{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T18:46:47.614","vulnerabilities":[{"cve":{"id":"CVE-1999-1408","sourceIdentifier":"cve@mitre.org","published":"1997-03-05T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in AIX 4.1.4 and HP-UX 10.01 and 9.05 allows local users to cause a denial of service (crash) by using a socket to connect to a port on the localhost, calling shutdown to clear the socket, then using the same socket to connect to a different port on localhost."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.05:*:*:*:*:*:*:*","matchCriteriaId":"560C17E1-6154-4291-A838-5E76139B9FB5"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*","matchCriteriaId":"53BBFE9A-6846-4625-91AC-47AA0BC0933A"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*","matchCriteriaId":"EDE44C49-172C-4899-8CC8-29AA99A7CD2F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"B3BA7775-30F2-4CA0-BA6E-70ED12A48D90"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"FB038A89-1CA6-4313-B7CE-56C894945FFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"2B3BC86F-5718-4232-BFFF-6244A7C09B8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"E6118CC1-6E51-4E1B-8F58-43B337515222"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.5:*:*:*:*:*:*:*","matchCriteriaId":"F3D3B348-270F-4209-B31A-2B40F5E4A601"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87602167420641&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/352","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=87602167420641&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/352","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}}]}