{"vulnerability": "CVE-2023-20882", "sightings": [{"uuid": "9c1e806f-6cff-41e0-b4c5-5d37b886ef41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20882", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1955", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-20882\n\ud83d\udd39 Description: In Cloud foundry routing release versions from 0.262.0 and prior to 0.266.0,a bug in the gorouter process can lead to a denial of service of applications hosted on Cloud Foundry. Under the right circumstances, when client connections are closed prematurely, gorouter marks the currently selected backend as failed and removes it from the routing pool.\n\ud83d\udccf Published: 2023-05-26T00:00:00\n\ud83d\udccf Modified: 2025-01-16T14:39:05.654Z\n\ud83d\udd17 References:\n1. https://www.cloudfoundry.org/blog/cve-2023-20882-gorouter-pruning-via-client-disconnect-resulting-in-dos/", "creation_timestamp": "2025-01-16T14:55:58.000000Z"}]}