CVE-2001-0498
https://notcve.org/view.php?id=CVE-2001-0498
Transparent Network Substrate (TNS) over Net8 (SQLNet) in Oracle 8i 8.1.7 and earlier allows remote attackers to cause a denial of service via a malformed SQLNet connection request with a large offset in the header extension. • http://www.nai.com/research/covert/advisories/049.asp •
CVE-2001-0515
https://notcve.org/view.php?id=CVE-2001-0515
Oracle Listener in Oracle 7.3 and 8i allows remote attackers to cause a denial of service via a malformed connection packet with a large offset_to_data value. • http://otn.oracle.com/deploy/security/pdf/net8_dos_alert.pdf http://xforce.iss.net/alerts/advise82.php •
CVE-2001-0499 – Oracle 8i - TNS Listener 'ARGUMENTS' Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2001-0499
Buffer overflow in Transparent Network Substrate (TNS) Listener in Oracle 8i 8.1.7 and earlier allows remote attackers to gain privileges via a long argument to the commands (1) STATUS, (2) PING, (3) SERVICES, (4) TRC_FILE, (5) SAVE_CONFIG, or (6) RELOAD. • https://www.exploit-db.com/exploits/16340 https://www.exploit-db.com/exploits/20980 http://www.cert.org/advisories/CA-2001-16.html http://www.kb.cert.org/vuls/id/620495 http://www.nai.com/research/covert/advisories/050.asp http://www.securityfocus.com/bid/2941 https://exchange.xforce.ibmcloud.com/vulnerabilities/6758 •
CVE-2001-0326
https://notcve.org/view.php?id=CVE-2001-0326
Oracle Java Virtual Machine (JVM ) for Oracle 8.1.7 and Oracle Application Server 9iAS Release 1.0.2.0.1 allows remote attackers to read arbitrary files via the .jsp and .sqljsp file extensions when the server is configured to use the <<ALL FILES>> FilePermission. • http://archives.neohapsis.com/archives/bugtraq/2001-02/0255.html http://www.osvdb.org/5706 https://exchange.xforce.ibmcloud.com/vulnerabilities/6438 •
CVE-2001-0126
https://notcve.org/view.php?id=CVE-2001-0126
Oracle XSQL servlet 1.0.3.0 and earlier allows remote attackers to execute arbitrary Java code by redirecting the XSQL server to another source via the xml-stylesheet parameter in the xslt stylesheet. • http://marc.info/?l=bugtraq&m=97906670012796&w=2 http://marc.info/?l=bugtraq&m=98027700625521&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/5905 •