Browsing the "oracle" Tag

Oracle Privilege Escalation / Denial Of Service / Code Execution ≈ Packet Storm

February 2nd, 2021 📆 | 2097 Views ⚑

The Oracle CPU dated 2020 Jan 14 included patches for various issuesrelated to database links and gateways (“Oracle Heterogeneous Services”).Two

Tagged with:




Oracle WebLogic Server 12.2.1.0 Remote Code Execution ≈ Packet Storm

January 27th, 2021 📆 | 7436 Views ⚑

# Exploit Title: Oracle WebLogic Server 12.2.1.0 – RCE (Unauthenticated)# Google Dork: inurl:\”/console/login/LoginForm.jsp\”# Date: 25/1/2021# Exploit Author: CHackA0101# Vendor Homepage:

Tagged with:




Oracle WebLogic Server 14.1.1.0 Remote Code Execution ≈ Packet Storm

January 23rd, 2021 📆 | 5570 Views ⚑

# Exploit Title: Oracle WebLogic Server 14.1.1.0 – RCE (Authenticated)# Date: 2021-01-21# Exploit Author: Photubias # Vendor Advisory: 1] https://www.oracle.com/security-alerts/cpujan2021.html#

Tagged with:




Oracle Business Intelligence Enterprise Edition 11.1.1.7.140715 XSS ≈ Packet Storm

January 20th, 2021 📆 | 2619 Views ⚑

# Exploit Title: Oracle Business Intelligence Enterprise Edition 11.1.1.7.140715 - Stored XSS# Exploit Author: omurugur# Vendor Homepage: https://www.oracle.com/security-alerts/cpujan2021.html# Version: 11.1.1.7.140715#

Tagged with:




Oracle Solaris SunSSH PAM parse_user_name() Buffer Overflow ≈ Packet Storm

December 18th, 2020 📆 | 7705 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::Remote Rank = NormalRanking prepend Msf::Exploit::Remote::AutoCheckinclude Msf::Exploit::Remote::CheckModuleinclude Msf::Exploit::Remote::SSH

Tagged with:




Oracle WebLogic Server Administration Console Handle Remote Code Execution ≈ Packet Storm

November 19th, 2020 📆 | 6278 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking prepend Msf::Exploit::Remote::AutoCheckinclude Msf::Exploit::Remote::HttpClientinclude Msf::Exploit::CmdStagerinclude

Tagged with:




Oracle Rushes Emergency Fix for Critical WebLogic Server Flaw – Threatpost

November 3rd, 2020 📆 | 4879 Views ⚑

Oracle Rushes Emergency Fix for Critical WebLogic Server Flaw Threatpost Source link

Tagged with:




Oracle Business Intelligence Enterprise Edition 5.5.0.0.0 / 12.2.1.3.0 / 12.2.1.4.0 – ‘getPreviewImage’ Directory Traversal/Local File Inclusion

October 29th, 2020 📆 | 8311 Views ⚑

# Exploit Title: Oracle Business Intelligence Enterprise Edition 5.5.0.0.0 / 12.2.1.3.0 / 12.2.1.4.0 - 'getPreviewImage' Directory Traversal/Local File Inclusion #

Tagged with: