You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: pkg/vulnloader/nvdloader/manual.go
+162Lines changed: 162 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -1104,4 +1104,166 @@ Subsequent use of the cloned handle that does not explicitly set a source to loa
1104
1104
//////////////////////////////////////////
1105
1105
// End cURL and libcurl vulnerabilities //
1106
1106
//////////////////////////////////////////
1107
+
////////////////////////////////////
1108
+
// Start HTTP/2 Rapid Reset vulns //
1109
+
////////////////////////////////////
1110
+
"CVE-2023-39325": {
1111
+
CVE: &schema.CVEJSON40{
1112
+
CVEDataMeta: &schema.CVEJSON40CVEDataMeta{
1113
+
ASSIGNER: "cve@mitre.org",
1114
+
ID: "CVE-2023-39325",
1115
+
},
1116
+
DataFormat: "MITRE",
1117
+
DataType: "CVE",
1118
+
DataVersion: "4.0",
1119
+
Description: &schema.CVEJSON40Description{
1120
+
DescriptionData: []*schema.CVEJSON40LangString{
1121
+
{
1122
+
Lang: "en",
1123
+
Value: "A flaw was found in the handling of multiplexed streams in the http/2 protocol. A client can repeatedly make requests for a new multiplex streams and immediately send a RST_STREAM frame to cancel them. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for maximum number of active streams per connection, resulting in a denial of service due to server resource consumption.",
Value: "The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.",
0 commit comments