
CVE-2005-1381 – Oracle Application Server 9i - Webcache Cache_dump_file Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2005-1381
02 May 2005 — Multiple cross-site scripting (XSS) vulnerabilities in Oracle Webcache 9i allow remote attackers to inject arbitrary web script or HTML via the (1) cache_dump_file or (2) PartialPageErrorPage parameter. • https://www.exploit-db.com/exploits/25562 •

CVE-2005-1382 – Oracle Application Server 9i Webcache - Arbitrary File Corruption
https://notcve.org/view.php?id=CVE-2005-1382
02 May 2005 — The webcacheadmin module in Oracle Webcache 9i allows remote attackers to corrupt arbitrary files via a full pathname in the cache_dump_file parameter. • https://www.exploit-db.com/exploits/25561 •

CVE-2004-0385
https://notcve.org/view.php?id=CVE-2004-0385
16 Apr 2004 — Heap-based buffer overflow in Oracle 9i Application Server Web Cache 9.0.4.0.0, 9.0.3.1.0, 9.0.2.3.0, and 9.0.0.4.0 allows remote attackers to execute arbitrary code via a long HTTP request method header to the Web Cache listener. NOTE: due to the vagueness of the Oracle advisory, it is not clear whether there are additional issues besides this overflow, although the advisory alludes to multiple "vulnerabilities." • http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0078.html •

CVE-2002-0560
https://notcve.org/view.php?id=CVE-2002-0560
11 Jun 2002 — PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allows remote attackers to obtain sensitive information via the OWA_UTIL stored procedures (1) OWA_UTIL.signature, (2) OWA_UTIL.listprint, or (3) OWA_UTIL.show_query_columns. • http://marc.info/?l=bugtraq&m=101301813117562&w=2 •

CVE-2002-0561
https://notcve.org/view.php?id=CVE-2002-0561
11 Jun 2002 — The default configuration of the PL/SQL Gateway web administration interface in Oracle 9i Application Server 1.0.2.x uses null authentication, which allows remote attackers to gain privileges and modify DAD settings. • http://marc.info/?l=bugtraq&m=101301813117562&w=2 •

CVE-2002-0564
https://notcve.org/view.php?id=CVE-2002-0564
11 Jun 2002 — PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allows remote attackers to bypass authentication for a Database Access Descriptor (DAD) by modifying the URL to reference an alternate DAD that already has valid credentials. • http://marc.info/?l=bugtraq&m=101301813117562&w=2 •

CVE-2002-0559
https://notcve.org/view.php?id=CVE-2002-0559
11 Jun 2002 — Buffer overflows in PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allow remote attackers to cause a denial of service or execute arbitrary code via (1) a long help page request without a dadname, which overflows the resulting HTTP Location header, (2) a long HTTP request to the plsql module, (3) a long password in the HTTP Authorization, (4) a long Access Descriptor (DAD) password in the addadd form, or (5) a long cache directory name. • http://online.securityfocus.com/archive/1/254426 •

CVE-2002-0566
https://notcve.org/view.php?id=CVE-2002-0566
11 Jun 2002 — PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allows remote attackers to cause a denial of service (crash) via an HTTP Authorization header without an authentication type. • http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf •

CVE-2002-0563
https://notcve.org/view.php?id=CVE-2002-0563
11 Jun 2002 — The default configuration of Oracle 9i Application Server 1.0.2.x allows remote anonymous users to access sensitive services without authentication, including Dynamic Monitoring Services (1) dms0, (2) dms/DMSDump, (3) servlet/DMSDump, (4) servlet/Spy, (5) soap/servlet/Spy, and (6) dms/AggreSpy; and Oracle Java Process Manager (7) oprocmgr-status and (8) oprocmgr-service, which can be used to control Java processes. • http://marc.info/?l=bugtraq&m=101301813117562&w=2 • CWE-287: Improper Authentication •

CVE-2002-0565
https://notcve.org/view.php?id=CVE-2002-0565
11 Jun 2002 — Oracle 9iAS 1.0.2.x compiles JSP files in the _pages directory with world-readable permissions under the web root, which allows remote attackers to obtain sensitive information derived from the JSP code, including usernames and passwords, via a direct HTTP request to _pages. • http://marc.info/?l=bugtraq&m=101301440005580&w=2 •