CVE-2001-0515
https://notcve.org/view.php?id=CVE-2001-0515
Oracle Listener in Oracle 7.3 and 8i allows remote attackers to cause a denial of service via a malformed connection packet with a large offset_to_data value. • http://otn.oracle.com/deploy/security/pdf/net8_dos_alert.pdf http://xforce.iss.net/alerts/advise82.php •
CVE-2001-0499 – Oracle 8i - TNS Listener 'ARGUMENTS' Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2001-0499
Buffer overflow in Transparent Network Substrate (TNS) Listener in Oracle 8i 8.1.7 and earlier allows remote attackers to gain privileges via a long argument to the commands (1) STATUS, (2) PING, (3) SERVICES, (4) TRC_FILE, (5) SAVE_CONFIG, or (6) RELOAD. • https://www.exploit-db.com/exploits/16340 https://www.exploit-db.com/exploits/20980 http://www.cert.org/advisories/CA-2001-16.html http://www.kb.cert.org/vuls/id/620495 http://www.nai.com/research/covert/advisories/050.asp http://www.securityfocus.com/bid/2941 https://exchange.xforce.ibmcloud.com/vulnerabilities/6758 •
CVE-2000-1180 – Oracle 8.x - cmctl Buffer Overflow
https://notcve.org/view.php?id=CVE-2000-1180
Buffer overflow in cmctl program in Oracle 8.1.5 Connection Manager Control allows local users to gain privileges via a long command line argument. • https://www.exploit-db.com/exploits/20411 http://marc.info/?l=bugtraq&m=97474521003453&w=2 http://www.securityfocus.com/bid/1968 https://exchange.xforce.ibmcloud.com/vulnerabilities/5551 •
CVE-2000-0986
https://notcve.org/view.php?id=CVE-2000-0986
Buffer overflow in Oracle 8.1.5 applications such as names, namesctl, onrsd, osslogin, tnslsnr, tnsping, trcasst, and trcroute possibly allow local users to gain privileges via a long ORACLE_HOME environmental variable. • http://archives.neohapsis.com/archives/bugtraq/2000-10/0294.html https://exchange.xforce.ibmcloud.com/vulnerabilities/5390 •
CVE-2000-0206 – Oracle8i Standard Edition 8.1.5 for Linux Installer - Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2000-0206
The installation of Oracle 8.1.5.x on Linux follows symlinks and creates the orainstRoot.sh file with world-writeable permissions, which allows local users to gain privileges. • https://www.exploit-db.com/exploits/19794 http://archives.neohapsis.com/archives/bugtraq/2000-03/0023.html http://www.securityfocus.com/bid/1035 •