Description
Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
Remediation
References
Related Vulnerabilities
IBM WebSEAL Missing Authorization Vulnerability (CVE-2020-4499)
WordPress Plugin WP Silverlight Media Player Cross-Site Scripting (0.8)
WordPress Plugin Comments-wpDiscuz Cross-Site Request Forgery (7.3.3)
MySQL CVE-2019-2966 Vulnerability (CVE-2019-2966)
MediaWiki Improper Input Validation Vulnerability (CVE-2011-0003)