CVE-2002-0782
https://notcve.org/view.php?id=CVE-2002-0782
Novell BorderManager 3.5 with PAT (Port-Address Translate) enabled allows remote attackers to cause a denial of service by filling the connection table with a large number of connection requests to hosts that do not have a specific route, which may be forwarded to the public interface. • http://online.securityfocus.com/archive/1/271957 http://www.iss.net/security_center/static/9062.php http://www.securityfocus.com/bid/4726 •
CVE-2002-0781
https://notcve.org/view.php?id=CVE-2002-0781
RTSP proxy for Novell BorderManager 3.6 SP 1a allows remote attackers to cause a denial of service via a GET request to port 9090 followed by a series of carriage returns, which causes proxy.nlm to ABEND. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0060.html http://online.securityfocus.com/archive/1/271475 http://www.iss.net/security_center/static/9033.php http://www.securityfocus.com/bid/4698 •
CVE-2002-0779
https://notcve.org/view.php?id=CVE-2002-0779
FTP proxy server for Novell BorderManager 3.6 SP 1a allows remote attackers to cause a denial of service (network connectivity loss) via a connection to port 21 with a large amount of random data. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0060.html http://online.securityfocus.com/archive/1/271475 http://www.iss.net/security_center/static/9031.php http://www.securityfocus.com/bid/4696 •
CVE-2002-0780
https://notcve.org/view.php?id=CVE-2002-0780
IP/IPX gateway for Novell BorderManager 3.6 SP 1a allows remote attackers to cause a denial of service via a connection to port 8225 with a large amount of random data, which causes ipipxgw.nlm to ABEND. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0060.html http://online.securityfocus.com/archive/1/271475 http://www.iss.net/security_center/static/9032.php http://www.securityfocus.com/bid/4697 •
CVE-2001-0486 – Novell BorderManager Enterprise Edition 3.5 - Denial of Service
https://notcve.org/view.php?id=CVE-2001-0486
Remote attackers can cause a denial of service in Novell BorderManager 3.6 and earlier by sending TCP SYN flood to port 353. • https://www.exploit-db.com/exploits/264 http://archives.neohapsis.com/archives/bugtraq/2001-05/0000.html http://archives.neohapsis.com/archives/vuln-dev/2001-q2/0020.html http://marc.info/?l=bugtraq&m=98779821207867&w=2 http://marc.info/?l=bugtraq&m=98865027328391&w=2 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2959062.htm http://www.securityfocus.com/bid/2623 https://exchange.xforce.ibmcloud.com/vulnerabilities/6429 •