Page 6 of 52 results (0.005 seconds)

CVSS: 7.5EPSS: 0%CPEs: 10EXPL: 0

Multiple SQL injection vulnerabilities in the Portal DB (1) List of Values (LOVs), (2) Forms, (3) Hierarchy, and (4) XML components packages in Oracle Oracle9i Application Server 9.0.2.00 through 3.0.9.8.5 allow remote attackers to execute arbitrary SQL commands via the URL. • http://otn.oracle.com/deploy/security/pdf/2003alert61.pdf http://www.securityfocus.com/archive/1/343520 http://www.securityfocus.com/bid/8966 https://exchange.xforce.ibmcloud.com/vulnerabilities/13593 •

CVSS: 4.6EPSS: 0%CPEs: 11EXPL: 0

Buffer overflow in the (1) oracle and (2) oracleO programs in Oracle 9i Database 9.0.x and 9.2.x before 9.2.0.4 allows local users to execute arbitrary code via a long command line argument. Desbordamiento de búfer en oracle y oracleO en Oracle 9i Database 9.0.x y 9.2.x anteriores a 9.2.0.4 permite a usuarios locales ejecutar código arbitrario mediante un argumento de línea de comandos muy grande. • http://otn.oracle.com/deploy/security/pdf/2003alert59.pdf http://securitytracker.com/id?1007956 http://www.kb.cert.org/vuls/id/496340 http://www.securityfocus.com/bid/8844 http://www.securityfocus.com/bid/8845 https://exchange.xforce.ibmcloud.com/vulnerabilities/13451 •

CVSS: 7.5EPSS: 1%CPEs: 29EXPL: 0

Stack-based buffer overflow in the PL/SQL EXTPROC functionality for Oracle9i Database Release 2 and 1, and Oracle 8i, allows authenticated database users, and arbitrary database users in some cases, to execute arbitrary code via a long library name. Desbordamiento de búfer basado en la pila en EXTPROC de Oracle 9i Database Release 2 y 1, y Oracle 8i, permite a usuarios autenticados de la base de datos, posiblemente sólo aquellos con privilegios CREATE LIBRARY o CREATE ANY LIBRARY, ejecutar código arbitrario mediante un nombre de librería largo. • http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0105.html http://marc.info/?l=bugtraq&m=105914979629857&w=2 http://marc.info/?l=bugtraq&m=105916455814904&w=2 http://marc.info/?l=ntbugtraq&m=105915485303327&w=2 http://otn.oracle.com/deploy/security/pdf/2003alert57.pdf http://www.kb.cert.org/vuls/id/936868 http://www.securityfocus.com/bid/8267 https://exchange.xforce.ibmcloud.com/vulnerabilities/12721 •

CVSS: 9.0EPSS: 30%CPEs: 31EXPL: 0

Stack-based buffer overflow in Oracle Net Services for Oracle Database Server 9i release 2 and earlier allows attackers to execute arbitrary code via a "CREATE DATABASE LINK" query containing a connect string with a long USING parameter. Desbordamiento de búfer basado en la pila en Oracle Net Sevices de Oracle Database Server 9i release 2 y anteriores permite a atacantes ejecutar código arbitrario mediante una consulta "CREATE DATABASE LINK" conteniendo una cadena de conexión con un parámetro USING largo. • http://marc.info/?l=bugtraq&m=105162831008176&w=2 http://marc.info/?l=ntbugtraq&m=105163376015735&w=2 http://otn.oracle.com/deploy/security/pdf/2003alert54.pdf http://www.ciac.org/ciac/bulletins/n-085.shtml http://www.securityfocus.com/bid/7453 https://exchange.xforce.ibmcloud.com/vulnerabilities/11885 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 67%CPEs: 10EXPL: 0

Buffer overflow in ORACLE.EXE for Oracle Database Server 9i, 8i, 8.1.7, and 8.0.6 allows remote attackers to execute arbitrary code via a long username that is provided during login, as exploitable through client applications that perform their own authentication, as demonstrated using LOADPSP. • http://marc.info/?l=bugtraq&m=104549693426042&w=2 http://otn.oracle.com/deploy/security/pdf/2003alert51.pdf http://www.cert.org/advisories/CA-2003-05.html http://www.ciac.org/ciac/bulletins/n-046.shtml http://www.iss.net/security_center/static/11328.php http://www.kb.cert.org/vuls/id/953746 http://www.osvdb.org/6319 http://www.securityfocus.com/bid/6849 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •