVE-2023-44487","qid":"730935","title":"Apache Tomcat Information Disclosure Vulnerability (CVE-2023-42795)"},{"cve":"CVE-2023-44487","qid":"730936","title":"Apache Tomcat Denial of Service Vulnerability (CVE-2023-42794)"},{"cve":"CVE-2023-44487","qid":"730937","title":"Apache Tomcat Multiple Vulnerabilities"},{"cve":"CVE-2023-44487","qid":"730958","title":"Jenkins HTTP/2 Denial of Service (DoS) Vulnerability (Jenkins Security Advisory 2023-10-18)"},{"cve":"CVE-2023-44487","qid":"730977","title":"Atlassian Confluence Data Center and Server Denial of Service (DoS) Vulnerability (CONFSERVER-93163)"},{"cve":"CVE-2023-44487","qid":"731034","title":"Cisco Prime Infrastructure Distributed Denial of Service (DDoS) Vulnerability (cisco-sa-http2-reset-d8Kf32vZ)"},{"cve":"CVE-2023-44487","qid":"755088","title":"SUSE Enterprise Linux Security Update for go1.21 (SUSE-SU-2023:4069-1)"},{"cve":"CVE-2023-44487","qid":"755089","title":"SUSE Enterprise Linux Security Update for go1.20 (SUSE-SU-2023:4068-1)"},{"cve":"CVE-2023-44487","qid":"755117","title":"SUSE Enterprise Linux Security Update for tomcat (SUSE-SU-2023:4129-1)"},{"cve":"CVE-2023-44487","qid":"755122","title":"SUSE Enterprise Linux Security Update for nodejs18 (SUSE-SU-2023:4133-1)"},{"cve":"CVE-2023-44487","qid":"755131","title":"SUSE Enterprise Linux Security Update for nodejs18 (SUSE-SU-2023:4155-1)"},{"cve":"CVE-2023-44487","qid":"755139","title":"SUSE Enterprise Linux Security Update for netty, netty-tcnative (SUSE-SU-2023:4163-1)"},{"cve":"CVE-2023-44487","qid":"755155","title":"SUSE Enterprise Linux Security Update for nghttp2 (SUSE-SU-2023:4200-1)"},{"cve":"CVE-2023-44487","qid":"755156","title":"SUSE Enterprise Linux Security Update for nghttp2 (SUSE-SU-2023:4199-1)"},{"cve":"CVE-2023-44487","qid":"755165","title":"SUSE Enterprise Linux Security Update for jetty-minimal (SUSE-SU-2023:4210-1)"},{"cve":"CVE-2023-44487","qid":"755167","title":"SUSE Enterprise Linux Security Update for nodejs18 (SUSE-SU-2023:4207-1)"},{"cve":"CVE-2023-44487","qid":"755201","title":"SUSE Enterprise Linux Security Update for nodejs10 (SUSE-SU-2023:4295-1)"},{"cve":"CVE-2023-44487","qid":"755230","title":"SUSE Enterprise Linux Security Update for nodejs12 (SUSE-SU-2023:4374-1)"},{"cve":"CVE-2023-44487","qid":"755231","title":"SUSE Enterprise Linux Security Update for nodejs12 (SUSE-SU-2023:4373-1)"},{"cve":"CVE-2023-44487","qid":"755272","title":"SUSE Enterprise Linux Security Update for go1.20-openssl (SUSE-SU-2023:4472-1)"},{"cve":"CVE-2023-44487","qid":"755275","title":"SUSE Enterprise Linux Security Update for go1.21-openssl (SUSE-SU-2023:4469-1)"},{"cve":"CVE-2023-44487","qid":"755292","title":"SUSE Enterprise Linux Security Update for nghttp2 (SUSE-SU-2023:4492-1)"},{"cve":"CVE-2023-44487","qid":"755902","title":"SUSE Enterprise Linux Security Update for kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-t (SUSE-SU-2023:4624-1)"},{"cve":"CVE-2023-44487","qid":"770209","title":"Red Hat OpenShift Container Platform 4.12 Security Update (RHSA-2023:5679)"},{"cve":"CVE-2023-44487","qid":"770210","title":"Red Hat OpenShift Container Platform 4.11 Security Update (RHSA-2023:5717)"},{"cve":"CVE-2023-44487","qid":"770213","title":"Red Hat OpenShift Container Platform 4.14 Security Update (RHSA-2023:5009)"},{"cve":"CVE-2023-44487","qid":"770214","title":"Red Hat OpenShift Container Platform 4.14 Security Update (RHSA-2023:6840)"},{"cve":"CVE-2023-44487","qid":"770215","title":"Red Hat OpenShift Container Platform 4.13 Security Update (RHSA-2023:7325)"},{"cve":"CVE-2023-44487","qid":"770217","title":"Red Hat OpenShift Container Platform 4.11 Security Update (RHSA-2023:7481)"},{"cve":"CVE-2023-44487","qid":"770219","title":"Red Hat OpenShift Container Platform 4.12 Security Update (RHSA-2023:7610)"},{"cve":"CVE-2023-44487","qid":"907423","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for nginx (31333)"},{"cve":"CVE-2023-44487","qid":"907426","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for cmake (31299-1)"},{"cve":"CVE-2023-44487","qid":"907428","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for skopeo (31345-1)"},{"cve":"CVE-2023-44487","qid":"907429","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for rook (31343-1)"},{"cve":"CVE-2023-44487","qid":"907431","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for vitess (31348-1)"},{"cve":"CVE-2023-44487","qid":"907432","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for prometheus (31341-1)"},{"cve":"CVE-2023-44487","qid":"907433","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for prometheus-adapter (31342-1)"},{"cve":"CVE-2023-44487","qid":"907434","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kured (31319-1)"},{"cve":"CVE-2023-44487","qid":"907435","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for flannel (31307-1)"},{"cve":"CVE-2023-44487","qid":"907436","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for terraform (31347-1)"},{"cve":"CVE-2023-44487","qid":"907437","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for cert-manager (31296-1)"},{"cve":"CVE-2023-44487","qid":"907438","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for azcopy (31292-1)"},{"cve":"CVE-2023-44487","qid":"907439","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for moby-buildx (31325-1)"},{"cve":"CVE-2023-44487","qid":"907440","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kubevirt (31318-1)"},{"cve":"CVE-2023-44487","qid":"907441","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for multus (31331-1)"},{"cve":"CVE-2023-44487","qid":"907442","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for influxdb (31312-1)"},{"cve":"CVE-2023-44487","qid":"907443","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for moby-compose (31327-1)"},{"cve":"CVE-2023-44487","qid":"907445","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for grpc (31520-1)"},{"cve":"CVE-2023-44487","qid":"907446","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kata-containers (31314-1)"},{"cve":"CVE-2023-44487","qid":"907447","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for etcd (31306-1)"},{"cve":"CVE-2023-44487","qid":"907448","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for containerized-data-importer (31300-1)"},{"cve":"CVE-2023-44487","qid":"907449","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kube-vip-cloud-provider (31317-1)"},{"cve":"CVE-2023-44487","qid":"907451","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for golang (31519-1)"},{"cve":"CVE-2023-44487","qid":"907452","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for application-gateway-kubernetes-ingress (31291-1)"},{"cve":"CVE-2023-44487","qid":"907453","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for nghttp2 (31332-1)"},{"cve":"CVE-2023-44487","qid":"907454","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kata-containers-cc (31315-1)"},{"cve":"CVE-2023-44487","qid":"907456","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for keda (31316-1)"},{"cve":"CVE-2023-44487","qid":"907457","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for moby-cli (31326-1)"},{"cve":"CVE-2023-44487","qid":"907458","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for nmi (31335-1)"},{"cve":"CVE-2023-44487","qid":"907459","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for csi-driver-lvm (31305-1)"},{"cve":"CVE-2023-44487","qid":"907462","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for cri-tools (31304-1)"},{"cve":"CVE-2023-44487","qid":"907463","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for local-path-provisioner (31324-1)"},{"cve":"CVE-2023-44487","qid":"907464","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for opa (31493-1)"},{"cve":"CVE-2023-44487","qid":"907465","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for coredns (31301-1)"},{"cve":"CVE-2023-44487","qid":"907467","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for packer (31340-1)"},{"cve":"CVE-2023-44487","qid":"907469","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for moby-containerd-cc (31491-1)"},{"cve":"CVE-2023-44487","qid":"907470","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for jx (31313-1)"},{"cve":"CVE-2023-44487","qid":"907472","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for node-problem-detector (31336-1)"},{"cve":"CVE-2023-44487","qid":"907473","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for sriov-network-device-plugin (31346-1)"},{"cve":"CVE-2023-44487","qid":"907474","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for moby-engine (31329-1)"},{"cve":"CVE-2023-44487","qid":"907475","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for cf-cli (31297-1)"},{"cve":"CVE-2023-44487","qid":"907476","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for moby-containerd (31328-1)"},{"cve":"CVE-2023-44487","qid":"907477","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for libcontainers-common (31323-1)"},{"cve":"CVE-2023-44487","qid":"907478","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for telegraf (31498-1)"},{"cve":"CVE-2023-44487","qid":"907480","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for nodejs18 (31339-1)"},{"cve":"CVE-2023-44487","qid":"907503","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for nginx (31333-1)"},{"cve":"CVE-2023-44487","qid":"907513","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for golang (31519-2)"},{"cve":"CVE-2023-44487","qid":"907593","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kubernetes (31693-1)"},{"cve":"CVE-2023-44487","qid":"907598","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for nodejs18 (31339-2)"},{"cve":"CVE-2023-44487","qid":"907792","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for coredns (31301-2)"},{"cve":"CVE-2023-44487","qid":"907833","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for helm (33343-1)"},{"cve":"CVE-2023-44487","qid":"907863","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for golang (31519-3)"},{"cve":"CVE-2023-44487","qid":"907895","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for local-path-provisioner (31324-2)"},{"cve":"CVE-2023-44487","qid":"907900","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for packer (31340-2)"},{"cve":"CVE-2023-44487","qid":"907902","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for azcopy (31292-2)"},{"cve":"CVE-2023-44487","qid":"907903","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for moby-buildx (31325-2)"},{"cve":"CVE-2023-44487","qid":"907905","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for containerized-data-importer (31300-2)"},{"cve":"CVE-2023-44487","qid":"907909","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for vitess (31348-2)"},{"cve":"CVE-2023-44487","qid":"907910","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for moby-containerd-cc (31491-2)"},{"cve":"CVE-2023-44487","qid":"907913","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kube-vip-cloud-provider (31317-2)"},{"cve":"CVE-2023-44487","qid":"907919","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kubevirt (31318-2)"},{"cve":"CVE-2023-44487","qid":"907922","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for terraform (31347-2)"},{"cve":"CVE-2023-44487","qid":"907923","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for moby-compose (31327-2)"},{"cve":"CVE-2023-44487","qid":"907930","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for cf-cli (31297-2)"},{"cve":"CVE-2023-44487","qid":"907931","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for application-gateway-kubernetes-ingress (31291-2)"},{"cve":"CVE-2023-44487","qid":"907933","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for jx (31313-2)"},{"cve":"CVE-2023-44487","qid":"907945","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for rook (31343-2)"},{"cve":"CVE-2023-44487","qid":"907984","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for keda (31316-2)"},{"cve":"CVE-2023-44487","qid":"908040","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for golang (37314-1)"},{"cve":"CVE-2023-44487","qid":"92067","title":"Microsoft HTTP/2 Protocol Distributed Denial of Service (DoS) Vulnerability"},{"cve":"CVE-2023-44487","qid":"92070","title":"Microsoft Azure Stack Hub Security Updates for October 2023"},{"cve":"CVE-2023-44487","qid":"92072","title":"Microsoft .NET Security Update for October 2023"},{"cve":"CVE-2023-44487","qid":"941295","title":"AlmaLinux Security Update for nginx:1.22 (ALSA-2023:5713)"},{"cve":"CVE-2023-44487","qid":"941296","title":"AlmaLinux Security Update for go-toolset:rhel8 (ALSA-2023:5721)"},{"cve":"CVE-2023-44487","qid":"941297","title":"AlmaLinux Security Update for dotnet7.0 (ALSA-2023:5709)"},{"cve":"CVE-2023-44487","qid":"941298","title":"AlmaLinux Security Update for go-toolset and golang (ALSA-2023:5738)"},{"cve":"CVE-2023-44487","qid":"941299","title":"AlmaLinux Security Update for nginx (ALSA-2023:5711)"},{"cve":"CVE-2023-44487","qid":"941300","title":"AlmaLinux Security Update for dotnet6.0 (ALSA-2023:5708)"},{"cve":"CVE-2023-44487","qid":"941301","title":"AlmaLinux Security Update for .NET (ALSA-2023:5749)"},{"cve":"CVE-2023-44487","qid":"941302","title":"AlmaLinux Security Update for nodejs (ALSA-2023:5765)"},{"cve":"CVE-2023-44487","qid":"941304","title":"AlmaLinux Security Update for nghttp2 (ALSA-2023:5837)"},{"cve":"CVE-2023-44487","qid":"941305","title":"AlmaLinux Security Update for nodejs:16 (ALSA-2023:5850)"},{"cve":"CVE-2023-44487","qid":"941306","title":"AlmaLinux Security Update for nodejs:18 (ALSA-2023:5869)"},{"cve":"CVE-2023-44487","qid":"941308","title":"AlmaLinux Security Update for grafana (ALSA-2023:5863)"},{"cve":"CVE-2023-44487","qid":"941309","title":"AlmaLinux Security Update for nodejs:18 (ALSA-2023:5849)"},{"cve":"CVE-2023-44487","qid":"941310","title":"AlmaLinux Security Update for grafana (ALSA-2023:5867)"},{"cve":"CVE-2023-44487","qid":"941311","title":"AlmaLinux Security Update for nghttp2 (ALSA-2023:5838)"},{"cve":"CVE-2023-44487","qid":"941312","title":"AlmaLinux Security Update for tomcat (ALSA-2023:5928)"},{"cve":"CVE-2023-44487","qid":"941317","title":"AlmaLinux Security Update for dotnet6.0 (ALSA-2023:5710)"},{"cve":"CVE-2023-44487","qid":"941318","title":"AlmaLinux Security Update for tomcat (ALSA-2023:5929)"},{"cve":"CVE-2023-44487","qid":"941320","title":"AlmaLinux Security Update for varnish (ALSA-2023:5924)"},{"cve":"CVE-2023-44487","qid":"941326","title":"AlmaLinux Security Update for nginx:1.20 (ALSA-2023:5712)"},{"cve":"CVE-2023-44487","qid":"941328","title":"AlmaLinux Security Update for varnish (ALSA-2023:5989)"},{"cve":"CVE-2023-44487","qid":"941329","title":"AlmaLinux Security Update for toolbox (ALSA-2023:6077)"},{"cve":"CVE-2023-44487","qid":"941330","title":"AlmaLinux Security Update for nginx:1.22 (ALSA-2023:6120)"},{"cve":"CVE-2023-44487","qid":"941407","title":"AlmaLinux Security Update for nghttp2 (ALSA-2023:6746)"},{"cve":"CVE-2023-44487","qid":"941479","title":"AlmaLinux Security Update for nodejs:20 (ALSA-2023:7205)"},{"cve":"CVE-2023-44487","qid":"941626","title":"AlmaLinux Security Update for nodejs:16 (ALSA-2024:1444)"},{"cve":"CVE-2023-44487","qid":"961048","title":"Rocky Linux Security Update for nghttp2 (RLSA-2023:5838)"},{"cve":"CVE-2023-44487","qid":"961049","title":"Rocky Linux Security Update for nodejs:16 (RLSA-2023:5850)"},{"cve":"CVE-2023-44487","qid":"961050","title":"Rocky Linux Security Update for tomcat (RLSA-2023:5928)"},{"cve":"CVE-2023-44487","qid":"961053","title":"Rocky Linux Security Update for nodejs (RLSA-2023:5765)"},{"cve":"CVE-2023-44487","qid":"961055","title":"Rocky Linux Security Update for varnish (RLSA-2023:5989)"},{"cve":"CVE-2023-44487","qid":"961056","title":"Rocky Linux Security Update for grafana (RLSA-2023:5863)"},{"cve":"CVE-2023-44487","qid":"961058","title":"Rocky Linux Security Update for go-toolset and golang (RLSA-2023:5738)"},{"cve":"CVE-2023-44487","qid":"961059","title":"Rocky Linux Security Update for varnish (RLSA-2023:5924)"},{"cve":"CVE-2023-44487","qid":"961060","title":"Rocky Linux Security Update for .NET (RLSA-2023:5749)"},{"cve":"CVE-2023-44487","qid":"961061","title":"Rocky Linux Security Update for dotnet6.0 (RLSA-2023:5708)"},{"cve":"CVE-2023-44487","qid":"961063","title":"Rocky Linux Security Update for go-toolset:rhel8 (RLSA-2023:5721)"},{"cve":"CVE-2023-44487","qid":"961064","title":"Rocky Linux Security Update for nginx:1.22 (RLSA-2023:6120)"},{"cve":"CVE-2023-44487","qid":"961065","title":"Rocky Linux Security Update for Satellite (RLSA-2023:6818)"},{"cve":"CVE-2023-44487","qid":"961071","title":"Rocky Linux Security Update for toolbox (RLSA-2023:6077)"},{"cve":"CVE-2023-44487","qid":"961072","title":"Rocky Linux Security Update for nghttp2 (RLSA-2023:6746)"},{"cve":"CVE-2023-44487","qid":"961085","title":"Rocky Linux Security Update for nodejs:20 (RLSA-2023:7205)"},{"cve":"CVE-2023-44487","qid":"961141","title":"Rocky Linux Security Update for nodejs:16 (RLSA-2024:1444)"},{"cve":"CVE-2023-44487","qid":"995570","title":"GO (Go) Security Update for golang.org/x/net (GHSA-qppj-fm5r-hxr3)"},{"cve":"CVE-2023-44487","qid":"996444","title":"Java (Maven) Security Update for golang.org/x/net (GHSA-qppj-fm5r-hxr3)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-44487","ASSIGNER":"cve@mitre.org","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"references":{"reference_data":[{"refsource":"MISC","name":"https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73","url":"https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73"},{"url":"https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/","refsource":"MISC","name":"https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/"},{"url":"https://aws.amazon.com/security/security-bulletins/AWS-2023-011/","refsource":"MISC","name":"https://aws.amazon.com/security/security-bulletins/AWS-2023-011/"},{"url":"https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack","refsource":"MISC","name":"https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack"},{"url":"https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/","refsource":"MISC","name":"https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"},{"url":"https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/","refsource":"MISC","name":"https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/"},{"url":"https://news.ycombinator.com/item?id=37831062","refsource":"MISC","name":"https://news.ycombinator.com/item?id=37831062"},{"url":"https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/","refsource":"MISC","name":"https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/"},{"url":"https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack","refsource":"MISC","name":"https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack"},{"url":"https://github.com/envoyproxy/envoy/pull/30055","refsource":"MISC","name":"https://github.com/envoyproxy/envoy/pull/30055"},{"url":"https://github.com/haproxy/haproxy/issues/2312","refsource":"MISC","name":"https://github.com/haproxy/haproxy/issues/2312"},{"url":"https://github.com/eclipse/jetty.project/issues/10679","refsource":"MISC","name":"https://github.com/eclipse/jetty.project/issues/10679"},{"url":"https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764","refsource":"MISC","name":"https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764"},{"url":"https://github.com/nghttp2/nghttp2/pull/1961","refsource":"MISC","name":"https://github.com/nghttp2/nghttp2/pull/1961"},{"url":"https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61","refsource":"MISC","name":"https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61"},{"url":"https://github.com/alibaba/tengine/issues/1872","refsource":"MISC","name":"https://github.com/alibaba/tengine/issues/1872"},{"url":"https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2","refsource":"MISC","name":"https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2"},{"url":"https://news.ycombinator.com/item?id=37830987","refsource":"MISC","name":"https://news.ycombinator.com/item?id=37830987"},{"url":"https://news.ycombinator.com/item?id=37830998","refsource":"MISC","name":"https://news.ycombinator.com/item?id=37830998"},{"url":"https://github.com/caddyserver/caddy/issues/5877","refsource":"MISC","name":"https://github.com/caddyserver/caddy/issues/5877"},{"url":"https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/","refsource":"MISC","name":"https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/"},{"url":"https://github.com/bcdannyboy/CVE-2023-44487","refsource":"MISC","name":"https://github.com/bcdannyboy/CVE-2023-44487"},{"url":"https://github.com/grpc/grpc-go/pull/6703","refsource":"MISC","name":"https://github.com/grpc/grpc-go/pull/6703"},{"url":"https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244","refsource":"MISC","name":"https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244"},{"url":"https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0","refsource":"MISC","name":"https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0"},{"url":"https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html","refsource":"MISC","name":"https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html"},{"url":"https://my.f5.com/manage/s/article/K000137106","refsource":"MISC","name":"https://my.f5.com/manage/s/article/K000137106"},{"url":"https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/","refsource":"MISC","name":"https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/"},{"url":"https://bugzilla.proxmox.com/show_bug.cgi?id=4988","refsource":"MISC","name":"https://bugzilla.proxmox.com/show_bug.cgi?id=4988"},{"url":"https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9","refsource":"MISC","name":"https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9"},{"refsource":"MISC","name":"https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected","url":"https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected"},{"url":"https://github.com/microsoft/CBL-Mariner/pull/6381","refsource":"MISC","name":"https://github.com/microsoft/CBL-Mariner/pull/6381"},{"url":"https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo","refsource":"MISC","name":"https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo"},{"url":"https://github.com/facebook/proxygen/pull/466","refsource":"MISC","name":"https://github.com/facebook/proxygen/pull/466"},{"url":"https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088","refsource":"MISC","name":"https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088"},{"url":"https://github.com/micrictor/http2-rst-stream","refsource":"MISC","name":"https://github.com/micrictor/http2-rst-stream"},{"url":"https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve","refsource":"MISC","name":"https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve"},{"url":"https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/","refsource":"MISC","name":"https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/"},{"url":"https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf","refsource":"MISC","name":"https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf"},{"url":"https://github.com/h2o/h2o/pull/3291","refsource":"MISC","name":"https://github.com/h2o/h2o/pull/3291"},{"url":"https://github.com/nodejs/node/pull/50121","refsource":"MISC","name":"https://github.com/nodejs/node/pull/50121"},{"url":"https://github.com/dotnet/announcements/issues/277","refsource":"MISC","name":"https://github.com/dotnet/announcements/issues/277"},{"url":"https://github.com/golang/go/issues/63417","refsource":"MISC","name":"https://github.com/golang/go/issues/63417"},{"url":"https://github.com/advisories/GHSA-vx74-f528-fxqg","refsource":"MISC","name":"https://github.com/advisories/GHSA-vx74-f528-fxqg"},{"url":"https://github.com/apache/trafficserver/pull/10564","refsource":"MISC","name":"https://github.com/apache/trafficserver/pull/10564"},{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487","refsource":"MISC","name":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487"},{"refsource":"MISC","name":"https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14","url":"https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14"},{"refsource":"MISC","name":"https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q","url":"https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q"},{"refsource":"MISC","name":"https://www.openwall.com/lists/oss-security/2023/10/10/6","url":"https://www.openwall.com/lists/oss-security/2023/10/10/6"},{"refsource":"MISC","name":"https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487","url":"https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487"},{"refsource":"MISC","name":"https://github.com/opensearch-project/data-prepper/issues/3474","url":"https://github.com/opensearch-project/data-prepper/issues/3474"},{"refsource":"MISC","name":"https://github.com/kubernetes/kubernetes/pull/121120","url":"https://github.com/kubernetes/kubernetes/pull/121120"},{"refsource":"MISC","name":"https://github.com/oqtane/oqtane.framework/discussions/3367","url":"https://github.com/oqtane/oqtane.framework/discussions/3367"},{"refsource":"MISC","name":"https://github.com/advisories/GHSA-xpw8-rcwv-8f8p","url":"https://github.com/advisories/GHSA-xpw8-rcwv-8f8p"},{"refsource":"MISC","name":"https://netty.io/news/2023/10/10/4-1-100-Final.html","url":"https://netty.io/news/2023/10/10/4-1-100-Final.html"},{"refsource":"MISC","name":"https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487","url":"https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"},{"refsource":"MISC","name":"https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/","url":"https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/"},{"refsource":"MISC","name":"https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack","url":"https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack"},{"refsource":"MISC","name":"https://news.ycombinator.com/item?id=37837043","url":"https://news.ycombinator.com/item?id=37837043"},{"refsource":"MISC","name":"https://github.com/kazu-yamamoto/http2/issues/93","url":"https://github.com/kazu-yamamoto/http2/issues/93"},{"refsource":"MISC","name":"https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html","url":"https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html"},{"refsource":"MISC","name":"https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1","url":"https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1"},{"refsource":"MISC","name":"https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113","url":"https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113"},{"refsource":"DEBIAN","name":"DSA-5522","url":"https://www.debian.org/security/2023/dsa-5522"},{"refsource":"DEBIAN","name":"DSA-5521","url":"https://www.debian.org/security/2023/dsa-5521"},{"refsource":"MISC","name":"https://access.redhat.com/security/cve/cve-2023-44487","url":"https://access.redhat.com/security/cve/cve-2023-44487"},{"refsource":"MISC","name":"https://github.com/ninenines/cowboy/issues/1615","url":"https://github.com/ninenines/cowboy/issues/1615"},{"refsource":"MISC","name":"https://github.com/varnishcache/varnish-cache/issues/3996","url":"https://github.com/varnishcache/varnish-cache/issues/3996"},{"refsource":"MISC","name":"https://github.com/tempesta-tech/tempesta/issues/1986","url":"https://github.com/tempesta-tech/tempesta/issues/1986"},{"refsource":"MISC","name":"https://blog.vespa.ai/cve-2023-44487/","url":"https://blog.vespa.ai/cve-2023-44487/"},{"refsource":"MISC","name":"https://github.com/etcd-io/etcd/issues/16740","url":"https://github.com/etcd-io/etcd/issues/16740"},{"refsource":"MISC","name":"https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event","url":"https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event"},{"refsource":"MISC","name":"https://istio.io/latest/news/security/istio-security-2023-004/","url":"https://istio.io/latest/news/security/istio-security-2023-004/"},{"refsource":"MISC","name":"https://github.com/junkurihara/rust-rpxy/issues/97","url":"https://github.com/junkurihara/rust-rpxy/issues/97"},{"refsource":"MISC","name":"https://bugzilla.suse.com/show_bug.cgi?id=1216123","url":"https://bugzilla.suse.com/show_bug.cgi?id=1216123"},{"refsource":"MISC","name":"https://bugzilla.redhat.com/show_bug.cgi?id=2242803","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2242803"},{"refsource":"MISC","name":"https://ubuntu.com/security/CVE-2023-44487","url":"https://ubuntu.com/security/CVE-2023-44487"},{"refsource":"MISC","name":"https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125","url":"https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125"},{"refsource":"MISC","name":"https://github.com/advisories/GHSA-qppj-fm5r-hxr3","url":"https://github.com/advisories/GHSA-qppj-fm5r-hxr3"},{"refsource":"MISC","name":"https://github.com/apache/httpd-site/pull/10","url":"https://github.com/apache/httpd-site/pull/10"},{"refsource":"MISC","name":"https://github.com/projectcontour/contour/pull/5826","url":"https://github.com/projectcontour/contour/pull/5826"},{"refsource":"MISC","name":"https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632","url":"https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632"},{"refsource":"MISC","name":"https://github.com/line/armeria/pull/5232","url":"https://github.com/line/armeria/pull/5232"},{"refsource":"MISC","name":"https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/","url":"https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/"},{"refsource":"MISC","name":"https://security.paloaltonetworks.com/CVE-2023-44487","url":"https://security.paloaltonetworks.com/CVE-2023-44487"},{"refsource":"MISC","name":"https://github.com/akka/akka-http/issues/4323","url":"https://github.com/akka/akka-http/issues/4323"},{"refsource":"MISC","name":"https://github.com/openresty/openresty/issues/930","url":"https://github.com/openresty/openresty/issues/930"},{"refsource":"MISC","name":"https://github.com/apache/apisix/issues/10320","url":"https://github.com/apache/apisix/issues/10320"},{"refsource":"MISC","name":"https://github.com/Azure/AKS/issues/3947","url":"https://github.com/Azure/AKS/issues/3947"},{"refsource":"MISC","name":"https://github.com/Kong/kong/discussions/11741","url":"https://github.com/Kong/kong/discussions/11741"},{"refsource":"MISC","name":"https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487","url":"https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487"},{"refsource":"MISC","name":"https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/","url":"https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/"},{"refsource":"MISC","name":"https://github.com/caddyserver/caddy/releases/tag/v2.7.5","url":"https://github.com/caddyserver/caddy/releases/tag/v2.7.5"},{"refsource":"MLIST","name":"[debian-lts-announce] 20231013 [SECURITY] [DLA 3617-1] tomcat9 security update","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html"},{"refsource":"MLIST","name":"[oss-security] 20231013 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations","url":"http://www.openwall.com/lists/oss-security/2023/10/13/4"},{"refsource":"MLIST","name":"[oss-security] 20231013 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations","url":"http://www.openwall.com/lists/oss-security/2023/10/13/9"},{"refsource":"MISC","name":"https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/","url":"https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/"},{"refsource":"MISC","name":"https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html","url":"https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html"},{"refsource":"FEDORA","name":"FEDORA-2023-ed2642fd58","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/"},{"refsource":"MISC","name":"https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/","url":"https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/"},{"refsource":"MLIST","name":"[debian-lts-announce] 20231016 [SECURITY] [DLA 3621-1] nghttp2 security update","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20231016-0001/","url":"https://security.netapp.com/advisory/ntap-20231016-0001/"},{"refsource":"MLIST","name":"[debian-lts-announce] 20231016 [SECURITY] [DLA 3617-2] tomcat9 regression update","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html"},{"refsource":"MLIST","name":"[oss-security] 20231018 Vulnerability in Jenkins","url":"http://www.openwall.com/lists/oss-security/2023/10/18/4"},{"refsource":"MLIST","name":"[oss-security] 20231018 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations","url":"http://www.openwall.com/lists/oss-security/2023/10/18/8"},{"refsource":"MLIST","name":"[oss-security] 20231019 CVE-2023-45802: Apache HTTP Server: HTTP/2 stream memory not reclaimed right away on RST","url":"http://www.openwall.com/lists/oss-security/2023/10/19/6"},{"refsource":"FEDORA","name":"FEDORA-2023-54fadada12","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/"},{"refsource":"FEDORA","name":"FEDORA-2023-5ff7bf1dd8","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/"},{"refsource":"MLIST","name":"[oss-security] 20231020 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations","url":"http://www.openwall.com/lists/oss-security/2023/10/20/8"},{"refsource":"FEDORA","name":"FEDORA-2023-17efd3f2cd","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/"},{"refsource":"FEDORA","name":"FEDORA-2023-d5030c983c","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/"},{"refsource":"FEDORA","name":"FEDORA-2023-0259c3f26f","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/"},{"refsource":"FEDORA","name":"FEDORA-2023-2a9214af5f","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/"},{"refsource":"FEDORA","name":"FEDORA-2023-e9c04d81c1","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/"},{"refsource":"FEDORA","name":"FEDORA-2023-f66fc0f62a","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/"},{"refsource":"FEDORA","name":"FEDORA-2023-4d2fd884ea","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/"},{"refsource":"FEDORA","name":"FEDORA-2023-b2c50535cb","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/"},{"refsource":"FEDORA","name":"FEDORA-2023-fe53e13b5b","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/"},{"refsource":"FEDORA","name":"FEDORA-2023-4bf641255e","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/"},{"refsource":"MLIST","name":"[debian-lts-announce] 20231030 [SECURITY] [DLA 3641-1] jetty9 security update","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00045.html"},{"refsource":"DEBIAN","name":"DSA-5540","url":"https://www.debian.org/security/2023/dsa-5540"},{"refsource":"MLIST","name":"[debian-lts-announce] 20231031 [SECURITY] [DLA 3638-1] h2o security update","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00047.html"},{"refsource":"MISC","name":"https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715","url":"https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715"},{"refsource":"FEDORA","name":"FEDORA-2023-1caffb88af","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/"},{"refsource":"FEDORA","name":"FEDORA-2023-3f70b8d406","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/"},{"refsource":"FEDORA","name":"FEDORA-2023-7b52921cae","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/"},{"refsource":"FEDORA","name":"FEDORA-2023-7934802344","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/"},{"refsource":"FEDORA","name":"FEDORA-2023-dbe64661af","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/"},{"refsource":"FEDORA","name":"FEDORA-2023-822aab0a5a","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/"},{"refsource":"MLIST","name":"[debian-lts-announce] 20231105 [SECURITY] [DLA 3645-1] trafficserver security update","url":"https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html"},{"refsource":"DEBIAN","name":"DSA-5549","url":"https://www.debian.org/security/2023/dsa-5549"},{"refsource":"FEDORA","name":"FEDORA-2023-c0c6a91330","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/"},{"refsource":"FEDORA","name":"FEDORA-2023-492b7be466","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/"}]}},"nvd":{"publishedDate":"2023-10-10 14:15:00","lastModifiedDate":"2024-02-02 15:40:00","problem_types":["CWE-400"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ietf:http:2.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nghttp2:nghttp2:*:*:*:*:*:*:*:*","versionEndExcluding":"1.57.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:netty:netty:*:*:*:*:*:*:*:*","versionEndExcluding":"4.1.100","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:envoyproxy:envoy:1.27.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:envoyproxy:envoy:1.26.4:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:envoyproxy:envoy:1.25.9:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:envoyproxy:envoy:1.24.10:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*","versionStartIncluding":"12.0.0","versionEndExcluding":"12.0.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*","versionStartIncluding":"11.0.0","versionEndExcluding":"11.0.17","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*","versionStartIncluding":"10.0.0","versionEndExcluding":"10.0.17","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*","versionEndExcluding":"9.4.53","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:caddyserver:caddy:*:*:*:*:*:*:*:*","versionEndExcluding":"2.7.5","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:golang:http2:*:*:*:*:*:go:*:*","versionEndExcluding":"0.17.0","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*","versionStartIncluding":"1.21.0","versionEndExcluding":"1.21.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*","versionEndExcluding":"1.20.10","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:golang:networking:*:*:*:*:*:go:*:*","versionEndExcluding":"0.17.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.0","versionEndIncluding":"13.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.0","versionEndIncluding":"13.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.0","versionEndIncluding":"13.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.0","versionEndIncluding":"13.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.0","versionEndIncluding":"13.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.0","versionEndIncluding":"13.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.0","versionEndIncluding":"13.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.0","versionEndIncluding":"13.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.0","versionEndIncluding":"13.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.0","versionEndIncluding":"13.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.0","versionEndIncluding":"13.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.0","versionEndIncluding":"13.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.0","versionEndIncluding":"13.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.0","versionEndIncluding":"13.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.0","versionEndIncluding":"13.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.0","versionEndIncluding":"13.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.0","versionEndIncluding":"13.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.0","versionEndIncluding":"13.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndIncluding":"14.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndIncluding":"14.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndIncluding":"14.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndIncluding":"14.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndIncluding":"14.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndIncluding":"14.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndIncluding":"14.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndIncluding":"14.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndIncluding":"14.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndIncluding":"14.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndIncluding":"14.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndIncluding":"14.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndIncluding":"14.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndIncluding":"14.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndIncluding":"14.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndIncluding":"14.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndIncluding":"14.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndIncluding":"14.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"15.1.0","versionEndIncluding":"15.1.10","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"16.1.0","versionEndIncluding":"16.1.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"15.1.0","versionEndIncluding":"15.1.10","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"16.1.0","versionEndIncluding":"16.1.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*","versionStartIncluding":"15.1.0","versionEndIncluding":"15.1.10","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*","versionStartIncluding":"16.1.0","versionEndIncluding":"16.1.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*","versionStartIncluding":"15.1.0","versionEndIncluding":"15.1.10","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*","versionStartIncluding":"16.1.0","versionEndIncluding":"16.1.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"15.1.0","versionEndIncluding":"15.1.10","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"16.1.0","versionEndIncluding":"16.1.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"15.1.0","versionEndIncluding":"15.1.10","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"16.1.0","versionEndIncluding":"16.1.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*","versionStartIncluding":"15.1.0","versionEndIncluding":"15.1.10","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*","versionStartIncluding":"16.1.0","versionEndIncluding":"16.1.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*","versionStartIncluding":"15.1.0","versionEndIncluding":"15.1.10","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*","versionStartIncluding":"16.1.0","versionEndIncluding":"16.1.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*","versionStartIncluding":"15.1.0","versionEndIncluding":"15.1.10","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*","versionStartIncluding":"16.1.0","versionEndIncluding":"16.1.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*","versionStartIncluding":"15.1.0","versionEndIncluding":"15.1.10","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*","versionStartIncluding":"16.1.0","versionEndIncluding":"16.1.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*","versionStartIncluding":"15.1.0","versionEndIncluding":"15.1.10","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*","versionStartIncluding":"16.1.0","versionEndIncluding":"16.1.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"15.1.0","versionEndIncluding":"15.1.10","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"16.1.0","versionEndIncluding":"16.1.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*","versionStartIncluding":"15.1.0","versionEndIncluding":"15.1.10","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*","versionStartIncluding":"16.1.0","versionEndIncluding":"16.1.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"15.1.0","versionEndIncluding":"15.1.10","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"16.1.0","versionEndIncluding":"16.1.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"15.1.0","versionEndIncluding":"15.1.10","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"16.1.0","versionEndIncluding":"16.1.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*","versionStartIncluding":"15.1.0","versionEndIncluding":"15.1.10","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*","versionStartIncluding":"16.1.0","versionEndIncluding":"16.1.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*","versionStartIncluding":"15.1.0","versionEndIncluding":"15.1.10","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*","versionStartIncluding":"16.1.0","versionEndIncluding":"16.1.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*","versionStartIncluding":"15.1.0","versionEndIncluding":"15.1.10","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*","versionStartIncluding":"16.1.0","versionEndIncluding":"16.1.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*","versionStartIncluding":"r25","versionEndExcluding":"r29","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*","versionStartIncluding":"1.5.0","versionEndIncluding":"1.8.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*","versionStartIncluding":"1.9.5","versionEndIncluding":"1.25.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*","versionStartIncluding":"2.0.0","versionEndIncluding":"2.4.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0.0","versionEndIncluding":"3.3.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:tomcat:11.0.0:milestone1:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:tomcat:11.0.0:milestone2:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:tomcat:11.0.0:milestone4:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:tomcat:11.0.0:milestone3:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:tomcat:11.0.0:milestone5:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:tomcat:11.0.0:milestone7:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:tomcat:11.0.0:milestone8:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:tomcat:11.0.0:milestone9:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:tomcat:11.0.0:milestone10:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:tomcat:11.0.0:milestone6:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:tomcat:11.0.0:milestone11:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*","versionStartIncluding":"9.0.0","versionEndIncluding":"9.0.80","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*","versionStartIncluding":"8.5.0","versionEndIncluding":"8.5.93","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*","versionStartIncluding":"10.1.0","versionEndIncluding":"10.1.13","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apple:swiftnio_http\\/2:*:*:*:*:*:swift:*:*","versionEndExcluding":"1.28.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:grpc:grpc:1.57.0:-:*:*:*:go:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:grpc:grpc:*:*:*:*:*:go:*:*","versionStartIncluding":"1.58.0","versionEndExcluding":"1.58.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:grpc:grpc:*:*:*:*:*:go:*:*","versionEndExcluding":"1.56.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:grpc:grpc:*:*:*:*:*:-:*:*","versionEndIncluding":"1.59.2","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.19045.3570","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.17763.4974","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.22000.2538","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.22621.2428","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*","versionEndExcluding":"10.0.14393.6351","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*","versionEndExcluding":"10.0.14393.6351","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*","versionStartIncluding":"7.0.0","versionEndExcluding":"7.0.12","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.19044.3570","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*","versionStartIncluding":"17.7","versionEndExcluding":"17.7.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*","versionStartIncluding":"17.6","versionEndExcluding":"17.6.8","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*","versionStartIncluding":"17.4","versionEndExcluding":"17.4.12","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*","versionStartIncluding":"17.0","versionEndExcluding":"17.2.20","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0.0","versionEndExcluding":"6.0.23","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*","versionStartIncluding":"7.0.0","versionEndExcluding":"7.0.12","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0.0","versionEndExcluding":"6.0.23","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:microsoft:azure_kubernetes_service:*:*:*:*:*:*:*:*","versionEndExcluding":"2023-10-08","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*","versionStartIncluding":"18.0.0","versionEndExcluding":"18.18.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*","versionStartIncluding":"20.0.0","versionEndExcluding":"20.8.1","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:microsoft:cbl-mariner:*:*:*:*:*:*:*:*","versionEndExcluding":"2023-10-11","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:dena:h2o:*:*:*:*:*:*:*:*","versionEndExcluding":"2023-10-10","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:facebook:proxygen:*:*:*:*:*:*:*:*","versionEndExcluding":"2023.10.16.00","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*","versionStartIncluding":"9.0.0","versionEndExcluding":"9.2.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*","versionStartIncluding":"8.0.0","versionEndExcluding":"8.1.9","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:apisix:*:*:*:*:*:*:*:*","versionEndExcluding":"3.6.1","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:amazon:opensearch_data_prepper:*:*:*:*:*:*:*:*","versionEndExcluding":"2.5.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:kazu-yamamoto:http2:*:*:*:*:*:*:*:*","versionEndExcluding":"4.2.2","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*","versionStartIncluding":"1.19.0","versionEndExcluding":"1.19.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*","versionStartIncluding":"1.18.0","versionEndExcluding":"1.18.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*","versionEndExcluding":"1.17.6","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:varnish_cache_project:varnish_cache:*:*:*:*:*:*:*:*","versionEndExcluding":"2023-10-10","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:traefik:traefik:3.0.0:beta3:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:traefik:traefik:3.0.0:beta2:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:traefik:traefik:3.0.0:beta1:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*","versionEndExcluding":"2.10.5","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:projectcontour:contour:*:*:*:*:*:kubernetes:*:*","versionEndExcluding":"2023-10-11","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:linkerd:linkerd:2.13.0:*:*:*:stable:kubernetes:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:linkerd:linkerd:2.13.1:*:*:*:stable:kubernetes:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:linkerd:linkerd:2.14.0:*:*:*:stable:kubernetes:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:linkerd:linkerd:2.14.1:*:*:*:stable:kubernetes:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:linkerd:linkerd:*:*:*:*:stable:kubernetes:*:*","versionStartIncluding":"2.12.0","versionEndIncluding":"2.12.5","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:linecorp:armeria:*:*:*:*:*:*:*:*","versionEndExcluding":"1.26.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:service_telemetry_framework:1.5:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:netapp:astra_control_center:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:akka:http_server:*:*:*:*:*:*:*:*","versionEndExcluding":"10.5.3","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:konghq:kong_gateway:*:*:*:*:enterprise:*:*:*","versionEndExcluding":"3.4.2","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*","versionEndIncluding":"2.427","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*","versionEndIncluding":"2.414.2","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:*","versionEndExcluding":"9.4.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openresty:openresty:*:*:*:*:*:*:*:*","versionEndExcluding":"1.21.4.3","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*","versionEndExcluding":"3.10.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*","versionEndExcluding":"2.19.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*","versionEndExcluding":"2.2.0","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*","versionEndExcluding":"7.4.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*","versionEndExcluding":"1.22","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*","versionEndExcluding":"17.15.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*","versionEndExcluding":"11.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*","versionEndExcluding":"7.2.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*","versionEndExcluding":"9.3.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*","versionEndExcluding":"4.11.0","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*","versionEndExcluding":"7.11.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*","versionEndExcluding":"6.0.0","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*","versionEndExcluding":"4.1.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*","versionEndExcluding":"x14.3.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*","versionEndExcluding":"11.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*","versionEndExcluding":"x14.3.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*","versionEndExcluding":"12.6.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*","versionEndExcluding":"2024.02.0","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*","versionEndExcluding":"2024.02.0","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*","versionEndExcluding":"2024.01.0","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:cisco:secure_web_appliance_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"15.1.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:secure_web_appliance:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*","versionEndExcluding":"10.2\\(7\\)","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.3\\(1\\)","versionEndExcluding":"10.3\\(5\\)","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3016q:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3064:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3064-32t:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3064-t:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3064-x:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3064t:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3064x:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3100:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3100-v:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3100-z:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3100v:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_31108pc-v:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_31108pv-v:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_31108tc-v:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3132q-v:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3132q-x:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3132q-x\\/3132q-xl:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3132q-xl:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3172:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3172pq:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3172pq-xl:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3172pq\\/pq-xl:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3172tq:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3172tq-32t:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3172tq-xl:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3200:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3232:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3232c:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3232c_:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3264c-e:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3400:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3408-s:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_34180yc:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_34200yc-sm:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3432d-s:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3464c:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3500:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3524:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3524-x\\/xl:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3548-x\\/xl:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3600:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_36180yc-r:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_3636c-r:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*","versionEndExcluding":"10.2\\(7\\)","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.3\\(1\\)","versionEndExcluding":"10.3\\(5\\)","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9000v:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9200:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9200yc:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_92160yc_switch:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9221c:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_92300yc:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_92300yc_switch:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_92304qc_switch:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9232e:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_92348gc-x:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9236c_switch:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9272q_switch:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9300:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_93108tc-ex-24:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_93108tc-ex_switch:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_93108tc-fx-24:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_93108tc-fx3h:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_93108tc-fx3p:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_93120tx_switch:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_93128:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_93128tx_switch:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9316d-gx:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_93180lc-ex:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_93180lc-ex_switch:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_93180tc-ex:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_93180yc-ex-24:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_93180yc-ex_switch:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_93180yc-fx:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_93180yc-fx-24:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_93180yc-fx3:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_93180yc-fx3h:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_93180yc-fx3s:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_93216tc-fx2:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_93240tc-fx2:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_93240yc-fx2:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9332c:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9332d-gx2b:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9332d-h2r:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9332pq_switch:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_93360yc-fx2:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9336c-fx2:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9336c-fx2-e:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9336pq:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9336pq_aci:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9336pq_aci_spine_switch:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9348d-gx2a:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9348gc-fx3:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9348gc-fxp:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_93600cd-gx:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9364c:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9364c-gx:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9364d-gx2a:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9372px-e:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9372px-e_switch:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9372px_switch:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9372tx-e:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9372tx-e_switch:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9372tx_switch:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9396px_switch:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9396tx_switch:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9408:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9432pq:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9500:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9500_16-slot:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9500_4-slot:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9500_8-slot:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9500_supervisor_a:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9500_supervisor_a\\+:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9500_supervisor_b:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9500_supervisor_b\\+:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9500r:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9504_switch:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9508_switch:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9516_switch:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9536pq:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9636pq:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9716d-gx:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9736pq:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9800:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9804:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:nexus_9808:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":null,"notes":[]}}}