Services
Oracle Audit / Hardening
Security Training
Consulting

Information
Oracle Security Blog
Published Alerts
Upcoming Alerts
Patch Information
Whitepaper
Presentations
Oracle Fact Sheets
Exploits
Tutorials
Videos
Scripts

News & Events
Events
News

Company
Contact
People
Partner
Impressum
Sitemap


Search



Search Red-Database-Security
Oracle 8i Exploits



This section contains exploits for Oracle 8i. A database with the latest patches,
e.g. Oracle Critical Patch Update October 2006, is immune.

2005

 

25-apr-2005 SQL Injection vulnerability in CTXSYS.DRILOAD - [Become DBA]
25-apr-2005 Buffer Overflow in DBMS_SYSTEM.KSDWRT - [Crash Database]
25-apr-2005 Buffer Overflow Create Database Link - [Crash Database]
10-may-2005 Buffer Overflow in various file parameters [Crash Database / Execute Code]
10-may-2005 Buffer Overflow in DBMS_REPCAT_FGT [Crash Database / Execute Code]
10-may-2005 Buffer Overflow in DBMS_REPCAT_ADMIN [Crash Database / Execute Code]
10-may-2005 Buffer Overflow in DBMS_REPCAT [Crash Database / Execute Code]
05-may-2005 Directory Traversal via UTL_FILE [Become DBA]
02-may-2005 Become DBA via DBMS_SYS_SQL [Become DBA]



© 2005-2006 by Red-Database-Security GmbH - last update: 2-Nov-2006

Definition Exploit
An exploit is a common term in the computer security to refer to a piece of software that take advantage of a bug or vulnerability leading to a privilege escalation or d.o.s. on a computer system.
Computer security experts are using exploit code to test if a patch is working properly.