WhisperX tag archive

#http2

This page collects WhisperX intelligence signals tagged #http2. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (9)

The Lab · 2026-03-30 02:26:58 · GitHub Issues

1. OpenBao Secrets Operator Exposed to HTTP/2 CONTINUATION Flood Attack (GO-2024-2687)

A critical security vulnerability in the OpenBao Secrets Operator's main branch exposes systems to a resource exhaustion attack. The flaw, identified as GO-2024-2687, allows a malicious actor to force an HTTP/2 endpoint to process arbitrary, excessive amounts of header data by bombarding it with CONTINUATION frames. Th...

The Lab · 2026-03-26 02:26:58 · GitHub Issues

2. OpenBao Secrets Operator Exposed to HTTP/2 CONTINUATION Flood Attack (GO-2024-2687)

A critical security flaw in the OpenBao Secrets Operator's main branch exposes systems to a resource exhaustion attack via the HTTP/2 protocol. The vulnerability, identified as GO-2024-2687, allows a malicious actor to force an HTTP/2 endpoint to parse and process "arbitrary amounts" of header data by bombarding it wit...

The Lab · 2026-03-26 21:27:19 · GitHub Issues

3. Golang HTTP/2 Vulnerability: Sending Specific Frames Can Crash Servers (CVE-2026-27141)

A critical vulnerability in the widely used `golang.org/x/net` library allows a simple HTTP/2 request to crash Go-based servers. The flaw, tracked as CVE-2026-27141 (GO-2026-4559), stems from a missing nil check in the HTTP/2 frame handling code. Specifically, sending frames with type codes between 0x0a and 0x0f will t...

The Lab · 2026-03-28 02:26:51 · GitHub Issues

4. OpenBao Secrets Operator: HTTP/2 CONTINUATION Flood Vulnerability (GO-2024-2687) Exposes Denial-of-Service Risk

A critical security flaw in the OpenBao Secrets Operator's main branch exposes systems to a resource exhaustion attack. The vulnerability, identified as GO-2024-2687, allows a malicious actor to force an HTTP/2 endpoint to parse and decode arbitrary amounts of header data by sending an excessive stream of CONTINUATION ...

The Lab · 2026-04-02 11:27:19 · GitHub Issues

5. Apache HttpComponents Security Flaw Flagged in Internal Scan: HTTP/2 Vulnerability Introduced in Version 6.3.3

An internal security scan has flagged a newly identified vulnerability within the Apache HttpComponents HttpCore library, specifically affecting its HTTP/2 implementation. The security issue was introduced in version 6.3.3, raising immediate concerns for any systems or applications that have recently updated to this re...

The Lab · 2026-04-03 01:27:02 · GitHub Issues

6. OpenBao Secrets Operator 主分支曝出 HTTP/2 洪水漏洞 GO-2024-2687,攻击者可强制读取任意量头部数据

OpenBao Secrets Operator 项目的主分支代码库中,发现了一个可被利用的严重安全漏洞。漏洞追踪编号为 GO-2024-2687,存在于多个核心依赖中,包括 `golang.org/x/net` 等。攻击者通过向 HTTP/2 端点发送过量的 CONTINUATION 帧,可以强制服务器读取任意数量的头部数据,从而可能耗尽服务器资源或导致服务中断。该漏洞的威胁级别为“可触及”,意味着在现有代码路径中存在被利用的风险。 具体而言,该漏洞源于 HTTP/2 协议实现中对 CONTINUATION 帧的处理缺陷。为了维护 HPACK 状态,服务器必须解析和处理连接上的所有 HEADERS 和 CONTINUATION ...

The Lab · 2026-05-08 04:16:15 · The Hacker News

7. Apache HTTP/2 Server Flaw CVE-2026-23918: Double-Free Bug Raises Remote Code Execution Risk

The Apache Software Foundation has released security patches addressing a vulnerability in its HTTP Server product, specifically affecting HTTP/2 protocol handling. Tracked as CVE-2026-23918 with a CVSS score of 8.8, the flaw stems from a double-free memory error that could potentially allow remote code execution, alon...

The Lab · 2026-05-14 01:48:28 · GitHub Issues

9. Critical Authorization Bypass in gRPC-Go Forces Emergency Patch to v1.79.3

A critical authorization bypass vulnerability in google.golang.org/grpc has been patched, requiring immediate upgrades from v1.75.1 to v1.79.3. Tracked as CVE-2026-33186 and GHSA-p77j-4mvh-x3m3, the flaw allows attackers to bypass authorization checks through improper validation of the HTTP/2 `:path` pseudo-header. Th...