In a report from The Hacker News, security researcher Bartek Nowotarski was credited with reporting the issue to Carnegie Mellon's Computer Emergency Response Team (CERT) Coordination Center on January 25.
The vulnerability, known as HTTP/2 CONTINUATION Flood, exploits improperly configured HTTP/2 implementations that fail to limit or sanitize the CONTINUATION frames in a requests' data stream.