Show plain JSON{"id": "CVE-2000-0456", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 2.1, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2000-05-28T04:00:00.000", "references": [{"url": "ftp://ftp.netbsd.org/pub/NetBSD/misc/security/advisories/NetBSD-SA2000-005.txt.asc", "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/1365", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/1272", "source": "cve@mitre.org"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "NetBSD 1.4.2 and earlier allows local users to cause a denial of service by repeatedly running certain system calls in the kernel which do not yield the CPU, aka \"cpu-hog\"."}], "lastModified": "2008-09-10T19:04:43.227", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netbsd:netbsd:1.4.1:*:alpha:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "247ABD95-74CA-45B8-8729-3C35C9E11186"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.4.1:*:arm32:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D4C44E8-075A-4B48-88DA-2CAC25CDF159"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.4.1:*:sparc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "19D1E7AC-79B6-4136-ADB2-06BEE9773795"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.4.1:*:x86:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2EE8A19-8AB1-4283-95EA-9EE3C7E5DED7"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.4.2:*:alpha:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6FA1C84C-6624-4032-8D0E-5EBB054F5224"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.4.2:*:arm32:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "06B9ADAD-ADDC-47AC-9924-B31B17DDF163"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.4.2:*:sparc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6DC0D30E-DBF1-4FDB-80C0-80DB50D9E77A"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.4.2:*:x86:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "537FD523-1D44-4D85-AED1-C092E0155CF2"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}