Description
Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.
Remediation
References
Related Vulnerabilities
WordPress 4.2.x Directory Traversal (4.2 - 4.2.37)
WordPress Plugin copy-me Cross-Site Request Forgery (1.0.0)
WordPress Plugin WebLibrarian Cross-Site Scripting (3.4.8.6)
WordPress Plugin WP Visitor Statistics (Real Time Traffic) Security Bypass (5.4)
WordPress Plugin ImageBoss-Images Up To 60% Smaller & CDN Cross-Site Scripting (3.0.4)