2 results (0.013 seconds)

CVSS: 9.0EPSS: 0%CPEs: 8EXPL: 0

Unspecified vulnerability in the Oracle Secure Enterprise Search or Ultrasearch component in Oracle Database 9.0.1.5 FIPS+, 9.2.0.8, 9.2.0.8DV, 10.1.0.5, and 10.2.0.3; Application Server 9.0.4.3 and 10.1.2.2; and Oracle Collaboration Suite 10.1.2; has unknown impact and remote attack vectors, aka DB04. Vulnerabilidad sin especificar en el componente Oracle Secure Enterprise Search o Ultrasearch en Oracle Database 9.0.1.5 FIPS+, 9.2.0.8, 9.2.0.8DV, 10.1.0.5 y 10.2.0.3; Application Server 9.0.4.3 y 10.1.2.2 y Oracle Collaboration Suite 10.1.2; tiene impacto y vectores de ataque remotos desconocidos, también conocido como DB04. • http://secunia.com/advisories/29829 http://secunia.com/advisories/29874 http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html http://www.securityfocus.com/archive/1/491024/100/0/threaded http://www.securitytracker.com/id?1019855 http://www.vupen.com/english/advisories/2008/1233/references http://www.vupen.com/english/advisories/2008/1267/references https://exchange.xforce.ibmcloud.com/vulnerabilities/41858 https://exchange.xforce.ibmcloud.com/vulnerabilities/41997 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 3

Progress Database 9.1 to 9.1D06 trusts user input to find and load libraries using dlopen, which allows local users to gain privileges via (1) a PATH environment variable that points to malicious libraries, as demonstrated using libjutil.so in_proapsv, or (2) the -installdir command line parameter, as demonstrated using librocket_r.so in _dbagent. Progress Database 9.1 a 9.1D06 se confia en la entrada del usuario para cargar librerias usando dlopen, lo que permite a usarios locales ganar privilegios mediante una variable de entorno PATH que apunta a las librerías maliciosas, como ha sido demostrado usando libjutil.so en _proapsv, o el parámetro de línea de comandos -installdir, como ha sido demostrado usando librocket_r.so en _dbagent. • https://www.exploit-db.com/exploits/22773 http://marc.info/?l=bugtraq&m=105561134624665&w=2 http://marc.info/?l=bugtraq&m=105561189625082&w=2 http://www.secnetops.com/research/advisories/SRT2003-06-13-0945.txt http://www.secnetops.com/research/advisories/SRT2003-06-13-1009.txt •