Description
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.
Remediation
References
Related Vulnerabilities
Joomla! Core 1.5.x Cross-Site Scripting (1.5.0 - 1.5.7)
MyBB Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-9403)
WordPress Plugin Store Locator Plus for WordPress Cross-Site Scripting (4.5.10)
Dolibarr Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2020-14209)
WordPress 2.8.2 Multiple Security Bypass Vulnerabilities (2.0 - 2.8.2)