CVE-1999-1086
https://notcve.org/view.php?id=CVE-1999-1086
Novell 5 and earlier, when running over IPX with a packet signature level less than 3, allows remote attackers to gain administrator privileges by spoofing the MAC address in IPC fragmented packets that make NetWare Core Protocol (NCP) calls. • http://marc.info/?l=bugtraq&m=93214475111651&w=2 http://www.securityfocus.com/bid/528 •
CVE-1999-0929
https://notcve.org/view.php?id=CVE-1999-0929
Novell NetWare with Novell-HTTP-Server or YAWN web servers allows remote attackers to conduct a denial of service via a large number of HTTP GET requests. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0929 •
CVE-1999-1020 – Novell Netware 4.1/4.11 - SP5B NDS Default Rights
https://notcve.org/view.php?id=CVE-1999-1020
The installation of Novell Netware NDS 5.99 provides an unauthenticated client with Read access for the tree, which allows remote attackers to access sensitive information such as users, groups, and readable objects via CX.EXE and NLIST.EXE. • https://www.exploit-db.com/exploits/19365 http://marc.info/?l=bugtraq&m=90613355902262&w=2 http://www.securityfocus.com/bid/484 https://exchange.xforce.ibmcloud.com/vulnerabilities/1364 •
CVE-1999-1215
https://notcve.org/view.php?id=CVE-1999-1215
LOGIN.EXE program in Novell Netware 4.0 and 4.01 temporarily writes user name and password information to disk, which could allow local users to gain privileges. • http://ciac.llnl.gov/ciac/bulletins/d-21.shtml http://www.cert.org/advisories/CA-1993-12.html https://exchange.xforce.ibmcloud.com/vulnerabilities/545 •