Description
A specially crafted sequence of HTTP/2 requests sent to Apache Tomcat 10.0.0-M1 to 10.0.0-M5, 9.0.0.M1 to 9.0.35 and 8.5.0 to 8.5.55 could trigger high CPU usage for several seconds. If a sufficient number of such requests were made on concurrent HTTP/2 connections, the server could become unresponsive.
Remediation
References
Related Vulnerabilities
Tornado Improper Input Validation Vulnerability (CVE-2012-2374)
WordPress Plugin Zotpress SQL Injection (6.1.2)
WordPress 4.0.x Multiple Vulnerabilities (4.0 - 4.0.35)
MySQL CVE-2023-21976 Vulnerability (CVE-2023-21976)
WordPress Plugin FileBird-WordPress Media Library Folders & File Manager SQL Injection (4.7.3)