Python prior to 2.6.8, 2.7.x prior to 2.7.3, 3.x prior to 3.1.5, and 3.2.x prior to 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent malicious users to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
python python 2.6.6 |
||
python python 2.6.5 |
||
python python 2.5.3 |
||
python python 2.5.6 |
||
python python 2.4.4 |
||
python python 2.4.2 |
||
python python 2.3.2 |
||
python python 2.3.1 |
||
python python |
||
python python 2.6.6150 |
||
python python 2.5.150 |
||
python python 2.4.3 |
||
python python 2.3.3 |
||
python python 2.1.1 |
||
python python 2.1.2 |
||
python python 1.5.2 |
||
python python 1.2 |
||
python python 2.6.4 |
||
python python 2.6.3 |
||
python python 2.5.2 |
||
python python 2.5.1 |
||
python python 2.4.6 |
||
python python 2.4.1 |
||
python python 2.3.7 |
||
python python 2.2.2 |
||
python python 2.0.1 |
||
python python 2.0 |
||
python python 0.9.0 |
||
python python 2.6.2150 |
||
python python 2.6.2 |
||
python python 2.6.1 |
||
python python 2.5.4 |
||
python python 2.3.4 |
||
python python 2.3.5 |
||
python python 2.2.3 |
||
python python 2.2.1 |
||
python python 2.2 |
||
python python 1.6.1 |
||
python python 1.6 |
||
python python 2.1.3 |
||
python python 2.1 |
||
python python 1.3 |
||
python python 0.9.1 |
||
python python 2.7.1 |
||
python python 2.7.1150 |
||
python python 2.7.2 |
||
python python 2.7.2150 |
||
python python 3.1 |
||
python python 3.0.1 |
||
python python 3.1.4 |
||
python python 3.1.3 |
||
python python 3.1.2 |
||
python python 3.1.1 |
||
python python 3.0 |
||
python python 3.2 |
||
python python 3.2.2150 |