CVE-1999-1320
https://notcve.org/view.php?id=CVE-1999-1320
Vulnerability in Novell NetWare 3.x and earlier allows local users to gain privileges via packet spoofing. • http://ciac.llnl.gov/ciac/bulletins/d-01.shtml http://www.iss.net/security_center/static/7213.php •
CVE-1999-1382
https://notcve.org/view.php?id=CVE-1999-1382
NetWare NFS mode 1 and 2 implements the "Read Only" flag in Unix by changing the ownership of a file to root, which allows local users to gain root privileges by creating a setuid program and setting it to "Read Only," which NetWare-NFS changes to a setuid root program. • http://marc.info/?l=bugtraq&m=88427711321769&w=2 http://marc.info/?l=bugtraq&m=90295697702474&w=2 http://support.novell.com/cgi-bin/search/tidfinder.cgi?2940551 http://www.iss.net/security_center/static/7246.php •
CVE-1999-1086
https://notcve.org/view.php?id=CVE-1999-1086
Novell 5 and earlier, when running over IPX with a packet signature level less than 3, allows remote attackers to gain administrator privileges by spoofing the MAC address in IPC fragmented packets that make NetWare Core Protocol (NCP) calls. • http://marc.info/?l=bugtraq&m=93214475111651&w=2 http://www.securityfocus.com/bid/528 •
CVE-1999-0929
https://notcve.org/view.php?id=CVE-1999-0929
Novell NetWare with Novell-HTTP-Server or YAWN web servers allows remote attackers to conduct a denial of service via a large number of HTTP GET requests. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0929 •
CVE-1999-0470 – Novell Netware 4.1/4.11 - SP5B Remote.NLM Weak Encryption
https://notcve.org/view.php?id=CVE-1999-0470
A weak encryption algorithm is used for passwords in Novell Remote.NLM, allowing them to be easily decrypted. • https://www.exploit-db.com/exploits/19364 http://www.securityfocus.com/bid/482 •