Description
Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.
Remediation
References
Related Vulnerabilities
WordPress Plugin All Category SEO Updater Cross-Site Scripting (0.2.7)
OpenSSL Cryptographic Issues Vulnerability (CVE-2014-3470)
WordPress Plugin VK All in One Expansion Unit Cross-Site Scripting (9.85.0.1)
WordPress Plugin Social LikeBox & Feed Cross-Site Scripting (2.8.4)
RubyGems Improper Input Validation Vulnerability (CVE-2015-4020)