Plone 4.1.3 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.
archives.neohapsis.com/archives/bugtraq/2011-12/0181.html
secunia.com/advisories/47406
www.kb.cert.org/vuls/id/903934
www.nruns.com/_downloads/advisory28122011.pdf
www.ocert.org/advisories/ocert-2011-003.html
exchange.xforce.ibmcloud.com/vulnerabilities/72018
github.com/advisories/GHSA-pcwm-8jc3-qxvj
github.com/plone/plone
nvd.nist.gov/vuln/detail/CVE-2011-4462