Description
Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
Remediation
References
Related Vulnerabilities
WordPress Plugin WBW Currency Switcher for WooCommerce Cross-Site Scripting (1.6.5)
Envoy Proxy Use After Free Vulnerability (CVE-2024-23322)
WordPress Plugin Spectra-WordPress Gutenberg Blocks Multiple Security Bypass Vulnerabilities (2.3.0)
MediaWiki Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2022-29903)