Description
Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
Remediation
References
Related Vulnerabilities
WebLogic Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2017-10152)
WordPress Plugin WPtouch Cross-Site Scripting (3.7.5.3)
MySQL CVE-2019-2743 Vulnerability (CVE-2019-2743)
Oracle JRE CVE-2020-2757 Vulnerability (CVE-2020-2757)
WordPress Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-5715)