Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101382.html", "name": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101382.html", "tags": ["Third Party Advisory", "Tool Signature"], "refsource": "MISC"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83039", "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83039", "tags": ["Third Party Advisory", "VDB Entry"], "refsource": "MISC"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101387.html", "name": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101387.html", "tags": ["Third Party Advisory"], "refsource": "MISC"}, {"url": "http://www.openwall.com/lists/oss-security/2013/03/26/2", "name": "http://www.openwall.com/lists/oss-security/2013/03/26/2", "tags": ["Mailing List", "Third Party Advisory"], "refsource": "MISC"}, {"url": "http://www.securityfocus.com/bid/58702", "name": "http://www.securityfocus.com/bid/58702", "tags": ["Third Party Advisory", "VDB Entry"], "refsource": "MISC"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "The py-bcrypt module before 0.3 for Python does not properly handle concurrent memory access, which allows attackers to bypass authentication via multiple authentication requests, which trigger the password hash to be overwritten."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-307"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2013-1895", "ASSIGNER": "secalert@redhat.com"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "severity": "MEDIUM", "acInsufInfo": false, "impactScore": 2.9, "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "baseMetricV3": {"cvssV3": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 3.9}}, "publishedDate": "2020-01-28T15:15Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:python:py-bcrypt:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "0.3"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2020-02-04T16:49Z"}