The host is installed with Apache HTTP Server through 2.4.58 and is prone to an uncontrolled resource consumption vulnerability. A flaw is present in the application, which fails to properly handle a HTTP/2 incoming headers exceeding the limit. Successful exploitation could allows attackers to cause DoS by memory exhaustion on endless continuation frames.