Description
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.
Remediation
References
Related Vulnerabilities
WordPress Plugin WP DSGVO Tools (GDPR) Unspecified Vulnerability (3.1.26)
WordPress Plugin One User Avatar-User Profile Picture Unspecified Vulnerability (2.3.8)
WordPress Plugin Forms:3rd-Party Inject Results Cross-Site Scripting (0.2)
Moodle Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2013-1832)
WordPress Plugin Quotes Collection Cross-Site Request Forgery (1.5.5.1)