Description
Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.
Remediation
References
Related Vulnerabilities
WordPress Plugin NEX-Forms Lite-WordPress Contact Form builder Cross-Site Scripting (2.1.0)
WordPress Plugin WP Design Maps & Places Cross-Site Scripting (1.2)
IBM WebSEAL Incorrect Default Permissions Vulnerability (CVE-2023-38370)
Chamilo Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2023-34944)