Threat Encyclopedia



This indicates an attack attempt to exploit an Unauthorized Access vulnerability in Oracle 9i HTTP Server.
The vulnerability is due to a lack of input validation in the application. As a result, a remote attacker can gain unauthorized access to sensitive information or make arbitrary changes to the affected system.

affected-products-logoAffected Products

Oracle9i Application Server 1.0.2.


System Compromise: Remote attackers can gain control of vulnerable systems

recomended-action-logoRecommended Actions

Refer to the vendor's website for suggested workaround.

CVE References