Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
oracle database server 8.1.5 vulnerabilities and exploits
(subscribe to this query)
641
VMScore
CVE-2001-0943
dbsnmp in Oracle 8.0.5 and 8.1.5, under certain conditions, trusts the PATH environment variable to find and execute the (1) chown or (2) chgrp commands, which allows local users to execute arbitrary code by modifying the PATH to point to Trojan Horse programs.
Oracle Database Server 8.0.5
Oracle Database Server 8.1.5
725
VMScore
CVE-2002-1767
Buffer overflow in tnslsnr of Oracle 8i Database Server 8.1.5 for Linux allows local users to execute arbitrary code as the oracle user via a long command line argument.
Oracle Database Server 8.1.5
1 EDB exploit
668
VMScore
CVE-2002-0567
Oracle 8i and 9i with PL/SQL package for External Procedures (EXTPROC) allows remote malicious users to bypass authentication and execute arbitrary functions by using the TNS Listener to directly connect to the EXTPROC process.
Oracle Database Server 8.0.3
Oracle Database Server 8.0.4
Oracle Oracle8i 8.1.5
Oracle Oracle8i 8.1.6
Oracle Oracle8i Enterprise 8.1.5.0.2
Oracle Oracle8i Enterprise 8.1.5.1.0
Oracle Database Server 8.0.5
Oracle Database Server 8.0.5.1
Oracle Oracle8i 8.1.7
Oracle Oracle8i 8.1.7.1
Oracle Oracle8i Enterprise 8.1.6.0.0
Oracle Oracle8i Enterprise 8.1.6.1.0
Oracle Database Server 8.0.1
Oracle Database Server 8.0.2
Oracle Database Server 8.1.6
Oracle Database Server 8.1.7
Oracle Database Server 8.1.7.0.0
Oracle Oracle8i Enterprise 8.0.6.0.1
Oracle Oracle8i Enterprise 8.1.5.0.0
Oracle Oracle9i 9.0
Oracle Oracle9i 9.0.1
Oracle Database Server 8.0.6
801
VMScore
CVE-2003-0222
Stack-based buffer overflow in Oracle Net Services for Oracle Database Server 9i release 2 and previous versions allows malicious users to execute arbitrary code via a "CREATE DATABASE LINK" query containing a connect string with a long USING parameter.
Oracle Database Server 7.3.3
Oracle Database Server 7.3.4
Oracle Database Server 8.0.6
Oracle Database Server 8.1.5
Oracle Database Server 8.1.6
Oracle Oracle8i 8.1.5
Oracle Oracle8i 8.1.6
Oracle Oracle9i 9.0.1.2
Oracle Oracle9i 9.0.1.3
Oracle Database Server 8.0.1
Oracle Database Server 8.0.2
Oracle Database Server 8.1.7
Oracle Database Server 9.2.1
Oracle Oracle8i 8.1.7
Oracle Oracle8i 8.1.7.1
Oracle Oracle9i 9.0.1.4
Oracle Oracle9i 9.0.2
Oracle Database Server 8.0.3
Oracle Database Server 8.0.4
Oracle Database Server 9.2.2
Oracle Oracle8i 8.0.6
Oracle Oracle8i 8.1.7.4
470
VMScore
CVE-1999-0888
dbsnmp in Oracle Intelligent Agent allows local users to gain privileges by setting the ORACLE_HOME environmental variable, which dbsnmp uses to find the nmiconf.tcl script.
Oracle Database Server 7.3.3
Oracle Oracle8i 8.0.3
Oracle Oracle8i 8.0.4
Oracle Oracle8i 8.0.5
Oracle Oracle8i 8.0.5.1
Oracle Database Server 7.3.4
Oracle Oracle8i 8.1.5
2 EDB exploits
668
VMScore
CVE-2005-3641
Oracle Databases running on Windows XP with Simple File Sharing enabled, allows remote malicious users to bypass authentication by supplying a valid username.
Oracle Database Server 7.0.64
Oracle Database Server 8.0.3
Oracle Database Server 8.0.5
Oracle Database Server 8.1.6
Oracle Database Server 8.1.7.4
Oracle Oracle10g Enterprise 10.1.0.3.1
Oracle Oracle10g Enterprise 9.0.4.0
Oracle Oracle10g Standard 10.1.0.3
Oracle Oracle10g Standard 10.1.0.4
Oracle Oracle8i Enterprise 8.0.6.0.1
Oracle Oracle8i Enterprise 8.1.5.0.2
Oracle Oracle8i Enterprise 8.1.6.0.0
Oracle Oracle8i Standard 8.0.6
Oracle Oracle8i Standard 8.1.5
Oracle Oracle9i Enterprise 9.0.1
Oracle Oracle9i Enterprise 9.0.1.5
Oracle Oracle9i Enterprise 9.2.0.1
Oracle Oracle9i Enterprise 9.2.0.3
Oracle Oracle9i Enterprise 9.2.0.6
Oracle Oracle9i Personal 9.0.1.5 Fips
Oracle Oracle9i Personal 9.0.4
Oracle Oracle9i Standard 8.1.7
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4761
command injection
CVE-2024-3676
IDOR
CVE-2024-30039
CVE-2024-32113
CVE-2024-30049
CVE-2024-4776
SQL injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started