Description
Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.
Remediation
References
Related Vulnerabilities
WordPress Plugin wpCommentTwit Cross-Site Request Forgery (0.5)
WordPress Plugin Duo Two-Factor Authentication Security Bypass (1.8.1)
WordPress Plugin Visual Form Builder Multiple Cross-Site Scripting Vulnerabilities (2.8.6)
MySQL CVE-2015-4816 Vulnerability (CVE-2015-4816)
WordPress Plugin Cartogiraffe Map Cross-Site Scripting (1.0)