CVE-2001-0515
https://notcve.org/view.php?id=CVE-2001-0515
Oracle Listener in Oracle 7.3 and 8i allows remote attackers to cause a denial of service via a malformed connection packet with a large offset_to_data value. • http://otn.oracle.com/deploy/security/pdf/net8_dos_alert.pdf http://xforce.iss.net/alerts/advise82.php •
CVE-2001-0499 – Oracle 8i - TNS Listener 'ARGUMENTS' Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2001-0499
Buffer overflow in Transparent Network Substrate (TNS) Listener in Oracle 8i 8.1.7 and earlier allows remote attackers to gain privileges via a long argument to the commands (1) STATUS, (2) PING, (3) SERVICES, (4) TRC_FILE, (5) SAVE_CONFIG, or (6) RELOAD. • https://www.exploit-db.com/exploits/16340 https://www.exploit-db.com/exploits/20980 http://www.cert.org/advisories/CA-2001-16.html http://www.kb.cert.org/vuls/id/620495 http://www.nai.com/research/covert/advisories/050.asp http://www.securityfocus.com/bid/2941 https://exchange.xforce.ibmcloud.com/vulnerabilities/6758 •
CVE-2001-0516
https://notcve.org/view.php?id=CVE-2001-0516
Oracle listener between Oracle 9i and Oracle 8.0 allows remote attackers to cause a denial of service via a malformed connection packet that contains an incorrect requester_version value that does not match an expected offset to the data. • http://otn.oracle.com/deploy/security/pdf/net8_dos_alert.pdf http://xforce.iss.net/alerts/advise82.php •
CVE-2001-0326
https://notcve.org/view.php?id=CVE-2001-0326
Oracle Java Virtual Machine (JVM ) for Oracle 8.1.7 and Oracle Application Server 9iAS Release 1.0.2.0.1 allows remote attackers to read arbitrary files via the .jsp and .sqljsp file extensions when the server is configured to use the <<ALL FILES>> FilePermission. • http://archives.neohapsis.com/archives/bugtraq/2001-02/0255.html http://www.osvdb.org/5706 https://exchange.xforce.ibmcloud.com/vulnerabilities/6438 •
CVE-2001-0126
https://notcve.org/view.php?id=CVE-2001-0126
Oracle XSQL servlet 1.0.3.0 and earlier allows remote attackers to execute arbitrary Java code by redirecting the XSQL server to another source via the xml-stylesheet parameter in the xslt stylesheet. • http://marc.info/?l=bugtraq&m=97906670012796&w=2 http://marc.info/?l=bugtraq&m=98027700625521&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/5905 •