Hash table implementations vulnerable to algorithmic complexity attacks Vulnerability Note VU#903934 Original Release Date: 2011-12-28 | Last Revised: 2016-02-15 Some programming language implementations do not sufficiently randomize their hash functions or provide means to limit key collision attacks, which can be leveraged by an unauthenticated attacker to cause a denial-of-service (DoS) conditi