Vulnerabilities > Oracle

DATE CVE VULNERABILITY TITLE RISK
2008-08-05 CVE-2008-3431 Unspecified vulnerability in Oracle Virtualbox 1.6.0/1.6.2
The VBoxDrvNtDeviceControl function in VBoxDrv.sys in Sun xVM VirtualBox before 1.6.4 uses the METHOD_NEITHER communication method for IOCTLs and does not properly validate a buffer associated with the Irp object, which allows local users to gain privileges by opening the \\.\VBoxDrv device and calling DeviceIoControl to send a crafted kernel address.
local
low complexity
oracle
8.8
2005-07-18 CVE-2005-2293 Incomplete Cleanup vulnerability in Oracle Forms Builder 9.0.4
Oracle Formsbuilder 9.0.4 stores database usernames and passwords in a temporary file, which is not deleted after it is used, which allows local users to obtain sensitive information.
local
low complexity
oracle CWE-459
5.5
2004-08-04 CVE-2004-1363 Incorrect Calculation of Buffer Size vulnerability in Oracle products
Buffer overflow in extproc in Oracle 10g allows remote attackers to execute arbitrary code via environment variables in the library name, which are expanded after the length check is performed.
network
low complexity
oracle CWE-131
critical
9.8
2003-06-30 CVE-2003-0411 Improper Handling of Case Sensitivity vulnerability in Oracle SUN ONE Application Server 7.0
Sun ONE Application Server 7.0 for Windows 2000/XP allows remote attackers to obtain JSP source code via a request that uses the uppercase ".JSP" extension instead of the lowercase .jsp extension.
network
low complexity
oracle CWE-178
7.5
2002-10-11 CVE-2002-0969 Classic Buffer Overflow vulnerability in Oracle Mysql
Buffer overflow in MySQL daemon (mysqld) before 3.23.50, and 4.0 beta before 4.02, on the Win32 platform, allows local users to execute arbitrary code via a long "datadir" parameter in the my.ini initialization file, whose permissions on Windows allow Full Control to the Everyone group.
local
low complexity
oracle CWE-120
7.8
2001-06-18 CVE-2001-0249 Incorrect Calculation of Buffer Size vulnerability in multiple products
Heap overflow in FTP daemon in Solaris 8 allows remote attackers to execute arbitrary commands by creating a long pathname and calling the LIST command, which uses glob to generate long strings.
network
low complexity
hp oracle sgi CWE-131
critical
9.8