Description
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Remediation
References
Related Vulnerabilities
Joomla Incorrect Authorization Vulnerability (CVE-2018-17857)
Python Improper Input Validation Vulnerability (CVE-2013-7338)
DataTables Prototype Pollution Vulnerability (CVE-2020-28458)
WordPress Plugin Product Catalog Multiple SQL Injection Vulnerabilities (2.1)
WordPress Plugin ShareThis:Free Sharing Buttons and Tools Cross-Site Request Forgery (7.0.5)