In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.
https://security.netapp.com/advisory/ntap-20220624-0005/
https://security.gentoo.org/glsa/202208-20