<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CVE-2023-44487 HTTP/2 Rapid Reset Attack in Open Q&amp;A</title>
    <link>https://community.dynatrace.com/t5/Open-Q-A/CVE-2023-44487-HTTP-2-Rapid-Reset-Attack/m-p/225191#M28946</link>
    <description>&lt;P&gt;Hello everyone,&lt;BR /&gt;&lt;BR /&gt;We've just published the blog post about the&amp;nbsp;HTTP/2 Rapid Reset Attack Vulnerability. You can read more about it here:&lt;BR /&gt;&lt;A href="https://www.dynatrace.com/news/security-alert/cve-2023-44487/" target="_self"&gt;HTTP/2 Rapid Reset Attack Vulnerability (CVE-2023-44487)&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 12 Oct 2023 09:49:56 GMT</pubDate>
    <dc:creator>MaciejNeumann</dc:creator>
    <dc:date>2023-10-12T09:49:56Z</dc:date>
    <item>
      <title>CVE-2023-44487 HTTP/2 Rapid Reset Attack</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/CVE-2023-44487-HTTP-2-Rapid-Reset-Attack/m-p/225028#M28896</link>
      <description>&lt;P&gt;Understand that Dynatrace have nginx component.&lt;/P&gt;&lt;P&gt;Please kindly have your security team to advice on&lt;/P&gt;&lt;P&gt;CVE-2023-44487 HTTP/2 Rapid Reset Attack&lt;/P&gt;</description>
      <pubDate>Wed, 11 Oct 2023 06:31:59 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/CVE-2023-44487-HTTP-2-Rapid-Reset-Attack/m-p/225028#M28896</guid>
      <dc:creator>Suryanto_1</dc:creator>
      <dc:date>2023-10-11T06:31:59Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2023-44487 HTTP/2 Rapid Reset Attack</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/CVE-2023-44487-HTTP-2-Rapid-Reset-Attack/m-p/225191#M28946</link>
      <description>&lt;P&gt;Hello everyone,&lt;BR /&gt;&lt;BR /&gt;We've just published the blog post about the&amp;nbsp;HTTP/2 Rapid Reset Attack Vulnerability. You can read more about it here:&lt;BR /&gt;&lt;A href="https://www.dynatrace.com/news/security-alert/cve-2023-44487/" target="_self"&gt;HTTP/2 Rapid Reset Attack Vulnerability (CVE-2023-44487)&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Oct 2023 09:49:56 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/CVE-2023-44487-HTTP-2-Rapid-Reset-Attack/m-p/225191#M28946</guid>
      <dc:creator>MaciejNeumann</dc:creator>
      <dc:date>2023-10-12T09:49:56Z</dc:date>
    </item>
  </channel>
</rss>

