Oracle

Oracle8i

46 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.3%
  • Published 04.08.2004 04:00:00
  • Last modified 03.04.2025 01:03:51

Oracle 10g Database Server stores the password for the SYSMAN account in cleartext in the world-readable emoms.properties file, which could allow local users to gain DBA privileges.

  • EPSS 5.3%
  • Published 04.08.2004 04:00:00
  • Last modified 03.04.2025 01:03:51

ISQL*Plus in Oracle 10g Application Server allows remote attackers to execute arbitrary files via an absolute pathname in the file parameter to the load.uix script.

  • EPSS 3.78%
  • Published 04.08.2004 04:00:00
  • Last modified 03.04.2025 01:03:51

The TNS Listener in Oracle 10g allows remote attackers to cause a denial of service (listener crash) via a malformed service_register_NSGR request containing a value that is used as an invalid offset for a pointer that references incorrect memory.

  • EPSS 1.81%
  • Published 04.08.2004 04:00:00
  • Last modified 03.04.2025 01:03:51

Multiple SQL injection vulnerabilities in PL/SQL procedures that run with definer rights in Oracle 9i and 10g allow remote attackers to execute arbitrary SQL commands and gain privileges via (1) DBMS_EXPORT_EXTENSION, (2) WK_ACL.GET_ACL, (3) WK_ACL.S...

  • EPSS 32.44%
  • Published 04.08.2004 04:00:00
  • Last modified 03.04.2025 01:03:51

Stack-based buffer overflow in Oracle 9i and 10g allows remote attackers to execute arbitrary code via a long token in the text of a wrapped procedure.

Exploit
  • EPSS 12.3%
  • Published 30.07.2004 04:00:00
  • Last modified 03.04.2025 01:03:51

The (1) dbsnmp and (2) nmo programs in Oracle 8i, Oracle 9i, and Oracle IAS 9.0.2.0.1, on Unix systems, use a default path to find and execute library files while operating at raised privileges, which allows certain Oracle user accounts to gain root ...

  • EPSS 2.65%
  • Published 27.08.2003 04:00:00
  • Last modified 03.04.2025 01:03:51

Stack-based buffer overflow in the PL/SQL EXTPROC functionality for Oracle9i Database Release 2 and 1, and Oracle 8i, allows authenticated database users, and arbitrary database users in some cases, to execute arbitrary code via a long library name.

  • EPSS 12.51%
  • Published 12.05.2003 04:00:00
  • Last modified 03.04.2025 01:03:51

Stack-based buffer overflow in Oracle Net Services for Oracle Database Server 9i release 2 and earlier allows attackers to execute arbitrary code via a "CREATE DATABASE LINK" query containing a connect string with a long USING parameter.

  • EPSS 46.32%
  • Published 03.03.2003 05:00:00
  • Last modified 03.04.2025 01:03:51

Multiple buffer overflows in Oracle 9i Database release 2, Release 1, 8i, 8.1.7, and 8.0.6 allow remote attackers to execute arbitrary code via (1) a long conversion string argument to the TO_TIMESTAMP_TZ function, (2) a long time zone argument to th...

  • EPSS 33.07%
  • Published 03.03.2003 05:00:00
  • Last modified 03.04.2025 01:03:51

Buffer overflow in ORACLE.EXE for Oracle Database Server 9i, 8i, 8.1.7, and 8.0.6 allows remote attackers to execute arbitrary code via a long username that is provided during login, as exploitable through client applications that perform their own a...