CVE-1999-1320
https://notcve.org/view.php?id=CVE-1999-1320
Vulnerability in Novell NetWare 3.x and earlier allows local users to gain privileges via packet spoofing. • http://ciac.llnl.gov/ciac/bulletins/d-01.shtml http://www.iss.net/security_center/static/7213.php •
CVE-1999-1086
https://notcve.org/view.php?id=CVE-1999-1086
Novell 5 and earlier, when running over IPX with a packet signature level less than 3, allows remote attackers to gain administrator privileges by spoofing the MAC address in IPC fragmented packets that make NetWare Core Protocol (NCP) calls. • http://marc.info/?l=bugtraq&m=93214475111651&w=2 http://www.securityfocus.com/bid/528 •
CVE-1999-0929
https://notcve.org/view.php?id=CVE-1999-0929
Novell NetWare with Novell-HTTP-Server or YAWN web servers allows remote attackers to conduct a denial of service via a large number of HTTP GET requests. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0929 •
CVE-1999-0470 – Novell Netware 4.1/4.11 - SP5B Remote.NLM Weak Encryption
https://notcve.org/view.php?id=CVE-1999-0470
A weak encryption algorithm is used for passwords in Novell Remote.NLM, allowing them to be easily decrypted. • https://www.exploit-db.com/exploits/19364 http://www.securityfocus.com/bid/482 •
CVE-1999-1020 – Novell Netware 4.1/4.11 - SP5B NDS Default Rights
https://notcve.org/view.php?id=CVE-1999-1020
The installation of Novell Netware NDS 5.99 provides an unauthenticated client with Read access for the tree, which allows remote attackers to access sensitive information such as users, groups, and readable objects via CX.EXE and NLIST.EXE. • https://www.exploit-db.com/exploits/19365 http://marc.info/?l=bugtraq&m=90613355902262&w=2 http://www.securityfocus.com/bid/484 https://exchange.xforce.ibmcloud.com/vulnerabilities/1364 •