CVE-2006-0997
https://notcve.org/view.php?id=CVE-2006-0997
The SSL server implementation in NILE.NLM in Novell NetWare 6.5 and Novell Open Enterprise Server (OES) permits encryption with a NULL key, which results in cleartext communication that allows remote attackers to read an SSL protected session by sniffing network traffic. • http://secunia.com/advisories/19324 http://securitytracker.com/id?1015799 http://support.novell.com/cgi-bin/search/searchtid.cgi?10100633.htm http://www.osvdb.org/24046 http://www.securityfocus.com/bid/17176 http://www.vupen.com/english/advisories/2006/1043 https://exchange.xforce.ibmcloud.com/vulnerabilities/25380 •
CVE-2006-1322
https://notcve.org/view.php?id=CVE-2006-1322
Novell Netware NWFTPD 5.06.05 allows remote attackers to cause a denial of service (ABEND) via an MDTM command that uses a long path for the target file, possibly due to a buffer overflow. • http://secunia.com/advisories/19265 http://securitytracker.com/id?1015781 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2973435.htm http://www.osvdb.org/23949 http://www.securityfocus.com/bid/17137 http://www.vupen.com/english/advisories/2006/0975 https://exchange.xforce.ibmcloud.com/vulnerabilities/25289 •
CVE-2005-2852 – Novell NetWare - LSASS CIFS.NLM Driver Stack Buffer Overflow
https://notcve.org/view.php?id=CVE-2005-2852
Unknown vulnerability in CIFS.NLM in Novell Netware 6.5 SP2 and SP3, 5.1, and 6.0 allows remote attackers to cause a denial of service (ABEND) via an incorrect password length, as exploited by the "worm.rbot.ccc" worm. • https://www.exploit-db.com/exploits/16832 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971821.htm http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971822.htm http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971832.htm •
CVE-2005-1060
https://notcve.org/view.php?id=CVE-2005-1060
Unknown vulnerability in the TCP/IP functionality (TCPIP.NLM) in Novell Netware 6.x allows remote attackers to cause a denial of service (ABEND by Page Fault Processor Exception) via certain packets. • http://secunia.com/advisories/14874 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2970467.htm http://www.securityfocus.com/bid/13067 https://exchange.xforce.ibmcloud.com/vulnerabilities/20024 •
CVE-2005-0819
https://notcve.org/view.php?id=CVE-2005-0819
The xvesa code in Novell Netware 6.5 SP2 and SP3 allows remote attackers to redirect the xsession without authentication via a direct request to GUIMirror/Start. • http://securitytracker.com/id?1013460 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971038.htm http://www.securityfocus.com/bid/12831 •