3 results (0.013 seconds)

CVSS: 5.0EPSS: 6%CPEs: 6EXPL: 4

The forms servlet (f90servlet) in Oracle Forms 4.5.10.22 allows remote attackers to cause a denial of service (TNS listener stop) via a userid parameter that contains a STOP command. • https://www.exploit-db.com/exploits/26336 http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0175.html http://marc.info/?l=bugtraq&m=112870645720399&w=2 http://secunia.com/advisories/15991 http://securityreason.com/securityalert/65 http://www.oracle.com/technology/deploy/security/pdf/cpujul2005.html http://www.red-database-security.com/advisory/oracle_forms_shutdown.html http://www.securityfocus.com/bid/15039 https://exchange.xforce.ibmcloud.com/vulnerabilities/22543 •

CVSS: 7.2EPSS: 7%CPEs: 7EXPL: 1

Oracle Forms 4.5 through 10g starts form executables from arbitrary directories and executes them as the Oracle or System user, which allows attackers to execute arbitrary code by uploading a malicious .fmx file and referencing it using an absolute pathname argument in the (1) form or (2) module parameters to f90servlet. Oracle Forms 4.5 hasta la 10g arranca desde ejecutables de directorios arbitrarios y los ejecuta como usuario Oracle o System, lo que permite que atacantes ejecuten código arbitrario usando un fichero .fmx malicioso y referenciándolo a través de un path absoluto en los parámetros "form" o "module" en f90servlet. • http://marc.info/?l=bugtraq&m=112180805413784&w=2 http://www.red-database-security.com/advisory/oracle_forms_run_any_os_command.html •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

SQL injection vulnerability in Oracle Forms 10g allows remote attackers to execute arbitrary SQL commands via the Query/Where feature. • http://www.red-database-security.com/wp/sql_injection_forms_us.pdf http://www.securiteam.com/securitynews/5HP0I0UFFI.html https://exchange.xforce.ibmcloud.com/vulnerabilities/20080 •