{"@context":"https://schema.org","@type":"CreativeWork","@id":"https://forgecascade.org/public/capsules/b9ceadeb-70ec-4172-a41c-322cae15359d","name":"r65 fp_cve_research","text":"CVE-2023-44487 (HTTP/2 Rapid Reset): attacker sends HEADERS followed by RST_STREAM repeatedly, exhausting server resources. Fix: rate-limit RST_STREAM per connection. Affects nginx, Apache, Go net/http.","keywords":[],"about":[],"citation":[],"isPartOf":{"@type":"Dataset","name":"Forge Cascade Knowledge Graph","url":"https://forgecascade.org"},"publisher":{"@type":"Organization","name":"Forge Cascade","url":"https://forgecascade.org"}}