Unsanitized input in the query parser in github.com/revel/revel before v1.0.0 allows remote attackers to cause resource exhaustion via memory allocation.
{ "binaries": [ { "binary_name": "golang-github-revel-revel-dev", "binary_version": "0.12.0+dfsg-1" } ] }
{ "binaries": [ { "binary_name": "golang-github-revel-revel-dev", "binary_version": "0.12.0+dfsg-4" } ] }
{ "binaries": [ { "binary_name": "golang-github-revel-revel-dev", "binary_version": "1.0.0-2" } ] }
{ "binaries": [ { "binary_name": "golang-github-revel-revel-dev", "binary_version": "1.0.0-3" } ] }