A remote unauthenticated attacker can exploit a vulnerability in various HTTP/2 implementations to perform a Denial of Service attack. [Auto-archived: reprocess_no_remaining_articles — 2026-03-27T14:19:13.203Z]
| Vendor | Product | Versions |
|---|---|---|
| — | http/2 implementations | — |