Page 4 of 22 results (0.003 seconds)

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

Oracle Listener in Oracle 7.3 and 8i allows remote attackers to cause a denial of service via a malformed connection packet with a large offset_to_data value. • http://otn.oracle.com/deploy/security/pdf/net8_dos_alert.pdf http://xforce.iss.net/alerts/advise82.php •

CVSS: 10.0EPSS: 7%CPEs: 1EXPL: 2

Buffer overflow in Transparent Network Substrate (TNS) Listener in Oracle 8i 8.1.7 and earlier allows remote attackers to gain privileges via a long argument to the commands (1) STATUS, (2) PING, (3) SERVICES, (4) TRC_FILE, (5) SAVE_CONFIG, or (6) RELOAD. • https://www.exploit-db.com/exploits/16340 https://www.exploit-db.com/exploits/20980 http://www.cert.org/advisories/CA-2001-16.html http://www.kb.cert.org/vuls/id/620495 http://www.nai.com/research/covert/advisories/050.asp http://www.securityfocus.com/bid/2941 https://exchange.xforce.ibmcloud.com/vulnerabilities/6758 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 2

Buffer overflow in cmctl program in Oracle 8.1.5 Connection Manager Control allows local users to gain privileges via a long command line argument. • https://www.exploit-db.com/exploits/20411 http://marc.info/?l=bugtraq&m=97474521003453&w=2 http://www.securityfocus.com/bid/1968 https://exchange.xforce.ibmcloud.com/vulnerabilities/5551 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 1

Buffer overflow in Oracle 8.1.5 applications such as names, namesctl, onrsd, osslogin, tnslsnr, tnsping, trcasst, and trcroute possibly allow local users to gain privileges via a long ORACLE_HOME environmental variable. • http://archives.neohapsis.com/archives/bugtraq/2000-10/0294.html https://exchange.xforce.ibmcloud.com/vulnerabilities/5390 •

CVSS: 6.2EPSS: 0%CPEs: 1EXPL: 1

The installation of Oracle 8.1.5.x on Linux follows symlinks and creates the orainstRoot.sh file with world-writeable permissions, which allows local users to gain privileges. • https://www.exploit-db.com/exploits/19794 http://archives.neohapsis.com/archives/bugtraq/2000-03/0023.html http://www.securityfocus.com/bid/1035 •