Page 6 of 36 results (0.007 seconds)

CVSS: 5.0EPSS: 85%CPEs: 9EXPL: 0

PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allows remote attackers to obtain sensitive information via the OWA_UTIL stored procedures (1) OWA_UTIL.signature, (2) OWA_UTIL.listprint, or (3) OWA_UTIL.show_query_columns. • http://marc.info/?l=bugtraq&m=101301813117562&w=2 http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf http://www.cert.org/advisories/CA-2002-08.html http://www.kb.cert.org/vuls/id/307835 http://www.nextgenss.com/papers/hpoas.pdf http://www.securityfocus.com/bid/4294 •

CVSS: 5.0EPSS: 78%CPEs: 7EXPL: 0

The default configuration of Oracle 9i Application Server 1.0.2.x running Oracle JSP or SQLJSP stores globals.jsa under the web root, which allows remote attackers to gain sensitive information including usernames and passwords via a direct HTTP request to globals.jsa. • http://marc.info/?l=bugtraq&m=101301440005580&w=2 http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf http://www.cert.org/advisories/CA-2002-08.html http://www.kb.cert.org/vuls/id/698467 http://www.securityfocus.com/bid/4034 •

CVSS: 2.1EPSS: 93%CPEs: 5EXPL: 0

Oracle 9i Application Server stores XSQL and SOAP configuration files insecurely, which allows local users to obtain sensitive information including usernames and passwords by requesting (1) XSQLConfig.xml or (2) soapConfig.xml through a virtual directory. • http://marc.info/?l=bugtraq&m=101301813117562&w=2 http://www.cert.org/advisories/CA-2002-08.html http://www.kb.cert.org/vuls/id/476619 http://www.nextgenss.com/papers/hpoas.pdf http://www.securityfocus.com/bid/4290 •

CVSS: 7.5EPSS: 85%CPEs: 9EXPL: 0

The default configuration of the PL/SQL Gateway web administration interface in Oracle 9i Application Server 1.0.2.x uses null authentication, which allows remote attackers to gain privileges and modify DAD settings. • http://marc.info/?l=bugtraq&m=101301813117562&w=2 http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf http://www.cert.org/advisories/CA-2002-08.html http://www.kb.cert.org/vuls/id/611776 http://www.nextgenss.com/papers/hpoas.pdf http://www.securityfocus.com/bid/4292 •

CVSS: 5.0EPSS: 8%CPEs: 1EXPL: 1

Oracle 9i Application Server 1.0.2 allows remote attackers to obtain the physical path of a file under the server root via a request for a non-existent .JSP file, which leaks the pathname in an error message. • http://marc.info/?l=bugtraq&m=100074087824021&w=2 http://marc.info/?l=bugtraq&m=100119633925473&w=2 http://otn.oracle.com/deploy/security/pdf/jspexecute_alert.pdf http://www.cert.org/advisories/CA-2002-08.html http://www.kb.cert.org/vuls/id/278971 http://www.nii.co.in/research.html http://www.securityfocus.com/bid/3341 https://exchange.xforce.ibmcloud.com/vulnerabilities/7135 •