Page 6 of 32 results (0.003 seconds)

CVSS: 2.1EPSS: 93%CPEs: 5EXPL: 0

Oracle 9i Application Server stores XSQL and SOAP configuration files insecurely, which allows local users to obtain sensitive information including usernames and passwords by requesting (1) XSQLConfig.xml or (2) soapConfig.xml through a virtual directory. • http://marc.info/?l=bugtraq&m=101301813117562&w=2 http://www.cert.org/advisories/CA-2002-08.html http://www.kb.cert.org/vuls/id/476619 http://www.nextgenss.com/papers/hpoas.pdf http://www.securityfocus.com/bid/4290 •

CVSS: 7.5EPSS: 85%CPEs: 9EXPL: 0

The default configuration of the PL/SQL Gateway web administration interface in Oracle 9i Application Server 1.0.2.x uses null authentication, which allows remote attackers to gain privileges and modify DAD settings. • http://marc.info/?l=bugtraq&m=101301813117562&w=2 http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf http://www.cert.org/advisories/CA-2002-08.html http://www.kb.cert.org/vuls/id/611776 http://www.nextgenss.com/papers/hpoas.pdf http://www.securityfocus.com/bid/4292 •

CVSS: 5.0EPSS: 2%CPEs: 2EXPL: 0

Oracle listener in Oracle 8i on Solaris allows remote attackers to cause a denial of service via a malformed connection packet with a maximum transport data size that is set to 0. • http://otn.oracle.com/deploy/security/pdf/net8_dos_alert.pdf http://www.osvdb.org/5590 http://xforce.iss.net/alerts/advise82.php https://exchange.xforce.ibmcloud.com/vulnerabilities/6715 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Transparent Network Substrate (TNS) over Net8 (SQLNet) in Oracle 8i 8.1.7 and earlier allows remote attackers to cause a denial of service via a malformed SQLNet connection request with a large offset in the header extension. • http://www.nai.com/research/covert/advisories/049.asp •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

Oracle Listener in Oracle 7.3 and 8i allows remote attackers to cause a denial of service via a malformed connection packet with a large offset_to_data value. • http://otn.oracle.com/deploy/security/pdf/net8_dos_alert.pdf http://xforce.iss.net/alerts/advise82.php •