Description
Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
Remediation
References
Related Vulnerabilities
OpenSSL Cryptographic Issues Vulnerability (CVE-2014-3566)
OpenSSL NULL Pointer Dereference Vulnerability (CVE-2004-0079)
WordPress Plugin Chop Slider 3 SQL Injection (3.4)
Jenkins Server-Side Request Forgery (SSRF) Vulnerability (CVE-2018-1000067)
WordPress Plugin Task Manager Pro Multiple Vulnerabilities (1.3.1)