Description
Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.
Remediation
References
Related Vulnerabilities
XWiki Improper Encoding or Escaping of Output Vulnerability (CVE-2023-26472)
WordPress Plugin Shopp Arbitrary File Upload (1.4)
Oracle Database Server CVE-2009-0987 Vulnerability (CVE-2009-0987)
WordPress Plugin EELV Newsletter Multiple Vulnerabilities (4.6)
WordPress Plugin LifterLMS-WP LMS for eLearning, Online Courses, & Quizzes Security Bypass (3.34.5)