Oracle

Application Server Web Cache

15 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 26.54%
  • Published 03.05.2005 04:00:00
  • Last modified 03.04.2025 01:03:51

Multiple cross-site scripting (XSS) vulnerabilities in Oracle Webcache 9i allow remote attackers to inject arbitrary web script or HTML via the (1) cache_dump_file or (2) PartialPageErrorPage parameter.

Exploit
  • EPSS 45.43%
  • Published 03.05.2005 04:00:00
  • Last modified 03.04.2025 01:03:51

The webcacheadmin module in Oracle Webcache 9i allows remote attackers to corrupt arbitrary files via a full pathname in the cache_dump_file parameter.

  • EPSS 38.82%
  • Published 01.06.2004 04:00:00
  • Last modified 03.04.2025 01:03:51

Heap-based buffer overflow in Oracle 9i Application Server Web Cache 9.0.4.0.0, 9.0.3.1.0, 9.0.2.3.0, and 9.0.0.4.0 allows remote attackers to execute arbitrary code via a long HTTP request method header to the Web Cache listener. NOTE: due to the v...

  • EPSS 26.41%
  • Published 03.07.2002 04:00:00
  • Last modified 03.04.2025 01:03:51

Buffer overflows in PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allow remote attackers to cause a denial of service or execute arbitrary code via (1) a long help page request without a dadname, which overflows the resulting HTTP L...

  • EPSS 7.51%
  • Published 03.07.2002 04:00:00
  • Last modified 03.04.2025 01:03:51

PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allows remote attackers to obtain sensitive information via the OWA_UTIL stored procedures (1) OWA_UTIL.signature, (2) OWA_UTIL.listprint, or (3) OWA_UTIL.show_query_columns.

  • EPSS 6.96%
  • Published 03.07.2002 04:00:00
  • Last modified 03.04.2025 01:03:51

The default configuration of the PL/SQL Gateway web administration interface in Oracle 9i Application Server 1.0.2.x uses null authentication, which allows remote attackers to gain privileges and modify DAD settings.

  • EPSS 2.92%
  • Published 03.07.2002 04:00:00
  • Last modified 03.04.2025 01:03:51

The default configuration of Oracle 9i Application Server 1.0.2.x running Oracle JSP or SQLJSP stores globals.jsa under the web root, which allows remote attackers to gain sensitive information including usernames and passwords via a direct HTTP requ...

  • EPSS 34.45%
  • Published 03.07.2002 04:00:00
  • Last modified 03.04.2025 01:03:51

The default configuration of Oracle 9i Application Server 1.0.2.x allows remote anonymous users to access sensitive services without authentication, including Dynamic Monitoring Services (1) dms0, (2) dms/DMSDump, (3) servlet/DMSDump, (4) servlet/Spy...

  • EPSS 1.52%
  • Published 03.07.2002 04:00:00
  • Last modified 03.04.2025 01:03:51

PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allows remote attackers to bypass authentication for a Database Access Descriptor (DAD) by modifying the URL to reference an alternate DAD that already has valid credentials.

  • EPSS 5.92%
  • Published 03.07.2002 04:00:00
  • Last modified 03.04.2025 01:03:51

Oracle 9iAS 1.0.2.x compiles JSP files in the _pages directory with world-readable permissions under the web root, which allows remote attackers to obtain sensitive information derived from the JSP code, including usernames and passwords, via a direc...