Description
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.
Remediation
References
Related Vulnerabilities
Internet Information Services Other Vulnerability (CVE-2002-1694)
WordPress Plugin MailPoet Newsletters (Previous) Cross-Site Request Forgery (2.6.10)
WordPress Plugin Hide Featured Image Unspecified Vulnerability (1.1)
WordPress Plugin Advanced Text Widget 'page' Parameter Cross-Site Scripting (2.0.0)