Page 68 of 383 results (0.012 seconds)

CVSS: 10.0EPSS: 14%CPEs: 5EXPL: 0

Heap-based buffer overflow in Oracle 9i Application Server Web Cache 9.0.4.0.0, 9.0.3.1.0, 9.0.2.3.0, and 9.0.0.4.0 allows remote attackers to execute arbitrary code via a long HTTP request method header to the Web Cache listener. NOTE: due to the vagueness of the Oracle advisory, it is not clear whether there are additional issues besides this overflow, although the advisory alludes to multiple "vulnerabilities." • http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0078.html http://marc.info/?l=bugtraq&m=107945649127635&w=2 http://marc.info/?l=bugtraq&m=108144419001770&w=2 http://otn.oracle.com/deploy/security/pdf/2004alert66.pdf http://secunia.com/advisories/11118 http://www.inaccessnetworks.com/ian/services/secadv01.txt http://www.kb.cert.org/vuls/id/413006 http://www.osvdb.org/4249 http://www.securityfocus.com/bid/9868 https://exchange.xforce.ibmcloud.com/vulnerabilities& •

CVSS: 2.6EPSS: 1%CPEs: 15EXPL: 0

The p_submit_url value in the sample login form in the Oracle 9i Application Server (9iAS) Single Sign-on Administrators Guide, Release 2(9.0.2) for Oracle SSO allows remote attackers to spoof the login page, which could allow users to inadvertently reveal their username and password. • http://marc.info/?l=bugtraq&m=108067040722235&w=2 http://www.securityfocus.com/bid/10009 https://exchange.xforce.ibmcloud.com/vulnerabilities/15676 •

CVSS: 4.6EPSS: 0%CPEs: 7EXPL: 3

Oracle toplink mapping workBench uses a weak encryption algorithm for passwords, which allows local users to decrypt the passwords. • https://www.exploit-db.com/exploits/23611 http://marc.info/?l=bugtraq&m=107531028325112&w=2 http://www.planet-source-code.com/vb/scripts/ShowCode.asp?txtCodeId=803&lngWId=5 http://www.securityfocus.com/archive/1/352315/30/21430/threaded http://www.securityfocus.com/archive/82/351719 http://www.securityfocus.com/bid/9515 •

CVSS: 7.5EPSS: 0%CPEs: 10EXPL: 0

Multiple SQL injection vulnerabilities in the Portal DB (1) List of Values (LOVs), (2) Forms, (3) Hierarchy, and (4) XML components packages in Oracle Oracle9i Application Server 9.0.2.00 through 3.0.9.8.5 allow remote attackers to execute arbitrary SQL commands via the URL. • http://otn.oracle.com/deploy/security/pdf/2003alert61.pdf http://www.securityfocus.com/archive/1/343520 http://www.securityfocus.com/bid/8966 https://exchange.xforce.ibmcloud.com/vulnerabilities/13593 •

CVSS: 7.5EPSS: 4%CPEs: 3EXPL: 3

Sun ONE Application Server 7.0 for Windows 2000/XP allows remote attackers to obtain JSP source code via a request that uses the uppercase ".JSP" extension instead of the lowercase .jsp extension. Sun ONE Application Server 7.0 para Windows 2000/XP permite atacantes remotos obtener código fuente JSP mediante una petición que usa la extensíon ".JSP", con letras mayúsculas, en lugar de ".jsp", en minúsculas. • https://www.exploit-db.com/exploits/22664 http://marc.info/?l=bugtraq&m=105409846029475&w=2 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F55221&zone_32=category%3Asecurity http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000610.1-1 http://www.ciac.org/ciac/bulletins/n-103.shtml http://www.iss.net/security_center/static/12093.php http://www.securityfocus.com/bid/7709 http://www.spidynamics.com/sunone_alert.html • CWE-178: Improper Handling of Case Sensitivity •