Vulnerabilites related to oracle - application_server_web_cache
cve-2002-1641
Vulnerability from cvelistv5
Published
2005-03-28 05:00
Modified
2024-08-08 03:34
Severity ?
EPSS score ?
Summary
Multiple buffer overflows in Oracle Web Cache for Oracle 9i Application Server (9iAS) allow remote attackers to execute arbitrary code via unknown vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.kb.cert.org/vuls/id/291555 | third-party-advisory, x_refsource_CERT-VN | |
http://www.securityfocus.com/bid/4856 | vdb-entry, x_refsource_BID | |
http://www.nextgenss.com/vna/ora-webcache.txt | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:34:55.135Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#291555", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/291555" }, { "name": "4856", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/4856" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.nextgenss.com/vna/ora-webcache.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-05-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in Oracle Web Cache for Oracle 9i Application Server (9iAS) allow remote attackers to execute arbitrary code via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-15T16:37:19", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "VU#291555", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/291555" }, { "name": "4856", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/4856" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.nextgenss.com/vna/ora-webcache.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1641", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in Oracle Web Cache for Oracle 9i Application Server (9iAS) allow remote attackers to execute arbitrary code via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#291555", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/291555" }, { "name": "4856", "refsource": "BID", "url": "http://www.securityfocus.com/bid/4856" }, { "name": "http://www.nextgenss.com/vna/ora-webcache.txt", "refsource": "MISC", "url": "http://www.nextgenss.com/vna/ora-webcache.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-1641", "datePublished": "2005-03-28T05:00:00", "dateReserved": "2005-03-28T00:00:00", "dateUpdated": "2024-08-08T03:34:55.135Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-0561
Vulnerability from cvelistv5
Published
2002-06-11 04:00
Modified
2024-08-08 02:56
Severity ?
EPSS score ?
Summary
The default configuration of the PL/SQL Gateway web administration interface in Oracle 9i Application Server 1.0.2.x uses null authentication, which allows remote attackers to gain privileges and modify DAD settings.
References
▼ | URL | Tags |
---|---|---|
http://marc.info/?l=bugtraq&m=101301813117562&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/4292 | vdb-entry, x_refsource_BID | |
http://www.cert.org/advisories/CA-2002-08.html | third-party-advisory, x_refsource_CERT | |
http://www.kb.cert.org/vuls/id/611776 | third-party-advisory, x_refsource_CERT-VN | |
http://www.nextgenss.com/papers/hpoas.pdf | x_refsource_MISC | |
http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:56:37.356Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20020206 Hackproofing Oracle Application Server paper", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=101301813117562\u0026w=2" }, { "name": "4292", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/4292" }, { "name": "CA-2002-08", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "name": "VU#611776", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/611776" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.nextgenss.com/papers/hpoas.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-02-06T00:00:00", "descriptions": [ { "lang": "en", "value": "The default configuration of the PL/SQL Gateway web administration interface in Oracle 9i Application Server 1.0.2.x uses null authentication, which allows remote attackers to gain privileges and modify DAD settings." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20020206 Hackproofing Oracle Application Server paper", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=101301813117562\u0026w=2" }, { "name": "4292", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/4292" }, { "name": "CA-2002-08", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "name": "VU#611776", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/611776" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.nextgenss.com/papers/hpoas.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0561", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The default configuration of the PL/SQL Gateway web administration interface in Oracle 9i Application Server 1.0.2.x uses null authentication, which allows remote attackers to gain privileges and modify DAD settings." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20020206 Hackproofing Oracle Application Server paper", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=101301813117562\u0026w=2" }, { "name": "4292", "refsource": "BID", "url": "http://www.securityfocus.com/bid/4292" }, { "name": "CA-2002-08", "refsource": "CERT", "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "name": "VU#611776", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/611776" }, { "name": "http://www.nextgenss.com/papers/hpoas.pdf", "refsource": "MISC", "url": "http://www.nextgenss.com/papers/hpoas.pdf" }, { "name": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf", "refsource": "CONFIRM", "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0561", "datePublished": "2002-06-11T04:00:00", "dateReserved": "2002-06-07T00:00:00", "dateUpdated": "2024-08-08T02:56:37.356Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2001-0836
Vulnerability from cvelistv5
Published
2002-03-09 05:00
Modified
2024-08-08 04:37
Severity ?
EPSS score ?
Summary
Buffer overflow in Oracle9iAS Web Cache 2.0.0.1 allows remote attackers to execute arbitrary code via a long HTTP GET request.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/7306 | vdb-entry, x_refsource_XF | |
http://www.cert.org/advisories/CA-2001-29.html | third-party-advisory, x_refsource_CERT | |
http://otn.oracle.com/deploy/security/pdf/webcache.pdf | x_refsource_CONFIRM | |
http://www.osvdb.org/5534 | vdb-entry, x_refsource_OSVDB | |
http://marc.info/?l=bugtraq&m=100395487007578&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://www.kb.cert.org/vuls/id/649979 | third-party-advisory, x_refsource_CERT-VN | |
http://marc.info/?l=bugtraq&m=100342151132277&w=2 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:37:06.473Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oracle-appserver-http-bo(7306)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7306" }, { "name": "CA-2001-29", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.cert.org/advisories/CA-2001-29.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://otn.oracle.com/deploy/security/pdf/webcache.pdf" }, { "name": "5534", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/5534" }, { "name": "20011024 Oracle9iAS Web Cache Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=100395487007578\u0026w=2" }, { "name": "VU#649979", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/649979" }, { "name": "20011018 def-2001-30", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=100342151132277\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2001-10-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Oracle9iAS Web Cache 2.0.0.1 allows remote attackers to execute arbitrary code via a long HTTP GET request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2002-02-26T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "oracle-appserver-http-bo(7306)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7306" }, { "name": "CA-2001-29", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.cert.org/advisories/CA-2001-29.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://otn.oracle.com/deploy/security/pdf/webcache.pdf" }, { "name": "5534", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/5534" }, { "name": "20011024 Oracle9iAS Web Cache Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=100395487007578\u0026w=2" }, { "name": "VU#649979", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/649979" }, { "name": "20011018 def-2001-30", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=100342151132277\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-0836", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Oracle9iAS Web Cache 2.0.0.1 allows remote attackers to execute arbitrary code via a long HTTP GET request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oracle-appserver-http-bo(7306)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7306" }, { "name": "CA-2001-29", "refsource": "CERT", "url": "http://www.cert.org/advisories/CA-2001-29.html" }, { "name": "http://otn.oracle.com/deploy/security/pdf/webcache.pdf", "refsource": "CONFIRM", "url": "http://otn.oracle.com/deploy/security/pdf/webcache.pdf" }, { "name": "5534", "refsource": "OSVDB", "url": "http://www.osvdb.org/5534" }, { "name": "20011024 Oracle9iAS Web Cache Overflow Vulnerability", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=100395487007578\u0026w=2" }, { "name": "VU#649979", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/649979" }, { "name": "20011018 def-2001-30", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=100342151132277\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-0836", "datePublished": "2002-03-09T05:00:00", "dateReserved": "2001-11-22T00:00:00", "dateUpdated": "2024-08-08T04:37:06.473Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-0385
Vulnerability from cvelistv5
Published
2004-04-16 04:00
Modified
2024-08-08 00:17
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow in Oracle 9i Application Server Web Cache 9.0.4.0.0, 9.0.3.1.0, 9.0.2.3.0, and 9.0.0.4.0 allows remote attackers to execute arbitrary code via a long HTTP request method header to the Web Cache listener. NOTE: due to the vagueness of the Oracle advisory, it is not clear whether there are additional issues besides this overflow, although the advisory alludes to multiple "vulnerabilities."
References
▼ | URL | Tags |
---|---|---|
http://www.inaccessnetworks.com/ian/services/secadv01.txt | x_refsource_MISC | |
http://otn.oracle.com/deploy/security/pdf/2004alert66.pdf | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15463 | vdb-entry, x_refsource_XF | |
http://www.osvdb.org/4249 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/11118 | third-party-advisory, x_refsource_SECUNIA | |
http://marc.info/?l=bugtraq&m=108144419001770&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://www.kb.cert.org/vuls/id/413006 | third-party-advisory, x_refsource_CERT-VN | |
http://marc.info/?l=bugtraq&m=107945649127635&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0078.html | mailing-list, x_refsource_VULNWATCH | |
http://www.securityfocus.com/bid/9868 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:17:14.437Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.inaccessnetworks.com/ian/services/secadv01.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://otn.oracle.com/deploy/security/pdf/2004alert66.pdf" }, { "name": "oracle-web-cache-vulnerabilities(15463)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15463" }, { "name": "4249", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/4249" }, { "name": "11118", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/11118" }, { "name": "20040408 Heap Overflow in Oracle 9iAS / 10g Application Server Web Cache", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=108144419001770\u0026w=2" }, { "name": "VU#413006", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/413006" }, { "name": "20040316 new security alert #66 issued in Oracle web cache", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=107945649127635\u0026w=2" }, { "name": "20040408 Heap Overflow in Oracle 9iAS / 10g Application Server Web Cache", "tags": [ "mailing-list", "x_refsource_VULNWATCH", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0078.html" }, { "name": "9868", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/9868" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-04-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Oracle 9i Application Server Web Cache 9.0.4.0.0, 9.0.3.1.0, 9.0.2.3.0, and 9.0.0.4.0 allows remote attackers to execute arbitrary code via a long HTTP request method header to the Web Cache listener. NOTE: due to the vagueness of the Oracle advisory, it is not clear whether there are additional issues besides this overflow, although the advisory alludes to multiple \"vulnerabilities.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.inaccessnetworks.com/ian/services/secadv01.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://otn.oracle.com/deploy/security/pdf/2004alert66.pdf" }, { "name": "oracle-web-cache-vulnerabilities(15463)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15463" }, { "name": "4249", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/4249" }, { "name": "11118", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/11118" }, { "name": "20040408 Heap Overflow in Oracle 9iAS / 10g Application Server Web Cache", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=108144419001770\u0026w=2" }, { "name": "VU#413006", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/413006" }, { "name": "20040316 new security alert #66 issued in Oracle web cache", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=107945649127635\u0026w=2" }, { "name": "20040408 Heap Overflow in Oracle 9iAS / 10g Application Server Web Cache", "tags": [ "mailing-list", "x_refsource_VULNWATCH" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0078.html" }, { "name": "9868", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/9868" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0385", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in Oracle 9i Application Server Web Cache 9.0.4.0.0, 9.0.3.1.0, 9.0.2.3.0, and 9.0.0.4.0 allows remote attackers to execute arbitrary code via a long HTTP request method header to the Web Cache listener. NOTE: due to the vagueness of the Oracle advisory, it is not clear whether there are additional issues besides this overflow, although the advisory alludes to multiple \"vulnerabilities.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.inaccessnetworks.com/ian/services/secadv01.txt", "refsource": "MISC", "url": "http://www.inaccessnetworks.com/ian/services/secadv01.txt" }, { "name": "http://otn.oracle.com/deploy/security/pdf/2004alert66.pdf", "refsource": "CONFIRM", "url": "http://otn.oracle.com/deploy/security/pdf/2004alert66.pdf" }, { "name": "oracle-web-cache-vulnerabilities(15463)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15463" }, { "name": "4249", "refsource": "OSVDB", "url": "http://www.osvdb.org/4249" }, { "name": "11118", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/11118" }, { "name": "20040408 Heap Overflow in Oracle 9iAS / 10g Application Server Web Cache", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=108144419001770\u0026w=2" }, { "name": "VU#413006", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/413006" }, { "name": "20040316 new security alert #66 issued in Oracle web cache", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=107945649127635\u0026w=2" }, { "name": "20040408 Heap Overflow in Oracle 9iAS / 10g Application Server Web Cache", "refsource": "VULNWATCH", "url": "http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0078.html" }, { "name": "9868", "refsource": "BID", "url": "http://www.securityfocus.com/bid/9868" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0385", "datePublished": "2004-04-16T04:00:00", "dateReserved": "2004-04-06T00:00:00", "dateUpdated": "2024-08-08T00:17:14.437Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-0562
Vulnerability from cvelistv5
Published
2002-06-11 04:00
Modified
2024-08-08 02:56
Severity ?
EPSS score ?
Summary
The default configuration of Oracle 9i Application Server 1.0.2.x running Oracle JSP or SQLJSP stores globals.jsa under the web root, which allows remote attackers to gain sensitive information including usernames and passwords via a direct HTTP request to globals.jsa.
References
▼ | URL | Tags |
---|---|---|
http://www.cert.org/advisories/CA-2002-08.html | third-party-advisory, x_refsource_CERT | |
http://www.kb.cert.org/vuls/id/698467 | third-party-advisory, x_refsource_CERT-VN | |
http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/4034 | vdb-entry, x_refsource_BID | |
http://marc.info/?l=bugtraq&m=101301440005580&w=2 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:56:38.175Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "CA-2002-08", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "name": "VU#698467", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/698467" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" }, { "name": "4034", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/4034" }, { "name": "20020206 JSP translation file access under Oracle 9iAS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=101301440005580\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-02-06T00:00:00", "descriptions": [ { "lang": "en", "value": "The default configuration of Oracle 9i Application Server 1.0.2.x running Oracle JSP or SQLJSP stores globals.jsa under the web root, which allows remote attackers to gain sensitive information including usernames and passwords via a direct HTTP request to globals.jsa." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "CA-2002-08", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "name": "VU#698467", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/698467" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" }, { "name": "4034", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/4034" }, { "name": "20020206 JSP translation file access under Oracle 9iAS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=101301440005580\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0562", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The default configuration of Oracle 9i Application Server 1.0.2.x running Oracle JSP or SQLJSP stores globals.jsa under the web root, which allows remote attackers to gain sensitive information including usernames and passwords via a direct HTTP request to globals.jsa." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "CA-2002-08", "refsource": "CERT", "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "name": "VU#698467", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/698467" }, { "name": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf", "refsource": "CONFIRM", "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" }, { "name": "4034", "refsource": "BID", "url": "http://www.securityfocus.com/bid/4034" }, { "name": "20020206 JSP translation file access under Oracle 9iAS", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=101301440005580\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0562", "datePublished": "2002-06-11T04:00:00", "dateReserved": "2002-06-07T00:00:00", "dateUpdated": "2024-08-08T02:56:38.175Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-0102
Vulnerability from cvelistv5
Published
2002-03-15 05:00
Modified
2024-08-08 02:35
Severity ?
EPSS score ?
Summary
Oracle9iAS Web Cache 2.0.0.x allows remote attackers to cause a denial of service via (1) a request to TCP ports 1100, 4000, 4001, and 4002 with a large number of null characters, and (2) a request to TCP port 4000 with a large number of "." characters.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/3760 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/7765 | vdb-entry, x_refsource_XF | |
http://otn.oracle.com/deploy/security/pdf/webcache2.pdf | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/3762 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:35:17.572Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "3760", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/3760" }, { "name": "oracle-appserver-null-dos(7765)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7765" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://otn.oracle.com/deploy/security/pdf/webcache2.pdf" }, { "name": "3762", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/3762" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-01-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Oracle9iAS Web Cache 2.0.0.x allows remote attackers to cause a denial of service via (1) a request to TCP ports 1100, 4000, 4001, and 4002 with a large number of null characters, and (2) a request to TCP port 4000 with a large number of \".\" characters." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-18T21:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "3760", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/3760" }, { "name": "oracle-appserver-null-dos(7765)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7765" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://otn.oracle.com/deploy/security/pdf/webcache2.pdf" }, { "name": "3762", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/3762" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0102", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Oracle9iAS Web Cache 2.0.0.x allows remote attackers to cause a denial of service via (1) a request to TCP ports 1100, 4000, 4001, and 4002 with a large number of null characters, and (2) a request to TCP port 4000 with a large number of \".\" characters." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "3760", "refsource": "BID", "url": "http://www.securityfocus.com/bid/3760" }, { "name": "oracle-appserver-null-dos(7765)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7765" }, { "name": "http://otn.oracle.com/deploy/security/pdf/webcache2.pdf", "refsource": "CONFIRM", "url": "http://otn.oracle.com/deploy/security/pdf/webcache2.pdf" }, { "name": "3762", "refsource": "BID", "url": "http://www.securityfocus.com/bid/3762" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0102", "datePublished": "2002-03-15T05:00:00", "dateReserved": "2002-03-15T00:00:00", "dateUpdated": "2024-08-08T02:35:17.572Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-0559
Vulnerability from cvelistv5
Published
2002-06-11 04:00
Modified
2024-08-08 02:56
Severity ?
EPSS score ?
Summary
Buffer overflows in PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allow remote attackers to cause a denial of service or execute arbitrary code via (1) a long help page request without a dadname, which overflows the resulting HTTP Location header, (2) a long HTTP request to the plsql module, (3) a long password in the HTTP Authorization, (4) a long Access Descriptor (DAD) password in the addadd form, or (5) a long cache directory name.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:56:37.800Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#750299", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/750299" }, { "name": "VU#878603", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/878603" }, { "name": "oracle-appserver-plsql-adddad-bo(8098)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8098" }, { "name": "CA-2002-08", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "name": "VU#659043", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/659043" }, { "name": "oracle-appserver-plsql-cache-bo(8097)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8097" }, { "name": "oracle-appserver-plsql-authclient-bo(8096)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8096" }, { "name": "20020206 Multiple Buffer Overflows in Oracle 9iAS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://online.securityfocus.com/archive/1/254426" }, { "name": "VU#313280", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/313280" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.nextgenss.com/papers/hpoas.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" }, { "name": "4032", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/4032" }, { "name": "oracle-appserver-plsql-bo(8095)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8095" }, { "name": "VU#923395", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/923395" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-02-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflows in PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allow remote attackers to cause a denial of service or execute arbitrary code via (1) a long help page request without a dadname, which overflows the resulting HTTP Location header, (2) a long HTTP request to the plsql module, (3) a long password in the HTTP Authorization, (4) a long Access Descriptor (DAD) password in the addadd form, or (5) a long cache directory name." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-18T21:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "VU#750299", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/750299" }, { "name": "VU#878603", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/878603" }, { "name": "oracle-appserver-plsql-adddad-bo(8098)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8098" }, { "name": "CA-2002-08", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "name": "VU#659043", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/659043" }, { "name": "oracle-appserver-plsql-cache-bo(8097)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8097" }, { "name": "oracle-appserver-plsql-authclient-bo(8096)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8096" }, { "name": "20020206 Multiple Buffer Overflows in Oracle 9iAS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://online.securityfocus.com/archive/1/254426" }, { "name": "VU#313280", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/313280" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.nextgenss.com/papers/hpoas.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" }, { "name": "4032", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/4032" }, { "name": "oracle-appserver-plsql-bo(8095)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8095" }, { "name": "VU#923395", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/923395" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0559", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflows in PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allow remote attackers to cause a denial of service or execute arbitrary code via (1) a long help page request without a dadname, which overflows the resulting HTTP Location header, (2) a long HTTP request to the plsql module, (3) a long password in the HTTP Authorization, (4) a long Access Descriptor (DAD) password in the addadd form, or (5) a long cache directory name." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#750299", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/750299" }, { "name": "VU#878603", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/878603" }, { "name": "oracle-appserver-plsql-adddad-bo(8098)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8098" }, { "name": "CA-2002-08", "refsource": "CERT", "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "name": "VU#659043", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/659043" }, { "name": "oracle-appserver-plsql-cache-bo(8097)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8097" }, { "name": "oracle-appserver-plsql-authclient-bo(8096)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8096" }, { "name": "20020206 Multiple Buffer Overflows in Oracle 9iAS", "refsource": "BUGTRAQ", "url": "http://online.securityfocus.com/archive/1/254426" }, { "name": "VU#313280", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/313280" }, { "name": "http://www.nextgenss.com/papers/hpoas.pdf", "refsource": "MISC", "url": "http://www.nextgenss.com/papers/hpoas.pdf" }, { "name": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf", "refsource": "CONFIRM", "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" }, { "name": "4032", "refsource": "BID", "url": "http://www.securityfocus.com/bid/4032" }, { "name": "oracle-appserver-plsql-bo(8095)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8095" }, { "name": "VU#923395", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/923395" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0559", "datePublished": "2002-06-11T04:00:00", "dateReserved": "2002-06-07T00:00:00", "dateUpdated": "2024-08-08T02:56:37.800Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-0564
Vulnerability from cvelistv5
Published
2002-06-11 04:00
Modified
2024-08-08 02:56
Severity ?
EPSS score ?
Summary
PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allows remote attackers to bypass authentication for a Database Access Descriptor (DAD) by modifying the URL to reference an alternate DAD that already has valid credentials.
References
▼ | URL | Tags |
---|---|---|
http://marc.info/?l=bugtraq&m=101301813117562&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://www.cert.org/advisories/CA-2002-08.html | third-party-advisory, x_refsource_CERT | |
http://www.nextgenss.com/papers/hpoas.pdf | x_refsource_MISC | |
http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf | x_refsource_CONFIRM | |
http://www.kb.cert.org/vuls/id/193523 | third-party-advisory, x_refsource_CERT-VN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:56:37.367Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20020206 Hackproofing Oracle Application Server paper", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=101301813117562\u0026w=2" }, { "name": "CA-2002-08", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.nextgenss.com/papers/hpoas.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" }, { "name": "VU#193523", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/193523" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-02-06T00:00:00", "descriptions": [ { "lang": "en", "value": "PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allows remote attackers to bypass authentication for a Database Access Descriptor (DAD) by modifying the URL to reference an alternate DAD that already has valid credentials." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20020206 Hackproofing Oracle Application Server paper", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=101301813117562\u0026w=2" }, { "name": "CA-2002-08", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.nextgenss.com/papers/hpoas.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" }, { "name": "VU#193523", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/193523" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0564", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allows remote attackers to bypass authentication for a Database Access Descriptor (DAD) by modifying the URL to reference an alternate DAD that already has valid credentials." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20020206 Hackproofing Oracle Application Server paper", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=101301813117562\u0026w=2" }, { "name": "CA-2002-08", "refsource": "CERT", "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "name": "http://www.nextgenss.com/papers/hpoas.pdf", "refsource": "MISC", "url": "http://www.nextgenss.com/papers/hpoas.pdf" }, { "name": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf", "refsource": "CONFIRM", "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" }, { "name": "VU#193523", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/193523" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0564", "datePublished": "2002-06-11T04:00:00", "dateReserved": "2002-06-07T00:00:00", "dateUpdated": "2024-08-08T02:56:37.367Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-0103
Vulnerability from cvelistv5
Published
2002-03-15 05:00
Modified
2024-08-08 02:35
Severity ?
EPSS score ?
Summary
An installer program for Oracle9iAS Web Cache 2.0.0.x creates executable and configuration files with insecure permissions, which allows local users to gain privileges by (1) running webcached or (2) obtaining the administrator password from webcache.xml.
References
▼ | URL | Tags |
---|---|---|
http://marc.info/?l=bugtraq&m=101041510727937&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://otn.oracle.com/deploy/security/pdf/webcache2.pdf | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/3764 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/bid/3761 | vdb-entry, x_refsource_BID | |
http://www.iss.net/security_center/static/7766.php | vdb-entry, x_refsource_XF | |
http://www.iss.net/security_center/static/7768.php | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:35:17.569Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20020107 [PTL-2002-01] Vulnerabilities in Oracle9iAS Web Cache", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=101041510727937\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://otn.oracle.com/deploy/security/pdf/webcache2.pdf" }, { "name": "3764", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/3764" }, { "name": "3761", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/3761" }, { "name": "oracle-appserver-webcached-privileges(7766)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/7766.php" }, { "name": "oracle-appserver-webcache-password(7768)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/7768.php" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-01-07T00:00:00", "descriptions": [ { "lang": "en", "value": "An installer program for Oracle9iAS Web Cache 2.0.0.x creates executable and configuration files with insecure permissions, which allows local users to gain privileges by (1) running webcached or (2) obtaining the administrator password from webcache.xml." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20020107 [PTL-2002-01] Vulnerabilities in Oracle9iAS Web Cache", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=101041510727937\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://otn.oracle.com/deploy/security/pdf/webcache2.pdf" }, { "name": "3764", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/3764" }, { "name": "3761", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/3761" }, { "name": "oracle-appserver-webcached-privileges(7766)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/7766.php" }, { "name": "oracle-appserver-webcache-password(7768)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/7768.php" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0103", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An installer program for Oracle9iAS Web Cache 2.0.0.x creates executable and configuration files with insecure permissions, which allows local users to gain privileges by (1) running webcached or (2) obtaining the administrator password from webcache.xml." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20020107 [PTL-2002-01] Vulnerabilities in Oracle9iAS Web Cache", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=101041510727937\u0026w=2" }, { "name": "http://otn.oracle.com/deploy/security/pdf/webcache2.pdf", "refsource": "CONFIRM", "url": "http://otn.oracle.com/deploy/security/pdf/webcache2.pdf" }, { "name": "3764", "refsource": "BID", "url": "http://www.securityfocus.com/bid/3764" }, { "name": "3761", "refsource": "BID", "url": "http://www.securityfocus.com/bid/3761" }, { "name": "oracle-appserver-webcached-privileges(7766)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/7766.php" }, { "name": "oracle-appserver-webcache-password(7768)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/7768.php" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0103", "datePublished": "2002-03-15T05:00:00", "dateReserved": "2002-03-15T00:00:00", "dateUpdated": "2024-08-08T02:35:17.569Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-0563
Vulnerability from cvelistv5
Published
2002-06-11 04:00
Modified
2024-08-08 02:56
Severity ?
EPSS score ?
Summary
The default configuration of Oracle 9i Application Server 1.0.2.x allows remote anonymous users to access sensitive services without authentication, including Dynamic Monitoring Services (1) dms0, (2) dms/DMSDump, (3) servlet/DMSDump, (4) servlet/Spy, (5) soap/servlet/Spy, and (6) dms/AggreSpy; and Oracle Java Process Manager (7) oprocmgr-status and (8) oprocmgr-service, which can be used to control Java processes.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/4293 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/8455 | vdb-entry, x_refsource_XF | |
http://marc.info/?l=bugtraq&m=101301813117562&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://www.osvdb.org/13152 | vdb-entry, x_refsource_OSVDB | |
http://www.cert.org/advisories/CA-2002-08.html | third-party-advisory, x_refsource_CERT | |
http://securitytracker.com/id?1009167 | vdb-entry, x_refsource_SECTRACK | |
http://www.appsecinc.com/Policy/PolicyCheck7024.html | x_refsource_MISC | |
http://www.kb.cert.org/vuls/id/168795 | third-party-advisory, x_refsource_CERT-VN | |
http://www.nextgenss.com/papers/hpoas.pdf | x_refsource_MISC | |
http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf | x_refsource_CONFIRM | |
http://www.osvdb.org/705 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:56:37.326Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "4293", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/4293" }, { "name": "oracle-appserver-apache-services(8455)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8455" }, { "name": "20020206 Hackproofing Oracle Application Server paper", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=101301813117562\u0026w=2" }, { "name": "13152", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/13152" }, { "name": "CA-2002-08", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "name": "1009167", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1009167" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.appsecinc.com/Policy/PolicyCheck7024.html" }, { "name": "VU#168795", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/168795" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.nextgenss.com/papers/hpoas.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" }, { "name": "705", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/705" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-02-06T00:00:00", "descriptions": [ { "lang": "en", "value": "The default configuration of Oracle 9i Application Server 1.0.2.x allows remote anonymous users to access sensitive services without authentication, including Dynamic Monitoring Services (1) dms0, (2) dms/DMSDump, (3) servlet/DMSDump, (4) servlet/Spy, (5) soap/servlet/Spy, and (6) dms/AggreSpy; and Oracle Java Process Manager (7) oprocmgr-status and (8) oprocmgr-service, which can be used to control Java processes." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "4293", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/4293" }, { "name": "oracle-appserver-apache-services(8455)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8455" }, { "name": "20020206 Hackproofing Oracle Application Server paper", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=101301813117562\u0026w=2" }, { "name": "13152", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/13152" }, { "name": "CA-2002-08", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "name": "1009167", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1009167" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.appsecinc.com/Policy/PolicyCheck7024.html" }, { "name": "VU#168795", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/168795" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.nextgenss.com/papers/hpoas.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" }, { "name": "705", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/705" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0563", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The default configuration of Oracle 9i Application Server 1.0.2.x allows remote anonymous users to access sensitive services without authentication, including Dynamic Monitoring Services (1) dms0, (2) dms/DMSDump, (3) servlet/DMSDump, (4) servlet/Spy, (5) soap/servlet/Spy, and (6) dms/AggreSpy; and Oracle Java Process Manager (7) oprocmgr-status and (8) oprocmgr-service, which can be used to control Java processes." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "4293", "refsource": "BID", "url": "http://www.securityfocus.com/bid/4293" }, { "name": "oracle-appserver-apache-services(8455)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8455" }, { "name": "20020206 Hackproofing Oracle Application Server paper", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=101301813117562\u0026w=2" }, { "name": "13152", "refsource": "OSVDB", "url": "http://www.osvdb.org/13152" }, { "name": "CA-2002-08", "refsource": "CERT", "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "name": "1009167", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1009167" }, { "name": "http://www.appsecinc.com/Policy/PolicyCheck7024.html", "refsource": "MISC", "url": "http://www.appsecinc.com/Policy/PolicyCheck7024.html" }, { "name": "VU#168795", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/168795" }, { "name": "http://www.nextgenss.com/papers/hpoas.pdf", "refsource": "MISC", "url": "http://www.nextgenss.com/papers/hpoas.pdf" }, { "name": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf", "refsource": "CONFIRM", "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" }, { "name": "705", "refsource": "OSVDB", "url": "http://www.osvdb.org/705" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0563", "datePublished": "2002-06-11T04:00:00", "dateReserved": "2002-06-07T00:00:00", "dateUpdated": "2024-08-08T02:56:37.326Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-0566
Vulnerability from cvelistv5
Published
2002-06-11 04:00
Modified
2024-08-08 02:56
Severity ?
EPSS score ?
Summary
PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allows remote attackers to cause a denial of service (crash) via an HTTP Authorization header without an authentication type.
References
▼ | URL | Tags |
---|---|---|
http://www.cert.org/advisories/CA-2002-08.html | third-party-advisory, x_refsource_CERT | |
http://www.securityfocus.com/bid/4037 | vdb-entry, x_refsource_BID | |
http://www.kb.cert.org/vuls/id/805915 | third-party-advisory, x_refsource_CERT-VN | |
http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/8099 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:56:37.286Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "CA-2002-08", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "name": "4037", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/4037" }, { "name": "VU#805915", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/805915" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" }, { "name": "oracle-appserver-plsql-pls-dos(8099)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8099" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-02-06T00:00:00", "descriptions": [ { "lang": "en", "value": "PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allows remote attackers to cause a denial of service (crash) via an HTTP Authorization header without an authentication type." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-18T21:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "CA-2002-08", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "name": "4037", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/4037" }, { "name": "VU#805915", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/805915" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" }, { "name": "oracle-appserver-plsql-pls-dos(8099)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8099" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0566", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allows remote attackers to cause a denial of service (crash) via an HTTP Authorization header without an authentication type." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "CA-2002-08", "refsource": "CERT", "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "name": "4037", "refsource": "BID", "url": "http://www.securityfocus.com/bid/4037" }, { "name": "VU#805915", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/805915" }, { "name": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf", "refsource": "CONFIRM", "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" }, { "name": "oracle-appserver-plsql-pls-dos(8099)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8099" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0566", "datePublished": "2002-06-11T04:00:00", "dateReserved": "2002-06-07T00:00:00", "dateUpdated": "2024-08-08T02:56:37.286Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-1382
Vulnerability from cvelistv5
Published
2005-05-02 04:00
Modified
2024-08-07 21:51
Severity ?
EPSS score ?
Summary
The webcacheadmin module in Oracle Webcache 9i allows remote attackers to corrupt arbitrary files via a full pathname in the cache_dump_file parameter.
References
▼ | URL | Tags |
---|---|---|
http://www.red-database-security.com/advisory/oracle_webcache_append_file_vulnerabilitiy.html | x_refsource_MISC | |
http://marc.info/?l=bugtraq&m=111472615519295&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/15143 | third-party-advisory, x_refsource_SECUNIA | |
http://www.osvdb.org/15909 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/bid/13420 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/20310 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:51:49.569Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.red-database-security.com/advisory/oracle_webcache_append_file_vulnerabilitiy.html" }, { "name": "20050428 File appending vulnerability in Oracle Webcache 9i", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=111472615519295\u0026w=2" }, { "name": "15143", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/15143" }, { "name": "15909", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/15909" }, { "name": "13420", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/13420" }, { "name": "oracle9ias-application-cache-file-corruption(20310)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20310" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-04-28T00:00:00", "descriptions": [ { "lang": "en", "value": "The webcacheadmin module in Oracle Webcache 9i allows remote attackers to corrupt arbitrary files via a full pathname in the cache_dump_file parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.red-database-security.com/advisory/oracle_webcache_append_file_vulnerabilitiy.html" }, { "name": "20050428 File appending vulnerability in Oracle Webcache 9i", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=111472615519295\u0026w=2" }, { "name": "15143", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/15143" }, { "name": "15909", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/15909" }, { "name": "13420", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/13420" }, { "name": "oracle9ias-application-cache-file-corruption(20310)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20310" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-1382", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The webcacheadmin module in Oracle Webcache 9i allows remote attackers to corrupt arbitrary files via a full pathname in the cache_dump_file parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.red-database-security.com/advisory/oracle_webcache_append_file_vulnerabilitiy.html", "refsource": "MISC", "url": "http://www.red-database-security.com/advisory/oracle_webcache_append_file_vulnerabilitiy.html" }, { "name": "20050428 File appending vulnerability in Oracle Webcache 9i", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=111472615519295\u0026w=2" }, { "name": "15143", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/15143" }, { "name": "15909", "refsource": "OSVDB", "url": "http://www.osvdb.org/15909" }, { "name": "13420", "refsource": "BID", "url": "http://www.securityfocus.com/bid/13420" }, { "name": "oracle9ias-application-cache-file-corruption(20310)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20310" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-1382", "datePublished": "2005-05-02T04:00:00", "dateReserved": "2005-05-02T00:00:00", "dateUpdated": "2024-08-07T21:51:49.569Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-0560
Vulnerability from cvelistv5
Published
2002-06-11 04:00
Modified
2024-08-08 02:56
Severity ?
EPSS score ?
Summary
PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allows remote attackers to obtain sensitive information via the OWA_UTIL stored procedures (1) OWA_UTIL.signature, (2) OWA_UTIL.listprint, or (3) OWA_UTIL.show_query_columns.
References
▼ | URL | Tags |
---|---|---|
http://marc.info/?l=bugtraq&m=101301813117562&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://www.kb.cert.org/vuls/id/307835 | third-party-advisory, x_refsource_CERT-VN | |
http://www.cert.org/advisories/CA-2002-08.html | third-party-advisory, x_refsource_CERT | |
http://www.nextgenss.com/papers/hpoas.pdf | x_refsource_MISC | |
http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/4294 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:56:37.338Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20020206 Hackproofing Oracle Application Server paper", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=101301813117562\u0026w=2" }, { "name": "VU#307835", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/307835" }, { "name": "CA-2002-08", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.nextgenss.com/papers/hpoas.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" }, { "name": "4294", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/4294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-02-06T00:00:00", "descriptions": [ { "lang": "en", "value": "PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allows remote attackers to obtain sensitive information via the OWA_UTIL stored procedures (1) OWA_UTIL.signature, (2) OWA_UTIL.listprint, or (3) OWA_UTIL.show_query_columns." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20020206 Hackproofing Oracle Application Server paper", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=101301813117562\u0026w=2" }, { "name": "VU#307835", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/307835" }, { "name": "CA-2002-08", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.nextgenss.com/papers/hpoas.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" }, { "name": "4294", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/4294" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0560", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allows remote attackers to obtain sensitive information via the OWA_UTIL stored procedures (1) OWA_UTIL.signature, (2) OWA_UTIL.listprint, or (3) OWA_UTIL.show_query_columns." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20020206 Hackproofing Oracle Application Server paper", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=101301813117562\u0026w=2" }, { "name": "VU#307835", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/307835" }, { "name": "CA-2002-08", "refsource": "CERT", "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "name": "http://www.nextgenss.com/papers/hpoas.pdf", "refsource": "MISC", "url": "http://www.nextgenss.com/papers/hpoas.pdf" }, { "name": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf", "refsource": "CONFIRM", "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" }, { "name": "4294", "refsource": "BID", "url": "http://www.securityfocus.com/bid/4294" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0560", "datePublished": "2002-06-11T04:00:00", "dateReserved": "2002-06-07T00:00:00", "dateUpdated": "2024-08-08T02:56:37.338Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-1381
Vulnerability from cvelistv5
Published
2005-05-02 04:00
Modified
2024-08-07 21:51
Severity ?
EPSS score ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Oracle Webcache 9i allow remote attackers to inject arbitrary web script or HTML via the (1) cache_dump_file or (2) PartialPageErrorPage parameter.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/20309 | vdb-entry, x_refsource_XF | |
http://www.red-database-security.com/advisory/oracle_webcache_CSS_vulnerabilities.html | x_refsource_MISC | |
http://marc.info/?l=bugtraq&m=111472423409560&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/13421 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/bid/13422 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/15143 | third-party-advisory, x_refsource_SECUNIA | |
http://www.osvdb.org/15910 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:51:49.589Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oracle9ias-application-cache-xss(20309)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20309" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.red-database-security.com/advisory/oracle_webcache_CSS_vulnerabilities.html" }, { "name": "20050428 Cross Site Scripting in Oracle Webcache 9i Adminstrator Application", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=111472423409560\u0026w=2" }, { "name": "13421", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/13421" }, { "name": "13422", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/13422" }, { "name": "15143", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/15143" }, { "name": "15910", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/15910" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-04-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Oracle Webcache 9i allow remote attackers to inject arbitrary web script or HTML via the (1) cache_dump_file or (2) PartialPageErrorPage parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "oracle9ias-application-cache-xss(20309)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20309" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.red-database-security.com/advisory/oracle_webcache_CSS_vulnerabilities.html" }, { "name": "20050428 Cross Site Scripting in Oracle Webcache 9i Adminstrator Application", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=111472423409560\u0026w=2" }, { "name": "13421", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/13421" }, { "name": "13422", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/13422" }, { "name": "15143", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/15143" }, { "name": "15910", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/15910" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-1381", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Oracle Webcache 9i allow remote attackers to inject arbitrary web script or HTML via the (1) cache_dump_file or (2) PartialPageErrorPage parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oracle9ias-application-cache-xss(20309)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20309" }, { "name": "http://www.red-database-security.com/advisory/oracle_webcache_CSS_vulnerabilities.html", "refsource": "MISC", "url": "http://www.red-database-security.com/advisory/oracle_webcache_CSS_vulnerabilities.html" }, { "name": "20050428 Cross Site Scripting in Oracle Webcache 9i Adminstrator Application", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=111472423409560\u0026w=2" }, { "name": "13421", "refsource": "BID", "url": "http://www.securityfocus.com/bid/13421" }, { "name": "13422", "refsource": "BID", "url": "http://www.securityfocus.com/bid/13422" }, { "name": "15143", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/15143" }, { "name": "15910", "refsource": "OSVDB", "url": "http://www.osvdb.org/15910" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-1381", "datePublished": "2005-05-02T04:00:00", "dateReserved": "2005-05-02T00:00:00", "dateUpdated": "2024-08-07T21:51:49.589Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-0565
Vulnerability from cvelistv5
Published
2002-06-11 04:00
Modified
2024-08-08 02:56
Severity ?
EPSS score ?
Summary
Oracle 9iAS 1.0.2.x compiles JSP files in the _pages directory with world-readable permissions under the web root, which allows remote attackers to obtain sensitive information derived from the JSP code, including usernames and passwords, via a direct HTTP request to _pages.
References
▼ | URL | Tags |
---|---|---|
http://www.cert.org/advisories/CA-2002-08.html | third-party-advisory, x_refsource_CERT | |
http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf | x_refsource_CONFIRM | |
http://www.kb.cert.org/vuls/id/547459 | third-party-advisory, x_refsource_CERT-VN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/8100 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/4034 | vdb-entry, x_refsource_BID | |
http://marc.info/?l=bugtraq&m=101301440005580&w=2 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:56:37.934Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "CA-2002-08", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" }, { "name": "VU#547459", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/547459" }, { "name": "oracle-appserver-oraclejsp-view-info(8100)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8100" }, { "name": "4034", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/4034" }, { "name": "20020206 JSP translation file access under Oracle 9iAS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=101301440005580\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-02-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Oracle 9iAS 1.0.2.x compiles JSP files in the _pages directory with world-readable permissions under the web root, which allows remote attackers to obtain sensitive information derived from the JSP code, including usernames and passwords, via a direct HTTP request to _pages." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-18T21:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "CA-2002-08", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" }, { "name": "VU#547459", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/547459" }, { "name": "oracle-appserver-oraclejsp-view-info(8100)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8100" }, { "name": "4034", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/4034" }, { "name": "20020206 JSP translation file access under Oracle 9iAS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=101301440005580\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0565", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Oracle 9iAS 1.0.2.x compiles JSP files in the _pages directory with world-readable permissions under the web root, which allows remote attackers to obtain sensitive information derived from the JSP code, including usernames and passwords, via a direct HTTP request to _pages." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "CA-2002-08", "refsource": "CERT", "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "name": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf", "refsource": "CONFIRM", "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" }, { "name": "VU#547459", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/547459" }, { "name": "oracle-appserver-oraclejsp-view-info(8100)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8100" }, { "name": "4034", "refsource": "BID", "url": "http://www.securityfocus.com/bid/4034" }, { "name": "20020206 JSP translation file access under Oracle 9iAS", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=101301440005580\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0565", "datePublished": "2002-06-11T04:00:00", "dateReserved": "2002-06-07T00:00:00", "dateUpdated": "2024-08-08T02:56:37.934Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2002-07-03 04:00
Modified
2024-11-20 23:39
Severity ?
Summary
PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allows remote attackers to cause a denial of service (crash) via an HTTP Authorization header without an authentication type.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf | Patch, Vendor Advisory | |
cve@mitre.org | http://www.cert.org/advisories/CA-2002-08.html | Patch, Third Party Advisory, US Government Resource | |
cve@mitre.org | http://www.kb.cert.org/vuls/id/805915 | US Government Resource | |
cve@mitre.org | http://www.securityfocus.com/bid/4037 | Patch, Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/8099 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.cert.org/advisories/CA-2002-08.html | Patch, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/805915 | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/4037 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/8099 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
oracle | application_server | 1.0.2 | |
oracle | application_server_web_cache | 2.0.0.0 | |
oracle | application_server_web_cache | 2.0.0.1 | |
oracle | application_server_web_cache | 2.0.0.2 | |
oracle | application_server_web_cache | 2.0.0.3 | |
oracle | oracle8i | 8.1.7 | |
oracle | oracle8i | 8.1.7_.1 | |
oracle | oracle9i | 9.0 | |
oracle | oracle9i | 9.0.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:application_server:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "CC62E1B2-6964-4459-A1EF-A6A087C2960F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C272DE0-3717-40D0-99A6-2B4108BF85A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "4959B7CD-218F-47A3-A604-629B69E1905B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "6659ECF3-D355-4357-BB15-DAFA427FCD12", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7B34A419-42C2-44FC-84C7-65699BA07120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:oracle8i:8.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "5E0E5C6A-FFEA-4855-AE5D-65806B6AFA59", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:oracle8i:8.1.7_.1:*:*:*:*:*:*:*", "matchCriteriaId": "11D27BB6-DFA0-4CB7-B546-0E00C096BF37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:oracle9i:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C2720EA-55FB-40B1-BE58-3E16628DA248", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:oracle9i:9.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "D9BB176D-7A94-4A91-89FC-9971E19FF7C6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allows remote attackers to cause a denial of service (crash) via an HTTP Authorization header without an authentication type." } ], "id": "CVE-2002-0566", "lastModified": "2024-11-20T23:39:22.863", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-07-03T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/805915" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/4037" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8099" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/805915" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/4037" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8099" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-07-03 04:00
Modified
2024-11-20 23:39
Severity ?
Summary
Buffer overflows in PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allow remote attackers to cause a denial of service or execute arbitrary code via (1) a long help page request without a dadname, which overflows the resulting HTTP Location header, (2) a long HTTP request to the plsql module, (3) a long password in the HTTP Authorization, (4) a long Access Descriptor (DAD) password in the addadd form, or (5) a long cache directory name.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
oracle | application_server | 1.0.2 | |
oracle | application_server_web_cache | 2.0.0.0 | |
oracle | application_server_web_cache | 2.0.0.1 | |
oracle | application_server_web_cache | 2.0.0.2 | |
oracle | application_server_web_cache | 2.0.0.3 | |
oracle | oracle8i | 8.1.7 | |
oracle | oracle8i | 8.1.7.1 | |
oracle | oracle9i | 9.0 | |
oracle | oracle9i | 9.0.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:application_server:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "CC62E1B2-6964-4459-A1EF-A6A087C2960F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C272DE0-3717-40D0-99A6-2B4108BF85A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "4959B7CD-218F-47A3-A604-629B69E1905B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "6659ECF3-D355-4357-BB15-DAFA427FCD12", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7B34A419-42C2-44FC-84C7-65699BA07120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:oracle8i:8.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "5E0E5C6A-FFEA-4855-AE5D-65806B6AFA59", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:oracle8i:8.1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "F2607015-B358-4963-968C-777E2AE9650D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:oracle9i:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C2720EA-55FB-40B1-BE58-3E16628DA248", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:oracle9i:9.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "D9BB176D-7A94-4A91-89FC-9971E19FF7C6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflows in PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allow remote attackers to cause a denial of service or execute arbitrary code via (1) a long help page request without a dadname, which overflows the resulting HTTP Location header, (2) a long HTTP request to the plsql module, (3) a long password in the HTTP Authorization, (4) a long Access Descriptor (DAD) password in the addadd form, or (5) a long cache directory name." } ], "id": "CVE-2002-0559", "lastModified": "2024-11-20T23:39:21.953", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-07-03T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://online.securityfocus.com/archive/1/254426" }, { "source": "cve@mitre.org", "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/313280" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/659043" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/750299" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/878603" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/923395" }, { "source": "cve@mitre.org", "url": "http://www.nextgenss.com/papers/hpoas.pdf" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/4032" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8095" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8096" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8097" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8098" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://online.securityfocus.com/archive/1/254426" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/313280" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/659043" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/750299" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/878603" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/923395" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.nextgenss.com/papers/hpoas.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/4032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8095" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8096" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8097" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8098" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-05-27 04:00
Modified
2024-11-20 23:41
Severity ?
Summary
Multiple buffer overflows in Oracle Web Cache for Oracle 9i Application Server (9iAS) allow remote attackers to execute arbitrary code via unknown vectors.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.kb.cert.org/vuls/id/291555 | Third Party Advisory, US Government Resource | |
cve@mitre.org | http://www.nextgenss.com/vna/ora-webcache.txt | ||
cve@mitre.org | http://www.securityfocus.com/bid/4856 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/291555 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.nextgenss.com/vna/ora-webcache.txt | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/4856 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
oracle | application_server_web_cache | 2.0.0.0 | |
oracle | application_server_web_cache | 2.0.0.1 | |
oracle | application_server_web_cache | 2.0.0.2 | |
oracle | application_server_web_cache | 2.0.0.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C272DE0-3717-40D0-99A6-2B4108BF85A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "4959B7CD-218F-47A3-A604-629B69E1905B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "6659ECF3-D355-4357-BB15-DAFA427FCD12", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7B34A419-42C2-44FC-84C7-65699BA07120", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in Oracle Web Cache for Oracle 9i Application Server (9iAS) allow remote attackers to execute arbitrary code via unknown vectors." } ], "id": "CVE-2002-1641", "lastModified": "2024-11-20T23:41:47.073", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-05-27T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/291555" }, { "source": "cve@mitre.org", "url": "http://www.nextgenss.com/vna/ora-webcache.txt" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/4856" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/291555" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.nextgenss.com/vna/ora-webcache.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/4856" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-05-03 04:00
Modified
2024-11-20 23:57
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Oracle Webcache 9i allow remote attackers to inject arbitrary web script or HTML via the (1) cache_dump_file or (2) PartialPageErrorPage parameter.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
oracle | application_server_web_cache | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:*:*:*:*:*:*:*:*", "matchCriteriaId": "990EE348-237F-4A9C-B422-AE371A5BAA0A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Oracle Webcache 9i allow remote attackers to inject arbitrary web script or HTML via the (1) cache_dump_file or (2) PartialPageErrorPage parameter." } ], "id": "CVE-2005-1381", "lastModified": "2024-11-20T23:57:12.977", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-05-03T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=111472423409560\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/15143" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.osvdb.org/15910" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.red-database-security.com/advisory/oracle_webcache_CSS_vulnerabilities.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/13421" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/13422" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20309" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=111472423409560\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/15143" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.osvdb.org/15910" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.red-database-security.com/advisory/oracle_webcache_CSS_vulnerabilities.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/13421" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/13422" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20309" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-07-03 04:00
Modified
2024-11-20 23:39
Severity ?
Summary
PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allows remote attackers to bypass authentication for a Database Access Descriptor (DAD) by modifying the URL to reference an alternate DAD that already has valid credentials.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://marc.info/?l=bugtraq&m=101301813117562&w=2 | ||
cve@mitre.org | http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf | Patch, Vendor Advisory | |
cve@mitre.org | http://www.cert.org/advisories/CA-2002-08.html | US Government Resource | |
cve@mitre.org | http://www.kb.cert.org/vuls/id/193523 | Patch, Third Party Advisory, US Government Resource | |
cve@mitre.org | http://www.nextgenss.com/papers/hpoas.pdf | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=101301813117562&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.cert.org/advisories/CA-2002-08.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/193523 | Patch, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.nextgenss.com/papers/hpoas.pdf |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
oracle | application_server | 1.0.2 | |
oracle | application_server_web_cache | 2.0.0.0 | |
oracle | application_server_web_cache | 2.0.0.1 | |
oracle | application_server_web_cache | 2.0.0.2 | |
oracle | application_server_web_cache | 2.0.0.3 | |
oracle | oracle8i | 8.1.7 | |
oracle | oracle8i | 8.1.7.1 | |
oracle | oracle9i | 9.0 | |
oracle | oracle9i | 9.0.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:application_server:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "CC62E1B2-6964-4459-A1EF-A6A087C2960F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C272DE0-3717-40D0-99A6-2B4108BF85A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "4959B7CD-218F-47A3-A604-629B69E1905B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "6659ECF3-D355-4357-BB15-DAFA427FCD12", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7B34A419-42C2-44FC-84C7-65699BA07120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:oracle8i:8.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "5E0E5C6A-FFEA-4855-AE5D-65806B6AFA59", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:oracle8i:8.1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "F2607015-B358-4963-968C-777E2AE9650D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:oracle9i:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C2720EA-55FB-40B1-BE58-3E16628DA248", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:oracle9i:9.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "D9BB176D-7A94-4A91-89FC-9971E19FF7C6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allows remote attackers to bypass authentication for a Database Access Descriptor (DAD) by modifying the URL to reference an alternate DAD that already has valid credentials." } ], "id": "CVE-2002-0564", "lastModified": "2024-11-20T23:39:22.610", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-07-03T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=101301813117562\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/193523" }, { "source": "cve@mitre.org", "url": "http://www.nextgenss.com/papers/hpoas.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=101301813117562\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/193523" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.nextgenss.com/papers/hpoas.pdf" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-05-03 04:00
Modified
2024-11-20 23:57
Severity ?
Summary
The webcacheadmin module in Oracle Webcache 9i allows remote attackers to corrupt arbitrary files via a full pathname in the cache_dump_file parameter.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
oracle | application_server_web_cache | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:*:*:*:*:*:*:*:*", "matchCriteriaId": "990EE348-237F-4A9C-B422-AE371A5BAA0A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The webcacheadmin module in Oracle Webcache 9i allows remote attackers to corrupt arbitrary files via a full pathname in the cache_dump_file parameter." } ], "id": "CVE-2005-1382", "lastModified": "2024-11-20T23:57:13.120", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-05-03T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=111472615519295\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/15143" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.osvdb.org/15909" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.red-database-security.com/advisory/oracle_webcache_append_file_vulnerabilitiy.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/13420" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20310" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=111472615519295\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/15143" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.osvdb.org/15909" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.red-database-security.com/advisory/oracle_webcache_append_file_vulnerabilitiy.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/13420" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20310" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-07-03 04:00
Modified
2024-11-20 23:39
Severity ?
Summary
PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allows remote attackers to obtain sensitive information via the OWA_UTIL stored procedures (1) OWA_UTIL.signature, (2) OWA_UTIL.listprint, or (3) OWA_UTIL.show_query_columns.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
oracle | application_server | 1.0.2 | |
oracle | application_server_web_cache | 2.0.0.0 | |
oracle | application_server_web_cache | 2.0.0.1 | |
oracle | application_server_web_cache | 2.0.0.2 | |
oracle | application_server_web_cache | 2.0.0.3 | |
oracle | oracle8i | 8.1.7 | |
oracle | oracle8i | 8.1.7.1 | |
oracle | oracle9i | 9.0 | |
oracle | oracle9i | 9.0.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:application_server:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "CC62E1B2-6964-4459-A1EF-A6A087C2960F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C272DE0-3717-40D0-99A6-2B4108BF85A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "4959B7CD-218F-47A3-A604-629B69E1905B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "6659ECF3-D355-4357-BB15-DAFA427FCD12", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7B34A419-42C2-44FC-84C7-65699BA07120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:oracle8i:8.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "5E0E5C6A-FFEA-4855-AE5D-65806B6AFA59", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:oracle8i:8.1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "F2607015-B358-4963-968C-777E2AE9650D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:oracle9i:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C2720EA-55FB-40B1-BE58-3E16628DA248", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:oracle9i:9.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "D9BB176D-7A94-4A91-89FC-9971E19FF7C6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allows remote attackers to obtain sensitive information via the OWA_UTIL stored procedures (1) OWA_UTIL.signature, (2) OWA_UTIL.listprint, or (3) OWA_UTIL.show_query_columns." } ], "id": "CVE-2002-0560", "lastModified": "2024-11-20T23:39:22.090", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-07-03T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=101301813117562\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/307835" }, { "source": "cve@mitre.org", "url": "http://www.nextgenss.com/papers/hpoas.pdf" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/4294" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=101301813117562\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/307835" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.nextgenss.com/papers/hpoas.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/4294" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-07-03 04:00
Modified
2024-11-20 23:39
Severity ?
Summary
The default configuration of the PL/SQL Gateway web administration interface in Oracle 9i Application Server 1.0.2.x uses null authentication, which allows remote attackers to gain privileges and modify DAD settings.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
oracle | application_server | 1.0.2 | |
oracle | application_server_web_cache | 2.0.0.0 | |
oracle | application_server_web_cache | 2.0.0.1 | |
oracle | application_server_web_cache | 2.0.0.2 | |
oracle | application_server_web_cache | 2.0.0.3 | |
oracle | oracle8i | 8.1.7 | |
oracle | oracle8i | 8.1.7_.1 | |
oracle | oracle9i | 9.0 | |
oracle | oracle9i | 9.0.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:application_server:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "CC62E1B2-6964-4459-A1EF-A6A087C2960F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C272DE0-3717-40D0-99A6-2B4108BF85A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "4959B7CD-218F-47A3-A604-629B69E1905B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "6659ECF3-D355-4357-BB15-DAFA427FCD12", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7B34A419-42C2-44FC-84C7-65699BA07120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:oracle8i:8.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "5E0E5C6A-FFEA-4855-AE5D-65806B6AFA59", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:oracle8i:8.1.7_.1:*:*:*:*:*:*:*", "matchCriteriaId": "11D27BB6-DFA0-4CB7-B546-0E00C096BF37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:oracle9i:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C2720EA-55FB-40B1-BE58-3E16628DA248", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:oracle9i:9.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "D9BB176D-7A94-4A91-89FC-9971E19FF7C6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The default configuration of the PL/SQL Gateway web administration interface in Oracle 9i Application Server 1.0.2.x uses null authentication, which allows remote attackers to gain privileges and modify DAD settings." } ], "id": "CVE-2002-0561", "lastModified": "2024-11-20T23:39:22.227", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-07-03T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=101301813117562\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/611776" }, { "source": "cve@mitre.org", "url": "http://www.nextgenss.com/papers/hpoas.pdf" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/4292" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=101301813117562\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/611776" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.nextgenss.com/papers/hpoas.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/4292" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-03-25 05:00
Modified
2024-11-20 23:38
Severity ?
Summary
Oracle9iAS Web Cache 2.0.0.x allows remote attackers to cause a denial of service via (1) a request to TCP ports 1100, 4000, 4001, and 4002 with a large number of null characters, and (2) a request to TCP port 4000 with a large number of "." characters.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
oracle | application_server_web_cache | 2.0.0.0 | |
oracle | application_server_web_cache | 2.0.0.1 | |
oracle | application_server_web_cache | 2.0.0.2 | |
oracle | application_server_web_cache | 2.0.0.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C272DE0-3717-40D0-99A6-2B4108BF85A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "4959B7CD-218F-47A3-A604-629B69E1905B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "6659ECF3-D355-4357-BB15-DAFA427FCD12", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.2:*:nt:*:*:*:*:*", "matchCriteriaId": "57084690-D6AF-4320-8C10-A0F6CE38A264", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Oracle9iAS Web Cache 2.0.0.x allows remote attackers to cause a denial of service via (1) a request to TCP ports 1100, 4000, 4001, and 4002 with a large number of null characters, and (2) a request to TCP port 4000 with a large number of \".\" characters." }, { "lang": "es", "value": "Oracle9i Web Cache 2.0.0.x permite a atacantes remotos causar una negaci\u00f3n de servicio v\u00eda: (1) una petici\u00f3n a puertos TCP 1100, 4000, 4001, y 4002 con un n\u00famero grande de car\u00e1cteres nulos, (y 2) una petici\u00f3n al puerto 4000 TCP con un n\u00famero grande de Car\u00e1cteres \".\" ." } ], "id": "CVE-2002-0102", "lastModified": "2024-11-20T23:38:18.927", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-03-25T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://otn.oracle.com/deploy/security/pdf/webcache2.pdf" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/3760" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/3762" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7765" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://otn.oracle.com/deploy/security/pdf/webcache2.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/3760" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/3762" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7765" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-06-01 04:00
Modified
2024-11-20 23:48
Severity ?
Summary
Heap-based buffer overflow in Oracle 9i Application Server Web Cache 9.0.4.0.0, 9.0.3.1.0, 9.0.2.3.0, and 9.0.0.4.0 allows remote attackers to execute arbitrary code via a long HTTP request method header to the Web Cache listener. NOTE: due to the vagueness of the Oracle advisory, it is not clear whether there are additional issues besides this overflow, although the advisory alludes to multiple "vulnerabilities."
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
oracle | application_server_web_cache | 9.0.0.4.0 | |
oracle | application_server_web_cache | 9.0.2.3.0 | |
oracle | application_server_web_cache | 9.0.3.1.0 | |
oracle | application_server_web_cache | 9.0.4.0.0 | |
oracle | e-business_suite | 11i |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:9.0.0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "61FE71CE-F0F5-4D31-9E89-5A8F02D5042B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:9.0.2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A525557-C85F-46C9-9E3A-37D678E398A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:9.0.3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "223CADC9-C7ED-4AAE-9878-84F3261957C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:9.0.4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D499C92-2D65-4318-AC37-46834B2474C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:e-business_suite:11i:*:*:*:*:*:*:*", "matchCriteriaId": "9835D257-9664-4FBC-889D-C3465BC2D7D3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Oracle 9i Application Server Web Cache 9.0.4.0.0, 9.0.3.1.0, 9.0.2.3.0, and 9.0.0.4.0 allows remote attackers to execute arbitrary code via a long HTTP request method header to the Web Cache listener. NOTE: due to the vagueness of the Oracle advisory, it is not clear whether there are additional issues besides this overflow, although the advisory alludes to multiple \"vulnerabilities.\"" } ], "id": "CVE-2004-0385", "lastModified": "2024-11-20T23:48:28.033", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-06-01T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0078.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=107945649127635\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=108144419001770\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://otn.oracle.com/deploy/security/pdf/2004alert66.pdf" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/11118" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.inaccessnetworks.com/ian/services/secadv01.txt" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/413006" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/4249" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/9868" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15463" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0078.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=107945649127635\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=108144419001770\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://otn.oracle.com/deploy/security/pdf/2004alert66.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/11118" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.inaccessnetworks.com/ian/services/secadv01.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/413006" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/4249" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/9868" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15463" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-07-03 04:00
Modified
2024-11-20 23:39
Severity ?
Summary
Oracle 9iAS 1.0.2.x compiles JSP files in the _pages directory with world-readable permissions under the web root, which allows remote attackers to obtain sensitive information derived from the JSP code, including usernames and passwords, via a direct HTTP request to _pages.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
oracle | application_server | 1.0.2 | |
oracle | application_server_web_cache | 2.0.0.0 | |
oracle | application_server_web_cache | 2.0.0.1 | |
oracle | application_server_web_cache | 2.0.0.2 | |
oracle | application_server_web_cache | 2.0.0.3 | |
oracle | oracle9i | 9.0 | |
oracle | oracle9i | 9.0.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:application_server:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "CC62E1B2-6964-4459-A1EF-A6A087C2960F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C272DE0-3717-40D0-99A6-2B4108BF85A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "4959B7CD-218F-47A3-A604-629B69E1905B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "6659ECF3-D355-4357-BB15-DAFA427FCD12", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7B34A419-42C2-44FC-84C7-65699BA07120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:oracle9i:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C2720EA-55FB-40B1-BE58-3E16628DA248", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:oracle9i:9.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "D9BB176D-7A94-4A91-89FC-9971E19FF7C6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Oracle 9iAS 1.0.2.x compiles JSP files in the _pages directory with world-readable permissions under the web root, which allows remote attackers to obtain sensitive information derived from the JSP code, including usernames and passwords, via a direct HTTP request to _pages." } ], "id": "CVE-2002-0565", "lastModified": "2024-11-20T23:39:22.733", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-07-03T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=101301440005580\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/547459" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/4034" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8100" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=101301440005580\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/547459" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/4034" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8100" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-07-03 04:00
Modified
2024-11-20 23:39
Severity ?
Summary
The default configuration of Oracle 9i Application Server 1.0.2.x allows remote anonymous users to access sensitive services without authentication, including Dynamic Monitoring Services (1) dms0, (2) dms/DMSDump, (3) servlet/DMSDump, (4) servlet/Spy, (5) soap/servlet/Spy, and (6) dms/AggreSpy; and Oracle Java Process Manager (7) oprocmgr-status and (8) oprocmgr-service, which can be used to control Java processes.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
oracle | application_server | 1.0.2 | |
oracle | application_server_web_cache | 2.0.0.0 | |
oracle | application_server_web_cache | 2.0.0.1 | |
oracle | application_server_web_cache | 2.0.0.2 | |
oracle | application_server_web_cache | 2.0.0.3 | |
oracle | oracle8i | 8.1.7 | |
oracle | oracle8i | 8.1.7_.1 | |
oracle | oracle9i | 9.0 | |
oracle | oracle9i | 9.0.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:application_server:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "CC62E1B2-6964-4459-A1EF-A6A087C2960F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C272DE0-3717-40D0-99A6-2B4108BF85A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "4959B7CD-218F-47A3-A604-629B69E1905B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "6659ECF3-D355-4357-BB15-DAFA427FCD12", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7B34A419-42C2-44FC-84C7-65699BA07120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:oracle8i:8.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "5E0E5C6A-FFEA-4855-AE5D-65806B6AFA59", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:oracle8i:8.1.7_.1:*:*:*:*:*:*:*", "matchCriteriaId": "11D27BB6-DFA0-4CB7-B546-0E00C096BF37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:oracle9i:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C2720EA-55FB-40B1-BE58-3E16628DA248", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:oracle9i:9.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "D9BB176D-7A94-4A91-89FC-9971E19FF7C6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The default configuration of Oracle 9i Application Server 1.0.2.x allows remote anonymous users to access sensitive services without authentication, including Dynamic Monitoring Services (1) dms0, (2) dms/DMSDump, (3) servlet/DMSDump, (4) servlet/Spy, (5) soap/servlet/Spy, and (6) dms/AggreSpy; and Oracle Java Process Manager (7) oprocmgr-status and (8) oprocmgr-service, which can be used to control Java processes." } ], "id": "CVE-2002-0563", "lastModified": "2024-11-20T23:39:22.480", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-07-03T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=101301813117562\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1009167" }, { "source": "cve@mitre.org", "url": "http://www.appsecinc.com/Policy/PolicyCheck7024.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/168795" }, { "source": "cve@mitre.org", "url": "http://www.nextgenss.com/papers/hpoas.pdf" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/13152" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/705" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/4293" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8455" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=101301813117562\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1009167" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.appsecinc.com/Policy/PolicyCheck7024.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/168795" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.nextgenss.com/papers/hpoas.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/13152" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/705" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/4293" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8455" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-07-03 04:00
Modified
2024-11-20 23:39
Severity ?
Summary
The default configuration of Oracle 9i Application Server 1.0.2.x running Oracle JSP or SQLJSP stores globals.jsa under the web root, which allows remote attackers to gain sensitive information including usernames and passwords via a direct HTTP request to globals.jsa.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://marc.info/?l=bugtraq&m=101301440005580&w=2 | ||
cve@mitre.org | http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf | Patch, Vendor Advisory | |
cve@mitre.org | http://www.cert.org/advisories/CA-2002-08.html | Patch, Third Party Advisory, US Government Resource | |
cve@mitre.org | http://www.kb.cert.org/vuls/id/698467 | US Government Resource | |
cve@mitre.org | http://www.securityfocus.com/bid/4034 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=101301440005580&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.cert.org/advisories/CA-2002-08.html | Patch, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/698467 | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/4034 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
oracle | application_server | 1.0.2 | |
oracle | application_server_web_cache | 2.0.0.0 | |
oracle | application_server_web_cache | 2.0.0.1 | |
oracle | application_server_web_cache | 2.0.0.2 | |
oracle | application_server_web_cache | 2.0.0.3 | |
oracle | oracle9i | 9.0 | |
oracle | oracle9i | 9.0.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:application_server:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "CC62E1B2-6964-4459-A1EF-A6A087C2960F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C272DE0-3717-40D0-99A6-2B4108BF85A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "4959B7CD-218F-47A3-A604-629B69E1905B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "6659ECF3-D355-4357-BB15-DAFA427FCD12", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7B34A419-42C2-44FC-84C7-65699BA07120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:oracle9i:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C2720EA-55FB-40B1-BE58-3E16628DA248", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:oracle9i:9.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "D9BB176D-7A94-4A91-89FC-9971E19FF7C6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The default configuration of Oracle 9i Application Server 1.0.2.x running Oracle JSP or SQLJSP stores globals.jsa under the web root, which allows remote attackers to gain sensitive information including usernames and passwords via a direct HTTP request to globals.jsa." } ], "id": "CVE-2002-0562", "lastModified": "2024-11-20T23:39:22.360", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-07-03T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=101301440005580\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/698467" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/4034" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=101301440005580\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-2002-08.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/698467" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/4034" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-03-25 05:00
Modified
2024-11-20 23:38
Severity ?
Summary
An installer program for Oracle9iAS Web Cache 2.0.0.x creates executable and configuration files with insecure permissions, which allows local users to gain privileges by (1) running webcached or (2) obtaining the administrator password from webcache.xml.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
oracle | application_server_web_cache | 2.0.0.0 | |
oracle | application_server_web_cache | 2.0.0.1 | |
oracle | application_server_web_cache | 2.0.0.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C272DE0-3717-40D0-99A6-2B4108BF85A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "4959B7CD-218F-47A3-A604-629B69E1905B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "6659ECF3-D355-4357-BB15-DAFA427FCD12", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An installer program for Oracle9iAS Web Cache 2.0.0.x creates executable and configuration files with insecure permissions, which allows local users to gain privileges by (1) running webcached or (2) obtaining the administrator password from webcache.xml." }, { "lang": "es", "value": "El programa de instalaci\u00f3n para el Oracle9i Web cache 2.0.0.x crea ejecutables y archivos de configuraci\u00f3n con permisos inseguros, que permiten a usuarios locales asignarse privilegios: (1) ejecutar webcache y (2) obtener la contrase\u00f1a de administrador de webcache.xml." } ], "id": "CVE-2002-0103", "lastModified": "2024-11-20T23:38:19.060", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-03-25T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=101041510727937\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://otn.oracle.com/deploy/security/pdf/webcache2.pdf" }, { "source": "cve@mitre.org", "url": "http://www.iss.net/security_center/static/7766.php" }, { "source": "cve@mitre.org", "url": "http://www.iss.net/security_center/static/7768.php" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/3761" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/3764" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=101041510727937\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://otn.oracle.com/deploy/security/pdf/webcache2.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.iss.net/security_center/static/7766.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.iss.net/security_center/static/7768.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/3761" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/3764" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2001-12-06 05:00
Modified
2024-11-20 23:36
Severity ?
Summary
Buffer overflow in Oracle9iAS Web Cache 2.0.0.1 allows remote attackers to execute arbitrary code via a long HTTP GET request.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
oracle | application_server_web_cache | 2.0.0.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:application_server_web_cache:2.0.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "4959B7CD-218F-47A3-A604-629B69E1905B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Oracle9iAS Web Cache 2.0.0.1 allows remote attackers to execute arbitrary code via a long HTTP GET request." } ], "id": "CVE-2001-0836", "lastModified": "2024-11-20T23:36:15.187", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2001-12-06T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=100342151132277\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=100395487007578\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://otn.oracle.com/deploy/security/pdf/webcache.pdf" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-2001-29.html" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/649979" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/5534" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7306" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=100342151132277\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=100395487007578\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://otn.oracle.com/deploy/security/pdf/webcache.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-2001-29.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/649979" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/5534" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7306" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }