In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.
{ "versions": [ { "introduced": "0" }, { "last_affected": "2.4.53" } ] }
[ { "events": [ { "introduced": "0" }, { "last_affected": "35" } ] }, { "events": [ { "introduced": "0" }, { "last_affected": "36" } ] } ]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-29404.json"