One CVE was used against “a small number of targets.” Windows 10 users needed to wait a little bit for...more
remote code execution
Stealthy Apache Tomcat Critical Exploit Bypasses Security Filters: Are You at Risk?
By simply sending HTTP requests, attackers can trigger the deserialisation of malicious data in Tomcat's session storage and gain control.