A remote unauthenticated attacker can exploit a vulnerability in various HTTP/2 implementations to perform a Denial of Service attack.