Page 5 of 51 results (0.005 seconds)

CVSS: 9.1EPSS: 2%CPEs: 87EXPL: 0

04 Aug 2004 — The PL/SQL module for the Oracle HTTP Server in Oracle Application Server 10g, when using the WE8ISO8859P1 character set, does not perform character conversions properly, which allows remote attackers to bypass access restrictions for certain procedures via an encoded URL with "%FF" encoded sequences that are improperly converted to "Y" characters. • http://marc.info/?l=bugtraq&m=110382306006205&w=2 •

CVSS: 9.8EPSS: 20%CPEs: 70EXPL: 2

30 Jul 2004 — The (1) dbsnmp and (2) nmo programs in Oracle 8i, Oracle 9i, and Oracle IAS 9.0.2.0.1, on Unix systems, use a default path to find and execute library files while operating at raised privileges, which allows certain Oracle user accounts to gain root privileges via a modified libclntsh.so.9.0. • https://www.exploit-db.com/exploits/24335 •

CVSS: 9.1EPSS: 0%CPEs: 15EXPL: 0

30 Mar 2004 — The p_submit_url value in the sample login form in the Oracle 9i Application Server (9iAS) Single Sign-on Administrators Guide, Release 2(9.0.2) for Oracle SSO allows remote attackers to spoof the login page, which could allow users to inadvertently reveal their username and password. • http://marc.info/?l=bugtraq&m=108067040722235&w=2 •

CVSS: 5.5EPSS: 3%CPEs: 7EXPL: 3

28 Jan 2004 — Oracle toplink mapping workBench uses a weak encryption algorithm for passwords, which allows local users to decrypt the passwords. • https://www.exploit-db.com/exploits/23611 •

CVSS: 9.8EPSS: 0%CPEs: 10EXPL: 0

03 Nov 2003 — Multiple SQL injection vulnerabilities in the Portal DB (1) List of Values (LOVs), (2) Forms, (3) Hierarchy, and (4) XML components packages in Oracle Oracle9i Application Server 9.0.2.00 through 3.0.9.8.5 allow remote attackers to execute arbitrary SQL commands via the URL. • http://otn.oracle.com/deploy/security/pdf/2003alert61.pdf •

CVSS: 7.5EPSS: 4%CPEs: 5EXPL: 1

31 Dec 2002 — The sendmail.jsp sample page in Oracle 9i Application Server (9iAS) allows remote attackers to send arbitrary emails. • http://www.kb.cert.org/vuls/id/717827 •

CVSS: 5.3EPSS: 0%CPEs: 4EXPL: 0

31 Dec 2002 — Oracle Oracle9i Application Server 1.0.2.2 and 9.0.2 through 9.0.2.0.1, when running on Windows, allows remote attackers to retrieve files in the WEB-INF directory, which contains Java class files and configuration information, via a request to the WEB-INF directory with a trailing dot ("WEB-INF."). • http://online.securityfocus.com/archive/1/279582 •

CVSS: 7.5EPSS: 1%CPEs: 5EXPL: 0

31 Dec 2002 — Oracle 9i Application Server (9iAS) installs multiple sample pages that allow remote attackers to obtain environment variables and other sensitive information via (1) info.jsp, (2) printenv, (3) echo, or (4) echo2. • http://www.kb.cert.org/vuls/id/717827 •

CVSS: 9.8EPSS: 5%CPEs: 5EXPL: 1

31 Dec 2002 — SQL injection vulnerability in the query.xsql sample page in Oracle 9i Application Server (9iAS) allows remote attackers to execute arbitrary code via the sql parameter. • http://www.kb.cert.org/vuls/id/717827 •

CVSS: 6.8EPSS: 92%CPEs: 47EXPL: 1

11 Oct 2002 — Cross-site scripting (XSS) vulnerability in the default error page of Apache 2.0 before 2.0.43, and 1.3.x up to 1.3.26, when UseCanonicalName is "Off" and support for wildcard DNS is present, allows remote attackers to execute script as other web page visitors via the Host: header, a different vulnerability than CAN-2002-1157. Vulnerabilidad de comandos en sitios cruzados (cross-site scripting, XSS) en la página de error por defecto en Apache 2.0 antes de 2.0.43, y en 1.3.x hasta 1.3.26, cuando el parámetro... • https://www.exploit-db.com/exploits/21885 •