{"vulnerability": "cve-2023-22664", "sightings": [{"uuid": "d2c17417-d9c4-4e7c-9a86-243b937beb16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-22664", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/2618", "content": "#CVE-2023\nThis is a proof of concept for CVE-2023-24610\n\nhttps://github.com/abbisQQ/CVE-2023-24610\n\nCVE-2023-23924 PoC\n\nhttps://github.com/motikan2010/CVE-2023-23924\n\nCVE-2023-23924 PoC\n\nhttps://github.com/Live-Hack-CVE/CVE-2023-20916\n\nCVE-2023-23924 PoC\n\nhttps://github.com/Live-Hack-CVE/CVE-2023-22664\n\n@BlueRedTeam", "creation_timestamp": "2023-03-09T08:14:27.000000Z"}, {"uuid": "257f8322-3fd7-47c2-92f1-debbc043016d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-22664", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/2623", "content": "#CVE-2023\n\nCVE-2023-23924 PoC\nhttps://github.com/Live-Hack-CVE/CVE-2023-20916\n\nCVE-2023-23924 PoC\nhttps://github.com/Live-Hack-CVE/CVE-2023-22664\n\n\nAdobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit\nhttps://github.com/hacksysteam/CVE-2023-21608\n\n@BlueRedTeam", "creation_timestamp": "2023-03-17T09:11:32.000000Z"}, {"uuid": "23f93974-c5df-4167-bb1e-c3978433578f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-22664", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8928", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-22664\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: On BIG-IP versions 17.0.x before 17.0.0.2 and 16.1.x before 16.1.3.3, and BIG-IP SPK starting in version 1.6.0, when a client-side HTTP/2 profile and the HTTP MRF Router option are enabled for a virtual server, undisclosed requests can cause an increase in memory resource utilization.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n\n\ud83d\udccf Published: 2023-02-01T17:56:15.585Z\n\ud83d\udccf Modified: 2025-03-26T17:48:59.560Z\n\ud83d\udd17 References:\n1. https://my.f5.com/manage/s/article/K56676554", "creation_timestamp": "2025-03-26T18:25:39.000000Z"}, {"uuid": "98e25f14-1efc-4e78-9d3c-81787f8af4f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-22664", "type": "seen", "source": "https://t.me/cibsecurity/57335", "content": "\u203c CVE-2023-22664 \u203c\n\nOn BIG-IP versions 17.0.x before 17.0.0.2 and 16.1.x before 16.1.3.3, and BIG-IP SPK starting in version 1.6.0, when a client-side HTTP/2 profile and the HTTP MRF Router option are enabled for a virtual server, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-01T20:14:35.000000Z"}, {"uuid": "34f01b3e-bbd6-4f36-abd1-93ad48f2bc5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-22664", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/3740", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-23924 PoC\nURL\uff1ahttps://github.com/Live-Hack-CVE/CVE-2023-22664\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-02-01T20:33:33.000000Z"}]}