Vigilance.fr - Rust h2: overload via HTTP/2 CONTINUATION, analyzed on 15/04/2024
An attacker can trigger an overload of Rust h2, via HTTP/2 CONTINUATION, in order to trigger a denial of service. - Security Vulnerability
An attacker can trigger an overload of Rust h2, via HTTP/2 CONTINUATION, in order to trigger a denial of service.
Quelle est votre réaction ?