12 results (0.003 seconds)

CVSS: 9.1EPSS: 26%CPEs: 9EXPL: 0

11 Jun 2002 — Buffer overflows in PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allow remote attackers to cause a denial of service or execute arbitrary code via (1) a long help page request without a dadname, which overflows the resulting HTTP Location header, (2) a long HTTP request to the plsql module, (3) a long password in the HTTP Authorization, (4) a long Access Descriptor (DAD) password in the addadd form, or (5) a long cache directory name. • http://online.securityfocus.com/archive/1/254426 •

CVSS: 7.5EPSS: 5%CPEs: 9EXPL: 0

11 Jun 2002 — PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allows remote attackers to obtain sensitive information via the OWA_UTIL stored procedures (1) OWA_UTIL.signature, (2) OWA_UTIL.listprint, or (3) OWA_UTIL.show_query_columns. • http://marc.info/?l=bugtraq&m=101301813117562&w=2 •

CVSS: 9.8EPSS: 7%CPEs: 9EXPL: 0

11 Jun 2002 — The default configuration of the PL/SQL Gateway web administration interface in Oracle 9i Application Server 1.0.2.x uses null authentication, which allows remote attackers to gain privileges and modify DAD settings. • http://marc.info/?l=bugtraq&m=101301813117562&w=2 •

CVSS: 7.5EPSS: 2%CPEs: 7EXPL: 0

11 Jun 2002 — The default configuration of Oracle 9i Application Server 1.0.2.x running Oracle JSP or SQLJSP stores globals.jsa under the web root, which allows remote attackers to gain sensitive information including usernames and passwords via a direct HTTP request to globals.jsa. • http://marc.info/?l=bugtraq&m=101301440005580&w=2 •

CVSS: 9.1EPSS: 34%CPEs: 9EXPL: 0

11 Jun 2002 — The default configuration of Oracle 9i Application Server 1.0.2.x allows remote anonymous users to access sensitive services without authentication, including Dynamic Monitoring Services (1) dms0, (2) dms/DMSDump, (3) servlet/DMSDump, (4) servlet/Spy, (5) soap/servlet/Spy, and (6) dms/AggreSpy; and Oracle Java Process Manager (7) oprocmgr-status and (8) oprocmgr-service, which can be used to control Java processes. • http://marc.info/?l=bugtraq&m=101301813117562&w=2 • CWE-287: Improper Authentication •

CVSS: 9.8EPSS: 1%CPEs: 9EXPL: 0

11 Jun 2002 — PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allows remote attackers to bypass authentication for a Database Access Descriptor (DAD) by modifying the URL to reference an alternate DAD that already has valid credentials. • http://marc.info/?l=bugtraq&m=101301813117562&w=2 •

CVSS: 7.5EPSS: 5%CPEs: 7EXPL: 0

11 Jun 2002 — Oracle 9iAS 1.0.2.x compiles JSP files in the _pages directory with world-readable permissions under the web root, which allows remote attackers to obtain sensitive information derived from the JSP code, including usernames and passwords, via a direct HTTP request to _pages. • http://marc.info/?l=bugtraq&m=101301440005580&w=2 •

CVSS: 7.5EPSS: 1%CPEs: 9EXPL: 0

11 Jun 2002 — PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allows remote attackers to cause a denial of service (crash) via an HTTP Authorization header without an authentication type. • http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf •

CVSS: 10.0EPSS: 6%CPEs: 4EXPL: 0

27 May 2002 — Multiple buffer overflows in Oracle Web Cache for Oracle 9i Application Server (9iAS) allow remote attackers to execute arbitrary code via unknown vectors. • http://www.kb.cert.org/vuls/id/291555 •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

15 Mar 2002 — An installer program for Oracle9iAS Web Cache 2.0.0.x creates executable and configuration files with insecure permissions, which allows local users to gain privileges by (1) running webcached or (2) obtaining the administrator password from webcache.xml. El programa de instalación para el Oracle9i Web cache 2.0.0.x crea ejecutables y archivos de configuración con permisos inseguros, que permiten a usuarios locales asignarse privilegios: (1) ejecutar webcache y (2) obtener la contraseña de administrador de ... • http://marc.info/?l=bugtraq&m=101041510727937&w=2 •