Default welcome msg!

Oracle Mobile Database Server Code Execution 2

Technical Details

SKU EH-13-102


Metasploit Filepath No
Targets Oracle Mobile Database Server 11g
Platform Oracle
Hashes No
Author unSecurityResearch unSecurityResearch (unsecurityresearch)
Version 1
License ExploitHub
Disclosure Date Jan 1, 1970
Validation Status Unvalidated - Sanity Checked
Validation Report No
Validation Score No
Date Validated N/A
Validation Queue Position N/A
Supplementary Data ,

Quick Overview

Oracle Database Mobile Server is the best way to securely connect embedded devices and mobile applications to Oracle Database.


This exploit for CVE-2013-0366 leads to execution of arbitrary code within the context of the Mobile Database Server.

Product Tags

Use spaces to separate tags. Use single quotes (') for phrases.

Write Your Own Review

You're reviewing: Oracle Mobile Database Server Code Execution 2

How do you rate this product? *

  1 star 2 stars 3 stars 4 stars 5 stars

Customer Reviews

No reviews.