
CVE-2002-0856
https://notcve.org/view.php?id=CVE-2002-0856
05 Sep 2002 — SQL*NET listener for Oracle Net Oracle9i 9.0.x and 9.2 allows remote attackers to cause a denial of service (crash) via certain debug requests that are not properly handled by the debugging feature. El servidor SQL*NET para Oracle 9i 9.0.x y 9.2 permite a atacantes remotos causar una denegación de sevicio (caída) mediante ciertas peticiones de depuración que no son adecuadamente manejadas por la característica de depuración • http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0072.html •

CVE-2002-0567
https://notcve.org/view.php?id=CVE-2002-0567
03 Jul 2002 — Oracle 8i and 9i with PL/SQL package for External Procedures (EXTPROC) allows remote attackers to bypass authentication and execute arbitrary functions by using the TNS Listener to directly connect to the EXTPROC process. • http://marc.info/?l=bugtraq&m=101301332402079&w=2 •

CVE-2002-0571
https://notcve.org/view.php?id=CVE-2002-0571
03 Jul 2002 — Oracle Oracle9i database server 9.0.1.x allows local users to access restricted data via a SQL query using ANSI outer join syntax. • http://archives.neohapsis.com/archives/bugtraq/2002-04/0175.html •

CVE-2002-0509
https://notcve.org/view.php?id=CVE-2002-0509
11 Jun 2002 — Transparent Network Substrate (TNS) Listener in Oracle 9i 9.0.1.1 allows remote attackers to cause a denial of service (CPU consumption) via a single malformed TCP packet to port 1521. Transparent Network Substrate (TNS) Listener en Oracle 9i 9.0.1.1 permite a atacantes remotos causar una denegación de servicio (saturáción de CPU) mediante un paquete TCP malformado al puerto 1521. • http://online.securityfocus.com/archive/1/264697 •

CVE-2002-0559
https://notcve.org/view.php?id=CVE-2002-0559
11 Jun 2002 — Buffer overflows in PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allow remote attackers to cause a denial of service or execute arbitrary code via (1) a long help page request without a dadname, which overflows the resulting HTTP Location header, (2) a long HTTP request to the plsql module, (3) a long password in the HTTP Authorization, (4) a long Access Descriptor (DAD) password in the addadd form, or (5) a long cache directory name. • http://online.securityfocus.com/archive/1/254426 •

CVE-2002-0560
https://notcve.org/view.php?id=CVE-2002-0560
11 Jun 2002 — PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allows remote attackers to obtain sensitive information via the OWA_UTIL stored procedures (1) OWA_UTIL.signature, (2) OWA_UTIL.listprint, or (3) OWA_UTIL.show_query_columns. • http://marc.info/?l=bugtraq&m=101301813117562&w=2 •

CVE-2002-0561
https://notcve.org/view.php?id=CVE-2002-0561
11 Jun 2002 — The default configuration of the PL/SQL Gateway web administration interface in Oracle 9i Application Server 1.0.2.x uses null authentication, which allows remote attackers to gain privileges and modify DAD settings. • http://marc.info/?l=bugtraq&m=101301813117562&w=2 •

CVE-2002-0562
https://notcve.org/view.php?id=CVE-2002-0562
11 Jun 2002 — The default configuration of Oracle 9i Application Server 1.0.2.x running Oracle JSP or SQLJSP stores globals.jsa under the web root, which allows remote attackers to gain sensitive information including usernames and passwords via a direct HTTP request to globals.jsa. • http://marc.info/?l=bugtraq&m=101301440005580&w=2 •

CVE-2002-0563
https://notcve.org/view.php?id=CVE-2002-0563
11 Jun 2002 — The default configuration of Oracle 9i Application Server 1.0.2.x allows remote anonymous users to access sensitive services without authentication, including Dynamic Monitoring Services (1) dms0, (2) dms/DMSDump, (3) servlet/DMSDump, (4) servlet/Spy, (5) soap/servlet/Spy, and (6) dms/AggreSpy; and Oracle Java Process Manager (7) oprocmgr-status and (8) oprocmgr-service, which can be used to control Java processes. • http://marc.info/?l=bugtraq&m=101301813117562&w=2 • CWE-287: Improper Authentication •

CVE-2002-0564
https://notcve.org/view.php?id=CVE-2002-0564
11 Jun 2002 — PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allows remote attackers to bypass authentication for a Database Access Descriptor (DAD) by modifying the URL to reference an alternate DAD that already has valid credentials. • http://marc.info/?l=bugtraq&m=101301813117562&w=2 •