Description
Apache Traffic Server is vulnerable to HTTP/2 setting flood attacks. Earlier versions of Apache Traffic Server didn't limit the number of setting frames sent from the client using the HTTP/2 protocol. Users should upgrade to Apache Traffic Server 7.1.7, 8.0.4, or later versions.
Remediation
References
Related Vulnerabilities
WordPress Plugin Enable Media Replace Directory Traversal (3.6.3)
Chamilo Improper Privilege Management Vulnerability (CVE-2020-23128)
WordPress Plugin Five Star Restaurant Menu-WordPress Ordering Remote Code Execution (2.2.0)
WordPress 3.9.1 Multiple Vulnerabilities (3.9 - 3.9.1)
Oracle HTTP Server CVE-2018-2760 Vulnerability (CVE-2018-2760)