Description
A specially crafted sequence of HTTP/2 requests sent to Apache Tomcat 10.0.0-M1 to 10.0.0-M5, 9.0.0.M1 to 9.0.35 and 8.5.0 to 8.5.55 could trigger high CPU usage for several seconds. If a sufficient number of such requests were made on concurrent HTTP/2 connections, the server could become unresponsive.
Remediation
References
Related Vulnerabilities
WordPress Plugin Name Directory Cross-Site Request Forgery (1.17.4)
WordPress Plugin WordPress Filter Gallery Security Bypass (0.0.6)
WordPress Plugin Custom 404 Pro Cross-Site Scripting (3.2.7)
Magento Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2019-7912)
WordPress Plugin MapSVG Lite Arbitrary File Disclosure (4.2.3.1)