Page 4 of 23 results (0.008 seconds)

CVSS: 9.0EPSS: 2%CPEs: 10EXPL: 0

Multiple buffer overflows in Oracle 9i Database release 2, Release 1, 8i, 8.1.7, and 8.0.6 allow remote attackers to execute arbitrary code via (1) a long conversion string argument to the TO_TIMESTAMP_TZ function, (2) a long time zone argument to the TZ_OFFSET function, or (3) a long DIRECTORY parameter to the BFILENAME function. • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0073.html http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0075.html http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0083.html http://marc.info/?l=bugtraq&m=104549743326864&w=2 http://marc.info/?l=bugtraq&m=104549782327321&w=2 http://marc.info/?l=bugtraq&m=104550346303295&w=2 http://otn.oracle.com/deploy/security/pdf/2003alert48.pdf http://otn.oracle.com/deploy/security/pdf/2003alert49.pdf http:/&#x • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

Format string vulnerabilities in Oracle Listener Control utility (lsnrctl) for Oracle 9.2 and 9.0, 8.1, and 7.3.4, allow remote attackers to execute arbitrary code on the Oracle DBA system by placing format strings into certain entries in the listener.ora configuration file. Vulnerabilidad de formato de cadenas en la utilidad Oracle Listener Control (lsnrctl) en Oracle 9.2, 9.0, 8.1 y 7.3.4 permite a atacantes remotos ejecutar código arbitrario el sitstema Oracle DBA mediante la introducción de cadenas de formato en ciertas entradas en fichero de configuración listener.ora • http://marc.info/?l=bugtraq&m=102933735716634&w=2 http://otn.oracle.com/deploy/security/pdf/2002alert40rev1.pdf http://securitytracker.com/id?1005037 http://www.kb.cert.org/vuls/id/301059 http://www.ngssoftware.com/advisories/ora-lsnrfmtstr.txt http://www.securityfocus.com/bid/5460 •

CVSS: 7.5EPSS: 3%CPEs: 27EXPL: 0

Oracle 8i and 9i with PL/SQL package for External Procedures (EXTPROC) allows remote attackers to bypass authentication and execute arbitrary functions by using the TNS Listener to directly connect to the EXTPROC process. • http://marc.info/?l=bugtraq&m=101301332402079&w=2 http://otn.oracle.com/deploy/security/pdf/plsextproc_alert.pdf http://www.cert.org/advisories/CA-2002-08.html http://www.kb.cert.org/vuls/id/180147 http://www.securityfocus.com/bid/4033 https://exchange.xforce.ibmcloud.com/vulnerabilities/8089 •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 1

Buffer overflow in otrcrep in Oracle 8.0.x through 9.0.1 allows local users to execute arbitrary code via a long ORACLE_HOME environment variable, aka the "Oracle Trace Collection Security Vulnerability." • https://www.exploit-db.com/exploits/21045 http://marc.info/?l=bugtraq&m=100386756715645&w=2 http://online.securityfocus.com/archive/1/201295 http://online.securityfocus.com/archive/1/222612 http://otn.oracle.com/deploy/security/pdf/otrcrep.pdf http://www.ciac.org/ciac/bulletins/m-011.shtml http://www.securityfocus.com/bid/3139 https://exchange.xforce.ibmcloud.com/vulnerabilities/6940 •

CVSS: 4.6EPSS: 0%CPEs: 4EXPL: 1

Buffer overflow in dbsnmp in Oracle 8.0.6 through 9.0.1 allows local users to execute arbitrary code via a long ORACLE_HOME environment variable. • https://www.exploit-db.com/exploits/21044 http://marc.info/?l=bugtraq&m=100716693806967&w=2 http://otn.oracle.com/deploy/security/pdf/dbsmp_alert.pdf http://www.securityfocus.com/bid/3138 https://exchange.xforce.ibmcloud.com/vulnerabilities/7643 •