CVE-2000-1180 – Oracle 8.x - cmctl Buffer Overflow
https://notcve.org/view.php?id=CVE-2000-1180
Buffer overflow in cmctl program in Oracle 8.1.5 Connection Manager Control allows local users to gain privileges via a long command line argument. • https://www.exploit-db.com/exploits/20411 http://marc.info/?l=bugtraq&m=97474521003453&w=2 http://www.securityfocus.com/bid/1968 https://exchange.xforce.ibmcloud.com/vulnerabilities/5551 •
CVE-2000-0987 – Oracle (oidldapd connect) - Local Command Line Overflow
https://notcve.org/view.php?id=CVE-2000-0987
Buffer overflow in oidldapd in Oracle 8.1.6 allow local users to gain privileges via a long "connect" command line parameter. • https://www.exploit-db.com/exploits/183 https://www.exploit-db.com/exploits/20312 http://www.securityfocus.com/archive/1/140340 http://www.securityfocus.com/archive/1/140709 https://exchange.xforce.ibmcloud.com/vulnerabilities/5401 •
CVE-2000-0986
https://notcve.org/view.php?id=CVE-2000-0986
Buffer overflow in Oracle 8.1.5 applications such as names, namesctl, onrsd, osslogin, tnslsnr, tnsping, trcasst, and trcroute possibly allow local users to gain privileges via a long ORACLE_HOME environmental variable. • http://archives.neohapsis.com/archives/bugtraq/2000-10/0294.html https://exchange.xforce.ibmcloud.com/vulnerabilities/5390 •
CVE-2000-0206 – Oracle8i Standard Edition 8.1.5 for Linux Installer - Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2000-0206
The installation of Oracle 8.1.5.x on Linux follows symlinks and creates the orainstRoot.sh file with world-writeable permissions, which allows local users to gain privileges. • https://www.exploit-db.com/exploits/19794 http://archives.neohapsis.com/archives/bugtraq/2000-03/0023.html http://www.securityfocus.com/bid/1035 •
CVE-1999-0888 – Oracle 8 8.1.5 - Intelligent Agent
https://notcve.org/view.php?id=CVE-1999-0888
dbsnmp in Oracle Intelligent Agent allows local users to gain privileges by setting the ORACLE_HOME environmental variable, which dbsnmp uses to find the nmiconf.tcl script. • https://www.exploit-db.com/exploits/19460 https://www.exploit-db.com/exploits/19461 http://www.securityfocus.com/bid/585 •