cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2006-0552,https://securityvulnerability.io/vulnerability/CVE-2006-0552,,"Unspecified vulnerability in the Net Listener component of Oracle Database server 8.1.7.4, 9.0.1.5, 9.0.1.5 FIPS, and 9.2.0.7 has unspecified impact and attack vectors, as identified by Oracle Vuln# DB11.",Oracle,"Oracle10g,Application Server,Enterpriseone,Oracle8i,Developer Suite,Collaboration Suite,Database Server,10g Enterprise Manager Grid Control,Peoplesoft Enterprise Portal,E-business Suite,Oracle9i,Workflow",,,0.1231599971652031,false,false,false,false,,false,false,2006-02-04T11:00:00.000Z,0 CVE-2006-0262,https://securityvulnerability.io/vulnerability/CVE-2006-0262,,"Unspecified vulnerability in the Net Foundation Layer component of Oracle Database server 8.1.7.4, 9.0.1.5, 9.0.1.5 FIPS, 9.2.0.6, and 10.1.0.4 has unspecified impact and attack vectors, as identified by Oracle Vuln# DB08.",Oracle,"Oracle8i,Database Server,Oracle10g,Oracle9i",,,0.0759200006723404,false,false,false,false,,false,false,2006-01-18T11:00:00.000Z,0 CVE-2006-0271,https://securityvulnerability.io/vulnerability/CVE-2006-0271,,"Unspecified vulnerability in the Upgrade & Downgrade component of Oracle Database server 8.1.7.4, 9.0.1.5, 9.2.0.7, and 10.1.0.4 has unspecified impact and attack vectors, as identified by Oracle Vuln# DB28. NOTE: details are unavailable from Oracle, but they have not publicly disputed a claim by a reliable independent researcher that states that the problem is SQL injection in the DBMS_REGISTRY package in certain parameters to the (1) IS_COMPONENT, (2) GET_COMP_OPTION, (3) DISABLE_DDL_TRIGGERS, (4) SCRIPT_EXISTS, (5) COMP_PATH, (6) GATHER_STATS, (7) NOTHING_SCRIPT, and (8) VALIDATE_COMPONENTS functions.",Oracle,"Oracle8i,Database Server,Oracle10g,Oracle9i",,,0.009610000066459179,false,false,false,false,,false,false,2006-01-18T11:00:00.000Z,0 CVE-2005-3641,https://securityvulnerability.io/vulnerability/CVE-2005-3641,,"Oracle Databases running on Windows XP with Simple File Sharing enabled, allows remote attackers to bypass authentication by supplying a valid username.",Oracle,"Oracle10g,Oracle9i,Database Server,Oracle8i,Database Server Lite",,,0.00343999988399446,false,false,false,false,,false,false,2005-11-16T21:22:00.000Z,0 CVE-2004-0638,https://securityvulnerability.io/vulnerability/CVE-2004-0638,,"Buffer overflow in the KSDWRTB function in the dbms_system package (dbms_system.ksdwrt) for Oracle 9i Database Server Release 2 9.2.0.3 and 9.2.0.4, 9i Release 1 9.0.1.4 and 9.0.1.5, and 8i Release 1 8.1.7.4, allows remote authorized users to execute arbitrary code via a long second argument.",Oracle,"Oracle8i,Oracle9i",,,0.016519999131560326,false,false,false,false,,false,false,2004-12-31T05:00:00.000Z,0 CVE-2004-0637,https://securityvulnerability.io/vulnerability/CVE-2004-0637,,"Oracle Database Server 8.1.7.4 through 9.2.0.4 allows local users to execute commands with additional privileges via the ctxsys.driload package, which is publicly accessible.",Oracle,"Oracle8i,Oracle9i",,,0.9038500189781189,false,false,false,false,,false,false,2004-09-02T04:00:00.000Z,0 CVE-2004-1371,https://securityvulnerability.io/vulnerability/CVE-2004-1371,,Stack-based buffer overflow in Oracle 9i and 10g allows remote attackers to execute arbitrary code via a long token in the text of a wrapped procedure.,Oracle,"Oracle10g,Oracle8i,Oracle9i,Database Server,Collaboration Suite,Application Server,E-business Suite,Enterprise Manager,Enterprise Manager Grid Control,Enterprise Manager Database Control",,,0.09664999693632126,false,false,false,false,,false,false,2004-08-04T04:00:00.000Z,0 CVE-2004-1363,https://securityvulnerability.io/vulnerability/CVE-2004-1363,,"Buffer overflow in extproc in Oracle 10g allows remote attackers to execute arbitrary code via environment variables in the library name, which are expanded after the length check is performed.",Oracle,"Oracle10g,Oracle8i,Oracle9i,Collaboration Suite,Application Server,E-business Suite,Enterprise Manager,Enterprise Manager Grid Control,Enterprise Manager Database Control",9.8,CRITICAL,0.05110999941825867,false,false,false,false,,false,false,2004-08-04T04:00:00.000Z,0 CVE-2004-1368,https://securityvulnerability.io/vulnerability/CVE-2004-1368,,ISQL*Plus in Oracle 10g Application Server allows remote attackers to execute arbitrary files via an absolute pathname in the file parameter to the load.uix script.,Oracle,"Oracle10g,Oracle8i,Oracle9i,Collaboration Suite,Application Server,E-business Suite,Enterprise Manager,Enterprise Manager Grid Control,Enterprise Manager Database Control",,,0.09200000017881393,false,false,false,false,,false,false,2004-08-04T04:00:00.000Z,0 CVE-2004-1366,https://securityvulnerability.io/vulnerability/CVE-2004-1366,,"Oracle 10g Database Server stores the password for the SYSMAN account in cleartext in the world-readable emoms.properties file, which could allow local users to gain DBA privileges.",Oracle,"Oracle10g,Oracle8i,Oracle9i,Collaboration Suite,Application Server,E-business Suite,Enterprise Manager,Enterprise Manager Grid Control,Enterprise Manager Database Control",,,0.0004600000102072954,false,false,false,false,,false,false,2004-08-04T04:00:00.000Z,0 CVE-2004-1365,https://securityvulnerability.io/vulnerability/CVE-2004-1365,,"Extproc in Oracle 9i and 10g does not require authentication to load a library or execute a function, which allows local users to execute arbitrary commands as the Oracle user.",Oracle,"Oracle10g,Oracle8i,Oracle9i,Collaboration Suite,Application Server,E-business Suite,Enterprise Manager,Enterprise Manager Grid Control,Enterprise Manager Database Control",,,0.0004600000102072954,false,false,false,false,,false,false,2004-08-04T04:00:00.000Z,0 CVE-2004-1370,https://securityvulnerability.io/vulnerability/CVE-2004-1370,,"Multiple SQL injection vulnerabilities in PL/SQL procedures that run with definer rights in Oracle 9i and 10g allow remote attackers to execute arbitrary SQL commands and gain privileges via (1) DBMS_EXPORT_EXTENSION, (2) WK_ACL.GET_ACL, (3) WK_ACL.STORE_ACL, (4) WK_ADM.COMPLETE_ACL_SNAPSHOT, (5) WK_ACL.DELETE_ACLS_WITH_STATEMENT, or (6) DRILOAD.VALIDATE_STMT.",Oracle,"Oracle10g,Oracle8i,Oracle9i,Collaboration Suite,Application Server,E-business Suite,Enterprise Manager,Enterprise Manager Grid Control,Enterprise Manager Database Control",,,0.0030900000128895044,false,false,false,false,,false,false,2004-08-04T04:00:00.000Z,0 CVE-2004-1364,https://securityvulnerability.io/vulnerability/CVE-2004-1364,,Directory traversal vulnerability in extproc in Oracle 9i and 10g allows remote attackers to access arbitrary libraries outside of the $ORACLE_HOME\bin directory.,Oracle,"Oracle10g,Oracle8i,Oracle9i,Collaboration Suite,Application Server,E-business Suite,Enterprise Manager,Enterprise Manager Grid Control,Enterprise Manager Database Control",,,0.03726999834179878,false,false,false,false,,false,false,2004-08-04T04:00:00.000Z,0 CVE-2004-1369,https://securityvulnerability.io/vulnerability/CVE-2004-1369,,The TNS Listener in Oracle 10g allows remote attackers to cause a denial of service (listener crash) via a malformed service_register_NSGR request containing a value that is used as an invalid offset for a pointer that references incorrect memory.,Oracle,"Oracle10g,Oracle8i,Oracle9i,Collaboration Suite,Application Server,E-business Suite,Enterprise Manager,Enterprise Manager Grid Control,Enterprise Manager Database Control",,,0.015039999969303608,false,false,false,false,,false,false,2004-08-04T04:00:00.000Z,0 CVE-2004-1367,https://securityvulnerability.io/vulnerability/CVE-2004-1367,,"Oracle 10g Database Server, when installed with a password that contains an exclamation point (""!"") for the (1) DBSNMP or (2) SYSMAN user, generates an error that logs the password in the world-readable postDBCreation.log file, which could allow local users to obtain that password and use it against SYS or SYSTEM accounts, which may have been installed with the same password.",Oracle,"Oracle10g,Oracle8i,Oracle9i,Collaboration Suite,Application Server,E-business Suite,Enterprise Manager,Enterprise Manager Grid Control,Enterprise Manager Database Control",,,0.0004799999878741801,false,false,false,false,,false,false,2004-08-04T04:00:00.000Z,0 CVE-2004-1362,https://securityvulnerability.io/vulnerability/CVE-2004-1362,,"The PL/SQL module for the Oracle HTTP Server in Oracle Application Server 10g, when using the WE8ISO8859P1 character set, does not perform character conversions properly, which allows remote attackers to bypass access restrictions for certain procedures via an encoded URL with ""%FF"" encoded sequences that are improperly converted to ""Y"" characters.",Oracle,"Oracle10g,Oracle8i,Oracle9i,Collaboration Suite,Application Server,E-business Suite,Enterprise Manager,Enterprise Manager Grid Control,Enterprise Manager Database Control",,,0.008270000107586384,false,false,false,false,,false,false,2004-08-04T04:00:00.000Z,0 CVE-2004-1707,https://securityvulnerability.io/vulnerability/CVE-2004-1707,,"The (1) dbsnmp and (2) nmo programs in Oracle 8i, Oracle 9i, and Oracle IAS 9.0.2.0.1, on Unix systems, use a default path to find and execute library files while operating at raised privileges, which allows certain Oracle user accounts to gain root privileges via a modified libclntsh.so.9.0.",Oracle,"Oracle8i,Oracle9i,Application Server,Database Server Lite,Application Server Portal",,,0.06449999660253525,false,false,false,false,,false,false,2004-07-30T04:00:00.000Z,0 CVE-2003-0634,https://securityvulnerability.io/vulnerability/CVE-2003-0634,,"Stack-based buffer overflow in the PL/SQL EXTPROC functionality for Oracle9i Database Release 2 and 1, and Oracle 8i, allows authenticated database users, and arbitrary database users in some cases, to execute arbitrary code via a long library name.",Oracle,"Oracle8i,Oracle9i",,,0.016170000657439232,false,false,false,false,,false,false,2003-08-27T04:00:00.000Z,0 CVE-2003-0222,https://securityvulnerability.io/vulnerability/CVE-2003-0222,,"Stack-based buffer overflow in Oracle Net Services for Oracle Database Server 9i release 2 and earlier allows attackers to execute arbitrary code via a ""CREATE DATABASE LINK"" query containing a connect string with a long USING parameter.",Oracle,"Database Server,Oracle8i,Oracle9i",,,0.08692999929189682,false,false,false,true,true,false,false,2003-05-12T04:00:00.000Z,0 CVE-2003-0095,https://securityvulnerability.io/vulnerability/CVE-2003-0095,,"Buffer overflow in ORACLE.EXE for Oracle Database Server 9i, 8i, 8.1.7, and 8.0.6 allows remote attackers to execute arbitrary code via a long username that is provided during login, as exploitable through client applications that perform their own authentication, as demonstrated using LOADPSP.",Oracle,"Oracle9i,Database Server,Oracle8i",,,0.11416000127792358,false,false,false,false,,false,false,2003-03-03T05:00:00.000Z,0 CVE-2003-0096,https://securityvulnerability.io/vulnerability/CVE-2003-0096,,"Multiple buffer overflows in Oracle 9i Database release 2, Release 1, 8i, 8.1.7, and 8.0.6 allow remote attackers to execute arbitrary code via (1) a long conversion string argument to the TO_TIMESTAMP_TZ function, (2) a long time zone argument to the TZ_OFFSET function, or (3) a long DIRECTORY parameter to the BFILENAME function.",Oracle,"Oracle9i,Database Server,Oracle8i",,,0.028769999742507935,false,false,false,false,,false,false,2003-03-03T05:00:00.000Z,0 CVE-2002-1118,https://securityvulnerability.io/vulnerability/CVE-2002-1118,,"TNS Listener in Oracle Net Services for Oracle 9i 9.2.x and 9.0.x, and Oracle 8i 8.1.x, allows remote attackers to cause a denial of service (hang or crash) via a SERVICE_CURLOAD command.",Oracle,"Oracle8i,Oracle9i",,,0.021530000492930412,false,false,false,false,,false,false,2002-10-28T05:00:00.000Z,0 CVE-2002-0843,https://securityvulnerability.io/vulnerability/CVE-2002-0843,,"Buffer overflows in the ApacheBench benchmark support program (ab.c) in Apache before 1.3.27, and Apache 2.x before 2.0.43, allow a malicious web server to cause a denial of service and possibly execute arbitrary code via a long response.",Oracle,"Application Server,Http Server,Oracle8i,Database Server",,,0.007439999841153622,false,false,false,false,,false,false,2002-10-11T04:00:00.000Z,0 CVE-2002-0857,https://securityvulnerability.io/vulnerability/CVE-2002-0857,,"Format string vulnerabilities in Oracle Listener Control utility (lsnrctl) for Oracle 9.2 and 9.0, 8.1, and 7.3.4, allow remote attackers to execute arbitrary code on the Oracle DBA system by placing format strings into certain entries in the listener.ora configuration file.",Oracle,"Oracle8i,Database Server",,,0.052239999175071716,false,false,false,false,,false,false,2002-09-05T04:00:00.000Z,0 CVE-2002-0858,https://securityvulnerability.io/vulnerability/CVE-2002-0858,,"catsnmp in Oracle 9i and 8i is installed with a dbsnmp user with a default dbsnmp password, which allows attackers to perform restricted database operations and possibly gain other privileges.",Oracle,"Oracle9i,Oracle8i",,,0.027060000225901604,false,false,false,false,,false,false,2002-09-05T04:00:00.000Z,0