{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T08:28:33.478","vulnerabilities":[{"cve":{"id":"CVE-2000-1010","sourceIdentifier":"cve@mitre.org","published":"2000-12-11T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Format string vulnerability in talkd in OpenBSD and possibly other BSD-based OSes allows remote attackers to execute arbitrary commands via a user name that contains format characters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.3:*:*:*:*:*:*:*","matchCriteriaId":"1D2DA7F0-E3C0-447A-A2B0-ECC928389D84"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.4:*:*:*:*:*:*:*","matchCriteriaId":"FEBE290B-5EC6-4BBA-B645-294C150E417A"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.5:*:*:*:*:*:*:*","matchCriteriaId":"ACE7FDFB-C6A6-4B58-B0B4-236E4EA76EF6"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.6:*:*:*:*:*:*:*","matchCriteriaId":"0DF053A1-C252-427E-9EEF-27240F422976"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.7:*:*:*:*:*:*:*","matchCriteriaId":"48A9C344-45AA-47B9-B35A-1A62E220D9C6"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.0:*:*:*:*:*:*:*","matchCriteriaId":"4BF54738-3C44-4FD4-AA9C-CAB2E86B1DC1"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.1:*:*:*:*:*:*:*","matchCriteriaId":"4EF44364-0F57-4B74-81B0-501EA6B58501"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.2:*:alpha:*:*:*:*:*","matchCriteriaId":"07396B95-E434-46C9-A345-27C9EA9BEA26"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.2:*:i386:*:*:*:*:*","matchCriteriaId":"363AB7DB-A8BA-4D58-97C4-1DF1F0F43E07"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.2:*:sparc:*:*:*:*:*","matchCriteriaId":"0775CE08-C5AD-4FF7-AEA9-537B1EAE3BDE"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/137890","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1764","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/5344","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/137890","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1764","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/5344","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}