Description
Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
Remediation
References
Related Vulnerabilities
WordPress Plugin JobSearch WP Job Board Security Bypass (1.8.1)
Microsoft SQL Server Remote Code Execution Vulnerability (CVE-2019-1068)
Joomla! Core 3.3.x Cross-Site Scripting (3.3.0 - 3.3.3)
Apache HTTP Server Improper Access Control Vulnerability (CVE-2016-4979)
WordPress Plugin User Role by BestWebSoft Cross-Site Scripting (1.5.5)