The vulnerability affects the Go programming language's HTTP cookie parsing. In normal circumstances, HTTP servers have a default limit of 1MB for parsing cookies. However, due to a bug in the code, there is no limit on the number of cookies that can be parsed. An attacker can exploit this by sending a large number of small cookies, causing the server to allocate excessive memory.