CVE-2002-0996
https://notcve.org/view.php?id=CVE-2002-0996
Multiple buffer overflows in Novell NetMail (NIMS) 3.0.3 before 3.0.3C allows remote attackers to cause a denial of service and possibly execute arbitrary code via (1) WebAdmin or (2) ModWeb. • http://archives.neohapsis.com/archives/bugtraq/2002-07/0153.html http://support.novell.com/servlet/tidfinder/2963051 http://www.iss.net/security_center/static/9560.php http://www.securityfocus.com/bid/5230 http://www.securityfocus.com/bid/5231 •
CVE-2002-0929
https://notcve.org/view.php?id=CVE-2002-0929
Buffer overflows in the DHCP server for NetWare 6.0 SP1 allow remote attackers to cause a denial of service (reboot) via long DHCP requests. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0126.html http://support.novell.com/servlet/tidfinder/2962999 http://www.iss.net/security_center/static/9428.php http://www.securityfocus.com/bid/5097 •
CVE-2002-0782
https://notcve.org/view.php?id=CVE-2002-0782
Novell BorderManager 3.5 with PAT (Port-Address Translate) enabled allows remote attackers to cause a denial of service by filling the connection table with a large number of connection requests to hosts that do not have a specific route, which may be forwarded to the public interface. • http://online.securityfocus.com/archive/1/271957 http://www.iss.net/security_center/static/9062.php http://www.securityfocus.com/bid/4726 •
CVE-2002-0781
https://notcve.org/view.php?id=CVE-2002-0781
RTSP proxy for Novell BorderManager 3.6 SP 1a allows remote attackers to cause a denial of service via a GET request to port 9090 followed by a series of carriage returns, which causes proxy.nlm to ABEND. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0060.html http://online.securityfocus.com/archive/1/271475 http://www.iss.net/security_center/static/9033.php http://www.securityfocus.com/bid/4698 •
CVE-2002-0779
https://notcve.org/view.php?id=CVE-2002-0779
FTP proxy server for Novell BorderManager 3.6 SP 1a allows remote attackers to cause a denial of service (network connectivity loss) via a connection to port 21 with a large amount of random data. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0060.html http://online.securityfocus.com/archive/1/271475 http://www.iss.net/security_center/static/9031.php http://www.securityfocus.com/bid/4696 •