Unsanitized input in the query parser in github.com/revel/revel before v1.0.0 allows remote attackers to cause resource exhaustion via memory allocation.
{ "binaries": [ { "binary_version": "0.12.0+dfsg-1", "binary_name": "golang-github-revel-revel-dev" } ] }
{ "binaries": [ { "binary_version": "0.12.0+dfsg-4", "binary_name": "golang-github-revel-revel-dev" } ] }
{ "binaries": [ { "binary_version": "1.0.0-2", "binary_name": "golang-github-revel-revel-dev" } ] }
{ "binaries": [ { "binary_version": "1.0.0-3", "binary_name": "golang-github-revel-revel-dev" } ] }