fkie_cve-2004-1362
Vulnerability from fkie_nvd
Published
2004-08-04 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
The PL/SQL module for the Oracle HTTP Server in Oracle Application Server 10g, when using the WE8ISO8859P1 character set, does not perform character conversions properly, which allows remote attackers to bypass access restrictions for certain procedures via an encoded URL with "%FF" encoded sequences that are improperly converted to "Y" characters.
References
cve@mitre.orghttp://marc.info/?l=bugtraq&m=110382306006205&w=2
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-26-101782-1
cve@mitre.orghttp://www.kb.cert.org/vuls/id/435974Third Party Advisory, US Government Resource
cve@mitre.orghttp://www.ngssoftware.com/advisories/oracle23122004G.txtPatch, Vendor Advisory
cve@mitre.orghttp://www.oracle.com/technology/deploy/security/pdf/2004alert68.pdfPatch, Vendor Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/10871Patch
cve@mitre.orghttp://www.us-cert.gov/cas/techalerts/TA04-245A.htmlPatch, Third Party Advisory, US Government Resource
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/18657
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=110382306006205&w=2
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-101782-1
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/435974Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.ngssoftware.com/advisories/oracle23122004G.txtPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technology/deploy/security/pdf/2004alert68.pdfPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/10871Patch
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA04-245A.htmlPatch, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/18657
Impacted products
Vendor Product Version
oracle application_server *
oracle application_server 9.0.2
oracle application_server 9.0.2.0.0
oracle application_server 9.0.2.0.1
oracle application_server 9.0.2.1
oracle application_server 9.0.2.2
oracle application_server 9.0.2.3
oracle application_server 9.0.3
oracle application_server 9.0.3.1
oracle application_server 9.0.4
oracle application_server 9.0.4.0
oracle application_server 9.0.4.1
oracle collaboration_suite release_1
oracle e-business_suite 11.5.1
oracle e-business_suite 11.5.2
oracle e-business_suite 11.5.3
oracle e-business_suite 11.5.4
oracle e-business_suite 11.5.5
oracle e-business_suite 11.5.6
oracle e-business_suite 11.5.7
oracle e-business_suite 11.5.8
oracle e-business_suite 11.5.9
oracle enterprise_manager 9
oracle enterprise_manager 9.0.1
oracle enterprise_manager_database_control 10.1.2
oracle enterprise_manager_grid_control 10.1.0.2
oracle oracle10g enterprise_9.0.4_.0
oracle oracle10g enterprise_10.1.0.2
oracle oracle10g personal_9.0.4_.0
oracle oracle10g personal_10.1_.0.2
oracle oracle10g standard_9.0.4_.0
oracle oracle10g standard_10.1_.0.2
oracle oracle8i enterprise_8.0.5_.0.0
oracle oracle8i enterprise_8.0.6_.0.0
oracle oracle8i enterprise_8.0.6_.0.1
oracle oracle8i enterprise_8.1.5_.0.0
oracle oracle8i enterprise_8.1.5_.0.2
oracle oracle8i enterprise_8.1.5_.1.0
oracle oracle8i enterprise_8.1.6_.0.0
oracle oracle8i enterprise_8.1.6_.1.0
oracle oracle8i enterprise_8.1.7_.0.0
oracle oracle8i enterprise_8.1.7_.1.0
oracle oracle8i enterprise_8.1.7_.4
oracle oracle8i standard_8.0.6
oracle oracle8i standard_8.0.6_.3
oracle oracle8i standard_8.1.5
oracle oracle8i standard_8.1.6
oracle oracle8i standard_8.1.7
oracle oracle8i standard_8.1.7_.0.0
oracle oracle8i standard_8.1.7_.1
oracle oracle8i standard_8.1.7_.4
oracle oracle9i client_9.2.0.1
oracle oracle9i client_9.2.0.2
oracle oracle9i enterprise_8.1.7
oracle oracle9i enterprise_9.0.1
oracle oracle9i enterprise_9.0.1.4
oracle oracle9i enterprise_9.0.1.5
oracle oracle9i enterprise_9.2.0
oracle oracle9i enterprise_9.2.0.1
oracle oracle9i enterprise_9.2.0.2
oracle oracle9i enterprise_9.2.0.3
oracle oracle9i enterprise_9.2.0.4
oracle oracle9i enterprise_9.2.0.5
oracle oracle9i personal_8.1.7
oracle oracle9i personal_9.0.1
oracle oracle9i personal_9.0.1.4
oracle oracle9i personal_9.0.1.5
oracle oracle9i personal_9.2
oracle oracle9i personal_9.2.0.1
oracle oracle9i personal_9.2.0.2
oracle oracle9i personal_9.2.0.3
oracle oracle9i personal_9.2.0.4
oracle oracle9i personal_9.2.0.5
oracle oracle9i standard_8.1.7
oracle oracle9i standard_9.0
oracle oracle9i standard_9.0.1
oracle oracle9i standard_9.0.1.2
oracle oracle9i standard_9.0.1.3
oracle oracle9i standard_9.0.1.4
oracle oracle9i standard_9.0.1.5
oracle oracle9i standard_9.0.2
oracle oracle9i standard_9.2
oracle oracle9i standard_9.2.0.1
oracle oracle9i standard_9.2.0.2
oracle oracle9i standard_9.2.0.3
oracle oracle9i standard_9.2.0.4
oracle oracle9i standard_9.2.0.5



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:application_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD38E99A-864A-4E99-B6A5-12AACDA822E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:application_server:9.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAE1E8A-644B-42FD-B149-89AD420BD7A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:application_server:9.0.2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8075E330-5819-4105-9BB7-4DCC3C0EAEF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:application_server:9.0.2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB346764-EDF2-4BE1-A273-C2CE9A173CFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:application_server:9.0.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E59B89D9-AAF9-40CB-931C-EB4958491B99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:application_server:9.0.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C64888FB-133F-4930-8368-1BD2A4FB11A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:application_server:9.0.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "87DEB7BD-FB71-4C22-A0FF-89923B263DC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:application_server:9.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAAD1A33-4333-4AFB-8D49-1274AE345BA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:application_server:9.0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "852BF209-3C6F-403B-920D-50C46D37515B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:application_server:9.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "335143DB-4538-49F4-BAFB-C47802318667",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:application_server:9.0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6A3E2D8-617C-4740-B662-F8884CE26BF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:application_server:9.0.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FFBB096-523E-4634-ADC4-6CFB03F9577B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:collaboration_suite:release_1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D1A1DC8-A38C-4061-A825-C6CC2ED453E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:e-business_suite:11.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBD7B7B5-4C37-4EC7-8B1D-66C1E5043E11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:e-business_suite:11.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9E237E5-9E1A-4F20-9A3D-E3418E3B1329",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:e-business_suite:11.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F57A5AE0-90B5-410E-8878-BD514C3B7946",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:e-business_suite:11.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA7EAC35-E890-444A-B070-C91382F2E242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:e-business_suite:11.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "69568B66-122B-4946-B630-2960DAA1885E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:e-business_suite:11.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6E1838-B4DA-4F62-8713-9E8D7E79CDF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:e-business_suite:11.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C3E4A5C-8D0F-4105-8618-26586BEDE84B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:e-business_suite:11.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D07FEA4F-B1C7-4250-81FD-AC1289769348",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:e-business_suite:11.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "78408427-3FFB-45C4-82EF-C8D636B3A718",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:enterprise_manager:9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3595689-13AE-4349-8684-D73D33D4A9FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:enterprise_manager:9.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "53F57A30-BE27-4F93-B8E4-B0956007F625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:enterprise_manager_database_control:10.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F074FCED-60D9-4B07-8A6F-85A89C8CFC33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:enterprise_manager_grid_control:10.1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "016AFE8B-049D-4BA9-9270-E18DFDFDC61F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle10g:enterprise_9.0.4_.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF667575-AD5F-43D6-B7BF-F255C1A14A0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle10g:enterprise_10.1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C033CC3-1840-49A1-AB6E-3EC8CE1F0BEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle10g:personal_9.0.4_.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CEA97EC-FC86-4F53-A134-B98F25892BB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle10g:personal_10.1_.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E41C0DB6-CD92-4FDC-A705-83CFB92C062A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle10g:standard_9.0.4_.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACC43855-2664-42CC-87DD-3C90DB1430C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle10g:standard_10.1_.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A4D091-1D89-484E-A3F7-0F98F8814686",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle8i:enterprise_8.0.5_.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D96A60B5-7B83-4E94-AF2B-AF3DF28EE1D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle8i:enterprise_8.0.6_.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C5C8D47-953E-41DF-9852-955611F6D387",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle8i:enterprise_8.0.6_.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4798CAE-9AAA-4623-85B2-309DB46DD28A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle8i:enterprise_8.1.5_.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "121CF7A1-1710-4DA1-B7B6-028557D3FA49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle8i:enterprise_8.1.5_.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "616AD7A7-C8F3-4125-8E26-64109EA40730",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle8i:enterprise_8.1.5_.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C7365AA-ACDA-461A-A84C-6B4FF04F295F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle8i:enterprise_8.1.6_.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C22E50-FDB8-4314-9F36-70D0130EAA6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle8i:enterprise_8.1.6_.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C65AC14-2AA0-4475-9932-E4AEA410CBCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle8i:enterprise_8.1.7_.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA730ABB-F315-4F7F-B820-33C5558B05DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle8i:enterprise_8.1.7_.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4CE4E08-4892-419D-AC51-68DD42073092",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle8i:enterprise_8.1.7_.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF52682E-0AB7-4C3F-94D4-7B4A7E08F2C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle8i:standard_8.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C65C2671-2FFE-4461-A570-72E3BBC312D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle8i:standard_8.0.6_.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA59E72F-ACC1-44F3-AE63-B42F1EB83F3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle8i:standard_8.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5CB4061-855C-4DAA-BDAD-AA1E68EFC1E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle8i:standard_8.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "07F81AC9-DEBD-4B04-8753-C68BAE509B13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle8i:standard_8.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "0785C55D-183D-42D8-A9F9-DBD297FE7F43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle8i:standard_8.1.7_.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8086BBDC-76BE-47C0-8F11-CEC57A23FC27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle8i:standard_8.1.7_.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "72BAAEF7-74CA-4C4F-8D52-AC4D5DE2E0E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle8i:standard_8.1.7_.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EECAE774-22F3-4872-9E05-A14376F3883D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle9i:client_9.2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFAA7E8B-263B-40A2-B6D8-8A303A7D4358",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle9i:client_9.2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "085FF0CB-B426-4DCB-9411-017A45280A60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle9i:enterprise_8.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED4991B9-67A9-4EE9-A30F-27950BF3A3DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle9i:enterprise_9.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2201796B-013B-4440-B366-1F2966AA86FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle9i:enterprise_9.0.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "43C6FFA8-18A6-4EE1-BE10-A1B7F3C1A47E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle9i:enterprise_9.0.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F90F6C4F-CEF5-4172-97FC-617B71EAA636",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FFA2A5C-B289-4505-85F5-7F6F0222B552",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E876825-D6E5-4958-B737-4CE43A32BEC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8E07567-754A-40C0-9428-D151880EE6F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6233345D-5100-404A-9B61-524D9679D9E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FB739C3-A9BD-433F-8547-12BC615DB18D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7231B057-9B7E-43CA-9E91-6DF74D6ADAE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle9i:personal_8.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4D7A3CB-54CC-4CD9-9672-366233BF0CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle9i:personal_9.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "58DB0B6B-EB97-448A-B63E-E5997382DD45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle9i:personal_9.0.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA77BC6D-661F-46E9-B144-1587C1192B8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle9i:personal_9.0.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "16F9C7F3-8140-4FEF-8319-64CE51B830AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle9i:personal_9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "68286D06-9EBA-4FBD-AB0B-D80993895416",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle9i:personal_9.2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C059683-E0A1-4E97-B393-CB6B0EACF7C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle9i:personal_9.2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5675664-7036-48D0-9524-0350F626D4CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle9i:personal_9.2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA9F3EE8-DA8B-4605-B70B-CFCA25B07C1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle9i:personal_9.2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0DE0FB4-3C1A-460D-B48E-11D7AF415A94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle9i:personal_9.2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "597EE9ED-6A95-46C7-BE83-ADEC6AA65341",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle9i:standard_8.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCAD9D1D-A7E5-4D88-B93B-C518BF1986AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle9i:standard_9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E46FE2E-CA1A-4970-81FF-0BFFF2CF6849",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle9i:standard_9.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EE7A2B1-A161-4A20-9EEC-B1EF7F2E387C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle9i:standard_9.0.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D65D66A0-23F7-4110-AF71-05CBFB3F92F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle9i:standard_9.0.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F207CBC6-D186-418D-8F11-3E623530E00B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle9i:standard_9.0.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FB2708A-58D1-4F17-8504-3748D6667788",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle9i:standard_9.0.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E83B1C7A-287A-405F-B44E-85F891183D2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle9i:standard_9.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34FC1E19-8F20-4215-8D90-E42EF7126BD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle9i:standard_9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB172848-A873-4137-A335-AD034806A5EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle9i:standard_9.2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B78BD7D2-7B48-438C-8C24-01C4007C1A32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle9i:standard_9.2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DDCC0D1-32AD-4902-8383-2AA169C3F3BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle9i:standard_9.2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D4D70A8-A6FE-4F82-82F1-AB1E9C28FB35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle9i:standard_9.2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F64908D-FDAA-499B-8060-8A6EC2443418",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:oracle9i:standard_9.2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E77BCF6E-0D09-4DAF-B147-D11FEEE7371C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The PL/SQL module for the Oracle HTTP Server in Oracle Application Server 10g, when using the WE8ISO8859P1 character set, does not perform character conversions properly, which allows remote attackers to bypass access restrictions for certain procedures via an encoded URL with \"%FF\" encoded sequences that are improperly converted to \"Y\" characters."
    }
  ],
  "id": "CVE-2004-1362",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-08-04T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=110382306006205\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101782-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/435974"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.ngssoftware.com/advisories/oracle23122004G.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technology/deploy/security/pdf/2004alert68.pdf"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/10871"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA04-245A.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18657"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=110382306006205\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101782-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/435974"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.ngssoftware.com/advisories/oracle23122004G.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technology/deploy/security/pdf/2004alert68.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/10871"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA04-245A.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18657"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…