Page 5 of 29 results (0.007 seconds)

CVSS: 7.5EPSS: 1%CPEs: 29EXPL: 0

Stack-based buffer overflow in the PL/SQL EXTPROC functionality for Oracle9i Database Release 2 and 1, and Oracle 8i, allows authenticated database users, and arbitrary database users in some cases, to execute arbitrary code via a long library name. Desbordamiento de búfer basado en la pila en EXTPROC de Oracle 9i Database Release 2 y 1, y Oracle 8i, permite a usuarios autenticados de la base de datos, posiblemente sólo aquellos con privilegios CREATE LIBRARY o CREATE ANY LIBRARY, ejecutar código arbitrario mediante un nombre de librería largo. • http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0105.html http://marc.info/?l=bugtraq&m=105914979629857&w=2 http://marc.info/?l=bugtraq&m=105916455814904&w=2 http://marc.info/?l=ntbugtraq&m=105915485303327&w=2 http://otn.oracle.com/deploy/security/pdf/2003alert57.pdf http://www.kb.cert.org/vuls/id/936868 http://www.securityfocus.com/bid/8267 https://exchange.xforce.ibmcloud.com/vulnerabilities/12721 •

CVSS: 9.0EPSS: 30%CPEs: 31EXPL: 0

Stack-based buffer overflow in Oracle Net Services for Oracle Database Server 9i release 2 and earlier allows attackers to execute arbitrary code via a "CREATE DATABASE LINK" query containing a connect string with a long USING parameter. Desbordamiento de búfer basado en la pila en Oracle Net Sevices de Oracle Database Server 9i release 2 y anteriores permite a atacantes ejecutar código arbitrario mediante una consulta "CREATE DATABASE LINK" conteniendo una cadena de conexión con un parámetro USING largo. • http://marc.info/?l=bugtraq&m=105162831008176&w=2 http://marc.info/?l=ntbugtraq&m=105163376015735&w=2 http://otn.oracle.com/deploy/security/pdf/2003alert54.pdf http://www.ciac.org/ciac/bulletins/n-085.shtml http://www.securityfocus.com/bid/7453 https://exchange.xforce.ibmcloud.com/vulnerabilities/11885 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 67%CPEs: 10EXPL: 0

Buffer overflow in ORACLE.EXE for Oracle Database Server 9i, 8i, 8.1.7, and 8.0.6 allows remote attackers to execute arbitrary code via a long username that is provided during login, as exploitable through client applications that perform their own authentication, as demonstrated using LOADPSP. • http://marc.info/?l=bugtraq&m=104549693426042&w=2 http://otn.oracle.com/deploy/security/pdf/2003alert51.pdf http://www.cert.org/advisories/CA-2003-05.html http://www.ciac.org/ciac/bulletins/n-046.shtml http://www.iss.net/security_center/static/11328.php http://www.kb.cert.org/vuls/id/953746 http://www.osvdb.org/6319 http://www.securityfocus.com/bid/6849 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.0EPSS: 2%CPEs: 10EXPL: 0

Multiple buffer overflows in Oracle 9i Database release 2, Release 1, 8i, 8.1.7, and 8.0.6 allow remote attackers to execute arbitrary code via (1) a long conversion string argument to the TO_TIMESTAMP_TZ function, (2) a long time zone argument to the TZ_OFFSET function, or (3) a long DIRECTORY parameter to the BFILENAME function. • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0073.html http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0075.html http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0083.html http://marc.info/?l=bugtraq&m=104549743326864&w=2 http://marc.info/?l=bugtraq&m=104549782327321&w=2 http://marc.info/?l=bugtraq&m=104550346303295&w=2 http://otn.oracle.com/deploy/security/pdf/2003alert48.pdf http://otn.oracle.com/deploy/security/pdf/2003alert49.pdf http:/&#x • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 49%CPEs: 7EXPL: 0

Buffer overflow in Oracle iSQL*Plus web application of the Oracle 9 database server allows remote attackers to execute arbitrary code via a long USERID parameter in the isqlplus URL. Desbordamiento de búfer en la aplicación web Oracle iSQL*Plus del servidor de bases de datos Oracle 9 permite a atacantes remotos ejecutar código arbitrario mediante un parámetro de ID de usuario largo en la URL isqlplus • http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0060.html http://marc.info/?l=bugtraq&m=103643298712284&w=2 http://technet.oracle.com/deploy/security/pdf/2002alert46rev1.pdf http://www.iss.net/security_center/static/10524.php http://www.osvdb.org/4013 http://www.securityfocus.com/bid/6085 •