Auditing an Oracle database for security issues is very important. PeteFinnigan.com provides all of the information and tools that you will need Click here for details of PeteFinnigan.com Limited's detailed Oracle database security audit service Click here for details of PeteFinnigan.com Limited's Oracle Security Training Courses
There are 54 visitors online    
Cookie Policy:We only use essential cookies on small sections of this website. For details see here.

Pete Finnigan's Oracle security weblog


Home » Archives » May 2005 » Alex has updated his Oracle exploits page to add 5 more exploit codes

[Previous entry: "Red Database Security issues two new Oracle security advisories"] [Next entry: "Who_has_priv.sql, who_can_access.sql and who_has_role.sql updated"]

Alex has updated his Oracle exploits page to add 5 more exploit codes

May 2nd, 2005 by Pete


I just noticed this evening that Alex has updated his Oracle Security exploits page to add 5 new exploits. These are:

"Buffer Overflow in DBMS_REPCAT_INSTANTIATE"

"Become DBA via DBMS_SYS_SQL"

"Stop remote Listener via lsnrctl added"

"Switch username to SYS after executing a database job via dbms_scheduler added"

"SQL Injection in Oracle Portal WWV_LOV"

Be aware of these issues, if you are not patched then you are vulnerable.

May 2005
SMTWTFS
1234567
891011121314
15161718192021
22232425262728
293031    

This is the weblog for Pete Finnigan. Pete works in the area of Oracle security and he specialises in auditing Oracle databases for security issues. This weblog is aimed squarely at those interested in the security of their Oracle databases.

Weblog Home
Weblog Archives


Home
Oracle Security Tools page
Oracle security papers
Oracle Security alerts

Web Development
SQL Server Security

RSS 1.0 FEED
RSS 2.0 FEED
Atom 0.3 FEED
Powered by gm-rss 2.0.0


Valid XHTML 1.0!