Description
Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.
Remediation
References
Related Vulnerabilities
WordPress Plugin WP Whois Domain Cross-Site Scripting (1.0.0)
WordPress Plugin Elementor Website Builder Security Bypass (3.0.13)
Joomla! Core 1.5.x Cross-Site Scripting (1.5.0 - 1.5.7)
WordPress 3.8.x Multiple Vulnerabilities (3.8 - 3.8.17)
WordPress Plugin ND Shortcodes For Visual Composer Security Bypass (5.8)