cpe:/a:json-c_project:json-c:0.1 cpe:/a:json-c_project:json-c:0.2 cpe:/a:json-c_project:json-c:0.3 cpe:/a:json-c_project:json-c:0.4 cpe:/a:json-c_project:json-c:0.5 cpe:/a:json-c_project:json-c:0.6 cpe:/a:json-c_project:json-c:0.7 cpe:/a:json-c_project:json-c:0.8 cpe:/a:json-c_project:json-c:0.9 cpe:/a:json-c_project:json-c:0.10 cpe:/a:json-c_project:json-c:0.11 cpe:/o:fedoraproject:fedora:20 CVE-2013-6371 2014-04-22T09:06:26.710-04:00 2017-08-28T21:33:58.187-04:00 5.0 NETWORK LOW NONE NONE NONE PARTIAL http://nvd.nist.gov 2016-11-21T16:45:04.150-05:00 SECUNIA 57791 BID 66715 FEDORA FEDORA-2014-5006 MANDRIVA MDVSA-2014:079 CONFIRM http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=1032311 CONFIRM https://github.com/json-c/json-c/commit/64e36901a0614bf64a19bc3396469c66dcd0b015 XF jsonc-cve20136371-dos(92541) The hash functionality in json-c before 0.12 allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted JSON data, involving collisions.