All the vulnerabilites related to oracle - apex
cve-2007-3860
Vulnerability from cvelistv5
Published
2007-07-18 19:00
Modified
2024-08-07 14:28
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in Oracle Application Express (formerly Oracle HTML DB) 2.2.0.00.32 up to 3.0.0.00.20 allows developers to have an unknown impact via unknown attack vectors, aka APEX01. NOTE: a reliable researcher states that this is SQL injection in the wwv_flow_security.check_db_password function due to insufficient checks for '"' characters.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:28:52.596Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SSRT061201", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00727143" }, { "name": "26114", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26114" }, { "name": "2901", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2901" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.red-database-security.com/advisory/oracle_apex_sql_injection_check_db_password.html" }, { "name": "26166", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26166" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2007-087014.html" }, { "name": "oracle-apex-sql-injection(35499)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35499" }, { "name": "TA07-200A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-200A.html" }, { "name": "ADV-2007-2562", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2562" }, { "name": "ADV-2007-2635", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2635" }, { "name": "HPSBMA02133", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00727143" }, { "name": "oracle-cpu-july2007(35490)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35490" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf" }, { "name": "1018415", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018415" }, { "name": "20070718 Oracle Security: SQL Injection in APEX CHECK_DB_PASSWORD", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/474002/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.red-database-security.com/advisory/oracle_cpu_jul_2007.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-07-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Oracle Application Express (formerly Oracle HTML DB) 2.2.0.00.32 up to 3.0.0.00.20 allows developers to have an unknown impact via unknown attack vectors, aka APEX01. NOTE: a reliable researcher states that this is SQL injection in the wwv_flow_security.check_db_password function due to insufficient checks for \u0027\"\u0027 characters." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "SSRT061201", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00727143" }, { "name": "26114", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26114" }, { "name": "2901", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2901" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.red-database-security.com/advisory/oracle_apex_sql_injection_check_db_password.html" }, { "name": "26166", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26166" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2007-087014.html" }, { "name": "oracle-apex-sql-injection(35499)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35499" }, { "name": "TA07-200A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-200A.html" }, { "name": "ADV-2007-2562", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2562" }, { "name": "ADV-2007-2635", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2635" }, { "name": "HPSBMA02133", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00727143" }, { "name": "oracle-cpu-july2007(35490)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35490" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf" }, { "name": "1018415", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018415" }, { "name": "20070718 Oracle Security: SQL Injection in APEX CHECK_DB_PASSWORD", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/474002/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.red-database-security.com/advisory/oracle_cpu_jul_2007.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-3860", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in Oracle Application Express (formerly Oracle HTML DB) 2.2.0.00.32 up to 3.0.0.00.20 allows developers to have an unknown impact via unknown attack vectors, aka APEX01. NOTE: a reliable researcher states that this is SQL injection in the wwv_flow_security.check_db_password function due to insufficient checks for \u0027\"\u0027 characters." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SSRT061201", "refsource": "HP", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00727143" }, { "name": "26114", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26114" }, { "name": "2901", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2901" }, { "name": "http://www.red-database-security.com/advisory/oracle_apex_sql_injection_check_db_password.html", "refsource": "MISC", "url": "http://www.red-database-security.com/advisory/oracle_apex_sql_injection_check_db_password.html" }, { "name": "26166", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26166" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujul2007-087014.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2007-087014.html" }, { "name": "oracle-apex-sql-injection(35499)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35499" }, { "name": "TA07-200A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA07-200A.html" }, { "name": "ADV-2007-2562", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2562" }, { "name": "ADV-2007-2635", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2635" }, { "name": "HPSBMA02133", "refsource": "HP", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00727143" }, { "name": "oracle-cpu-july2007(35490)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35490" }, { "name": "http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf", "refsource": "MISC", "url": "http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf" }, { "name": "1018415", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018415" }, { "name": "20070718 Oracle Security: SQL Injection in APEX CHECK_DB_PASSWORD", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/474002/100/0/threaded" }, { "name": "http://www.red-database-security.com/advisory/oracle_cpu_jul_2007.html", "refsource": "MISC", "url": "http://www.red-database-security.com/advisory/oracle_cpu_jul_2007.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-3860", "datePublished": "2007-07-18T19:00:00", "dateReserved": "2007-07-18T00:00:00", "dateUpdated": "2024-08-07T14:28:52.596Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-7138
Vulnerability from cvelistv5
Published
2007-03-07 20:00
Modified
2024-08-07 20:50
Severity ?
EPSS score ?
Summary
SQL injection vulnerability in wwv_flow_utilities.gen_popup_list in the WWV_FLOW_UTILITIES package for Oracle APEX/HTMLDB before 2.2 allows remote authenticated users to execute arbitrary SQL by modifying the P_LOV parameter and calculating a matching MD5 checksum for the P_LOV_CHECKSUM parameter. NOTE: it is likely that this issue is subsumed by CVE-2006-5351, but due to lack of details from Oracle, this cannot be proven.
References
▼ | URL | Tags |
---|---|---|
http://www.red-database-security.com/advisory/oracle_cpu_oct_2006.html | x_refsource_MISC | |
http://www.red-database-security.com/advisory/oracle_apex_sql_injection_wwv_flow_utilities.html | x_refsource_MISC | |
http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050265.html | mailing-list, x_refsource_FULLDISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/30106 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/archive/1/449498/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://securityreason.com/securityalert/2346 | third-party-advisory, x_refsource_SREASON |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:50:06.287Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.red-database-security.com/advisory/oracle_cpu_oct_2006.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.red-database-security.com/advisory/oracle_apex_sql_injection_wwv_flow_utilities.html" }, { "name": "20061023 SQL Injection Vulnerability in Oracle WWV_FLOW_UTILITIES", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050265.html" }, { "name": "oracle-wwvflow-sql-injection(30106)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30106" }, { "name": "20061023 SQL Injection Vulnerability in Oracle WWV_FLOW_UTILITIES", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/449498/100/0/threaded" }, { "name": "2346", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2346" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-10-23T00:00:00", "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in wwv_flow_utilities.gen_popup_list in the WWV_FLOW_UTILITIES package for Oracle APEX/HTMLDB before 2.2 allows remote authenticated users to execute arbitrary SQL by modifying the P_LOV parameter and calculating a matching MD5 checksum for the P_LOV_CHECKSUM parameter. NOTE: it is likely that this issue is subsumed by CVE-2006-5351, but due to lack of details from Oracle, this cannot be proven." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.red-database-security.com/advisory/oracle_cpu_oct_2006.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.red-database-security.com/advisory/oracle_apex_sql_injection_wwv_flow_utilities.html" }, { "name": "20061023 SQL Injection Vulnerability in Oracle WWV_FLOW_UTILITIES", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050265.html" }, { "name": "oracle-wwvflow-sql-injection(30106)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30106" }, { "name": "20061023 SQL Injection Vulnerability in Oracle WWV_FLOW_UTILITIES", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/449498/100/0/threaded" }, { "name": "2346", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2346" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-7138", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SQL injection vulnerability in wwv_flow_utilities.gen_popup_list in the WWV_FLOW_UTILITIES package for Oracle APEX/HTMLDB before 2.2 allows remote authenticated users to execute arbitrary SQL by modifying the P_LOV parameter and calculating a matching MD5 checksum for the P_LOV_CHECKSUM parameter. NOTE: it is likely that this issue is subsumed by CVE-2006-5351, but due to lack of details from Oracle, this cannot be proven." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.red-database-security.com/advisory/oracle_cpu_oct_2006.html", "refsource": "MISC", "url": "http://www.red-database-security.com/advisory/oracle_cpu_oct_2006.html" }, { "name": "http://www.red-database-security.com/advisory/oracle_apex_sql_injection_wwv_flow_utilities.html", "refsource": "MISC", "url": "http://www.red-database-security.com/advisory/oracle_apex_sql_injection_wwv_flow_utilities.html" }, { "name": "20061023 SQL Injection Vulnerability in Oracle WWV_FLOW_UTILITIES", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050265.html" }, { "name": "oracle-wwvflow-sql-injection(30106)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30106" }, { "name": "20061023 SQL Injection Vulnerability in Oracle WWV_FLOW_UTILITIES", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/449498/100/0/threaded" }, { "name": "2346", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2346" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-7138", "datePublished": "2007-03-07T20:00:00", "dateReserved": "2007-03-07T00:00:00", "dateUpdated": "2024-08-07T20:50:06.287Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-5352
Vulnerability from cvelistv5
Published
2006-10-18 01:00
Modified
2024-08-07 19:48
Severity ?
EPSS score ?
Summary
Multiple unspecified vulnerabilities in Oracle Application Express 1.5 up to 1.6.1 have unknown impact and remote attack vectors, aka Vuln# (1) APEX04, (2) APEX20, and (3) APEX21.
References
▼ | URL | Tags |
---|---|---|
http://www.red-database-security.com/advisory/oracle_cpu_oct_2006.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/20588 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/archive/1/449711/100/0/threaded | vendor-advisory, x_refsource_HP | |
http://www.oracle.com/technetwork/topics/security/cpuoct2006-095368.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/449711/100/0/threaded | vendor-advisory, x_refsource_HP | |
http://www.vupen.com/english/advisories/2006/4065 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/22396 | third-party-advisory, x_refsource_SECUNIA | |
http://securitytracker.com/id?1017077 | vdb-entry, x_refsource_SECTRACK | |
http://www.us-cert.gov/cas/techalerts/TA06-291A.html | third-party-advisory, x_refsource_CERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T19:48:30.174Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.red-database-security.com/advisory/oracle_cpu_oct_2006.html" }, { "name": "20588", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/20588" }, { "name": "HPSBMA02133", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/449711/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2006-095368.html" }, { "name": "SSRT061201", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/449711/100/0/threaded" }, { "name": "ADV-2006-4065", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/4065" }, { "name": "22396", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22396" }, { "name": "1017077", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1017077" }, { "name": "TA06-291A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-291A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-10-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Oracle Application Express 1.5 up to 1.6.1 have unknown impact and remote attack vectors, aka Vuln# (1) APEX04, (2) APEX20, and (3) APEX21." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.red-database-security.com/advisory/oracle_cpu_oct_2006.html" }, { "name": "20588", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/20588" }, { "name": "HPSBMA02133", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www.securityfocus.com/archive/1/449711/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2006-095368.html" }, { "name": "SSRT061201", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www.securityfocus.com/archive/1/449711/100/0/threaded" }, { "name": "ADV-2006-4065", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/4065" }, { "name": "22396", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22396" }, { "name": "1017077", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1017077" }, { "name": "TA06-291A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-291A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-5352", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in Oracle Application Express 1.5 up to 1.6.1 have unknown impact and remote attack vectors, aka Vuln# (1) APEX04, (2) APEX20, and (3) APEX21." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.red-database-security.com/advisory/oracle_cpu_oct_2006.html", "refsource": "MISC", "url": "http://www.red-database-security.com/advisory/oracle_cpu_oct_2006.html" }, { "name": "20588", "refsource": "BID", "url": "http://www.securityfocus.com/bid/20588" }, { "name": "HPSBMA02133", "refsource": "HP", "url": "http://www.securityfocus.com/archive/1/449711/100/0/threaded" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2006-095368.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2006-095368.html" }, { "name": "SSRT061201", "refsource": "HP", "url": "http://www.securityfocus.com/archive/1/449711/100/0/threaded" }, { "name": "ADV-2006-4065", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/4065" }, { "name": "22396", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22396" }, { "name": "1017077", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1017077" }, { "name": "TA06-291A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA06-291A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-5352", "datePublished": "2006-10-18T01:00:00", "dateReserved": "2006-10-17T00:00:00", "dateUpdated": "2024-08-07T19:48:30.174Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-7158
Vulnerability from cvelistv5
Published
2007-03-07 20:00
Modified
2024-08-07 20:57
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in Oracle Application Express (APEX) before 2.2.1, aka Oracle HTML DB, allows remote attackers to inject arbitrary web script or HTML via the NOTIFICATION_MSG parameter. NOTE: it is likely that this issue overlaps one of the identifiers in CVE-2006-5351.
References
▼ | URL | Tags |
---|---|---|
http://www.red-database-security.com/advisory/oracle_apex_css_notification_msg.html | x_refsource_MISC | |
http://securityreason.com/securityalert/2382 | third-party-advisory, x_refsource_SREASON | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/30107 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/22396 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/archive/1/449501/100/0/threaded | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:57:39.787Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.red-database-security.com/advisory/oracle_apex_css_notification_msg.html" }, { "name": "2382", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2382" }, { "name": "oracle-notification-msg-xss(30107)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30107" }, { "name": "22396", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22396" }, { "name": "20061023 http://www.red-database-security.com/advisory/oracle_apex_css_notification_msg.html", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/449501/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-10-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Oracle Application Express (APEX) before 2.2.1, aka Oracle HTML DB, allows remote attackers to inject arbitrary web script or HTML via the NOTIFICATION_MSG parameter. NOTE: it is likely that this issue overlaps one of the identifiers in CVE-2006-5351." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.red-database-security.com/advisory/oracle_apex_css_notification_msg.html" }, { "name": "2382", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2382" }, { "name": "oracle-notification-msg-xss(30107)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30107" }, { "name": "22396", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22396" }, { "name": "20061023 http://www.red-database-security.com/advisory/oracle_apex_css_notification_msg.html", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/449501/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-7158", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in Oracle Application Express (APEX) before 2.2.1, aka Oracle HTML DB, allows remote attackers to inject arbitrary web script or HTML via the NOTIFICATION_MSG parameter. NOTE: it is likely that this issue overlaps one of the identifiers in CVE-2006-5351." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.red-database-security.com/advisory/oracle_apex_css_notification_msg.html", "refsource": "MISC", "url": "http://www.red-database-security.com/advisory/oracle_apex_css_notification_msg.html" }, { "name": "2382", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2382" }, { "name": "oracle-notification-msg-xss(30107)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30107" }, { "name": "22396", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22396" }, { "name": "20061023 http://www.red-database-security.com/advisory/oracle_apex_css_notification_msg.html", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/449501/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-7158", "datePublished": "2007-03-07T20:00:00", "dateReserved": "2007-03-07T00:00:00", "dateUpdated": "2024-08-07T20:57:39.787Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-5351
Vulnerability from cvelistv5
Published
2006-10-18 01:00
Modified
2024-08-07 19:48
Severity ?
EPSS score ?
Summary
Multiple unspecified vulnerabilities in Oracle Application Express (formerly Oracle HTML DB) 1.5 up to 2.0 have unknown impact and remote attack vectors, aka Vuln# (1) APEX01, (2) APEX02, (3) APEX03, (4) APEX05, (5) APEX06, (6) APEX07, (7) APEX08, (8) APEX09, (9) APEX10, (10) APEX11, (11) APEX12, (12) APEX13, (13) APEX14, (14) APEX15, (15) APEX16, (16) APEX17, (17) APEX18, (18) APEX19, (19) APEX22, (20) APEX23, (21) APEX24, (22) APEX25, (23) APEX26, (24) APEX27, (25) APEX28, (26) APEX29, (27) APEX30, (28) APEX31, (29) APEX32, (30) APEX33, (31) APEX34, and (32) APEX35. NOTE: as of 20061027, it is likely that some of these identifiers are associated with cross-site scripting (XSS) in WWV_FLOW_ITEM_HELP and NOTIFICATION_MSG, but these have been provided separate identifiers.
References
▼ | URL | Tags |
---|---|---|
http://www.red-database-security.com/advisory/oracle_cpu_oct_2006.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/20588 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/archive/1/449711/100/0/threaded | vendor-advisory, x_refsource_HP | |
http://www.oracle.com/technetwork/topics/security/cpuoct2006-095368.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/449711/100/0/threaded | vendor-advisory, x_refsource_HP | |
http://www.vupen.com/english/advisories/2006/4065 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/22396 | third-party-advisory, x_refsource_SECUNIA | |
http://securitytracker.com/id?1017077 | vdb-entry, x_refsource_SECTRACK | |
http://www.us-cert.gov/cas/techalerts/TA06-291A.html | third-party-advisory, x_refsource_CERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T19:48:30.133Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.red-database-security.com/advisory/oracle_cpu_oct_2006.html" }, { "name": "20588", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/20588" }, { "name": "HPSBMA02133", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/449711/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2006-095368.html" }, { "name": "SSRT061201", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/449711/100/0/threaded" }, { "name": "ADV-2006-4065", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/4065" }, { "name": "22396", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22396" }, { "name": "1017077", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1017077" }, { "name": "TA06-291A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-291A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-10-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Oracle Application Express (formerly Oracle HTML DB) 1.5 up to 2.0 have unknown impact and remote attack vectors, aka Vuln# (1) APEX01, (2) APEX02, (3) APEX03, (4) APEX05, (5) APEX06, (6) APEX07, (7) APEX08, (8) APEX09, (9) APEX10, (10) APEX11, (11) APEX12, (12) APEX13, (13) APEX14, (14) APEX15, (15) APEX16, (16) APEX17, (17) APEX18, (18) APEX19, (19) APEX22, (20) APEX23, (21) APEX24, (22) APEX25, (23) APEX26, (24) APEX27, (25) APEX28, (26) APEX29, (27) APEX30, (28) APEX31, (29) APEX32, (30) APEX33, (31) APEX34, and (32) APEX35. NOTE: as of 20061027, it is likely that some of these identifiers are associated with cross-site scripting (XSS) in WWV_FLOW_ITEM_HELP and NOTIFICATION_MSG, but these have been provided separate identifiers." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.red-database-security.com/advisory/oracle_cpu_oct_2006.html" }, { "name": "20588", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/20588" }, { "name": "HPSBMA02133", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www.securityfocus.com/archive/1/449711/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2006-095368.html" }, { "name": "SSRT061201", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www.securityfocus.com/archive/1/449711/100/0/threaded" }, { "name": "ADV-2006-4065", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/4065" }, { "name": "22396", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22396" }, { "name": "1017077", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1017077" }, { "name": "TA06-291A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-291A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-5351", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in Oracle Application Express (formerly Oracle HTML DB) 1.5 up to 2.0 have unknown impact and remote attack vectors, aka Vuln# (1) APEX01, (2) APEX02, (3) APEX03, (4) APEX05, (5) APEX06, (6) APEX07, (7) APEX08, (8) APEX09, (9) APEX10, (10) APEX11, (11) APEX12, (12) APEX13, (13) APEX14, (14) APEX15, (15) APEX16, (16) APEX17, (17) APEX18, (18) APEX19, (19) APEX22, (20) APEX23, (21) APEX24, (22) APEX25, (23) APEX26, (24) APEX27, (25) APEX28, (26) APEX29, (27) APEX30, (28) APEX31, (29) APEX32, (30) APEX33, (31) APEX34, and (32) APEX35. NOTE: as of 20061027, it is likely that some of these identifiers are associated with cross-site scripting (XSS) in WWV_FLOW_ITEM_HELP and NOTIFICATION_MSG, but these have been provided separate identifiers." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.red-database-security.com/advisory/oracle_cpu_oct_2006.html", "refsource": "MISC", "url": "http://www.red-database-security.com/advisory/oracle_cpu_oct_2006.html" }, { "name": "20588", "refsource": "BID", "url": "http://www.securityfocus.com/bid/20588" }, { "name": "HPSBMA02133", "refsource": "HP", "url": "http://www.securityfocus.com/archive/1/449711/100/0/threaded" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2006-095368.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2006-095368.html" }, { "name": "SSRT061201", "refsource": "HP", "url": "http://www.securityfocus.com/archive/1/449711/100/0/threaded" }, { "name": "ADV-2006-4065", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/4065" }, { "name": "22396", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22396" }, { "name": "1017077", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1017077" }, { "name": "TA06-291A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA06-291A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-5351", "datePublished": "2006-10-18T01:00:00", "dateReserved": "2006-10-17T00:00:00", "dateUpdated": "2024-08-07T19:48:30.133Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-5599
Vulnerability from cvelistv5
Published
2006-10-28 01:00
Modified
2024-08-07 19:55
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in Oracle Application Express (formerly HTML DB) before 2.2.1 allows remote attackers to inject arbitrary HTML or web script via the WWV_FLOW_ITEM_HELP package. NOTE: it is likely that this issue overlaps one of the Oracle VulnIDs covered by CVE-2006-5351. Oracle has not publicly disputed claims by a reliable researcher that this has been fixed by the October 2006 CPU.
References
▼ | URL | Tags |
---|---|---|
http://securityreason.com/securityalert/1792 | third-party-advisory, x_refsource_SREASON | |
http://www.securityfocus.com/archive/1/449500/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.red-database-security.com/advisory/oracle_apex_css_wwv_flow_item_help.html | x_refsource_MISC | |
http://www.us-cert.gov/cas/techalerts/TA06-291A.html | third-party-advisory, x_refsource_CERT | |
http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2006.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T19:55:53.521Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1792", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/1792" }, { "name": "20061023 Cross-Site-Scripting Vulnerability in Oracle APEX WWV_FLOW_ITEM_HELP", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/449500/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.red-database-security.com/advisory/oracle_apex_css_wwv_flow_item_help.html" }, { "name": "TA06-291A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-291A.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2006.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-10-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Oracle Application Express (formerly HTML DB) before 2.2.1 allows remote attackers to inject arbitrary HTML or web script via the WWV_FLOW_ITEM_HELP package. NOTE: it is likely that this issue overlaps one of the Oracle VulnIDs covered by CVE-2006-5351. Oracle has not publicly disputed claims by a reliable researcher that this has been fixed by the October 2006 CPU." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1792", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/1792" }, { "name": "20061023 Cross-Site-Scripting Vulnerability in Oracle APEX WWV_FLOW_ITEM_HELP", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/449500/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.red-database-security.com/advisory/oracle_apex_css_wwv_flow_item_help.html" }, { "name": "TA06-291A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-291A.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2006.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-5599", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in Oracle Application Express (formerly HTML DB) before 2.2.1 allows remote attackers to inject arbitrary HTML or web script via the WWV_FLOW_ITEM_HELP package. NOTE: it is likely that this issue overlaps one of the Oracle VulnIDs covered by CVE-2006-5351. Oracle has not publicly disputed claims by a reliable researcher that this has been fixed by the October 2006 CPU." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1792", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/1792" }, { "name": "20061023 Cross-Site-Scripting Vulnerability in Oracle APEX WWV_FLOW_ITEM_HELP", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/449500/100/0/threaded" }, { "name": "http://www.red-database-security.com/advisory/oracle_apex_css_wwv_flow_item_help.html", "refsource": "MISC", "url": "http://www.red-database-security.com/advisory/oracle_apex_css_wwv_flow_item_help.html" }, { "name": "TA06-291A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA06-291A.html" }, { "name": "http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2006.html", "refsource": "MISC", "url": "http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2006.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-5599", "datePublished": "2006-10-28T01:00:00", "dateReserved": "2006-10-27T00:00:00", "dateUpdated": "2024-08-07T19:55:53.521Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-3854
Vulnerability from cvelistv5
Published
2007-07-18 19:00
Modified
2024-08-07 14:28
Severity ?
EPSS score ?
Summary
Multiple unspecified vulnerabilities in Oracle Database 9.0.1.5+, 9.2.0.7, and 10.1.0.5 allow remote authenticated users to have unknown impact via (1) SYS.DBMS_PRVTAQIS in the Advanced Queuing component (DB02) and (2) MDSYS.MD in the Spatial component (DB12). NOTE: Oracle has not disputed reliable researcher claims that DB02 is for SQL injection and DB12 is for a buffer overflow.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:28:52.639Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SSRT061201", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00727143" }, { "name": "26114", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26114" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_prvtaqis.html" }, { "name": "26166", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26166" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2007-087014.html" }, { "name": "TA07-200A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-200A.html" }, { "name": "ADV-2007-2562", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2562" }, { "name": "ADV-2007-2635", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2635" }, { "name": "oracle-prvtaqis-sql-injection(35497)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35497" }, { "name": "HPSBMA02133", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00727143" }, { "name": "oracle-cpu-july2007(35490)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35490" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf" }, { "name": "1018415", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018415" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.red-database-security.com/advisory/oracle_cpu_jul_2007.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-07-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Oracle Database 9.0.1.5+, 9.2.0.7, and 10.1.0.5 allow remote authenticated users to have unknown impact via (1) SYS.DBMS_PRVTAQIS in the Advanced Queuing component (DB02) and (2) MDSYS.MD in the Spatial component (DB12). NOTE: Oracle has not disputed reliable researcher claims that DB02 is for SQL injection and DB12 is for a buffer overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "SSRT061201", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00727143" }, { "name": "26114", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26114" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_prvtaqis.html" }, { "name": "26166", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26166" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2007-087014.html" }, { "name": "TA07-200A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-200A.html" }, { "name": "ADV-2007-2562", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2562" }, { "name": "ADV-2007-2635", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2635" }, { "name": "oracle-prvtaqis-sql-injection(35497)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35497" }, { "name": "HPSBMA02133", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00727143" }, { "name": "oracle-cpu-july2007(35490)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35490" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf" }, { "name": "1018415", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018415" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.red-database-security.com/advisory/oracle_cpu_jul_2007.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-3854", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in Oracle Database 9.0.1.5+, 9.2.0.7, and 10.1.0.5 allow remote authenticated users to have unknown impact via (1) SYS.DBMS_PRVTAQIS in the Advanced Queuing component (DB02) and (2) MDSYS.MD in the Spatial component (DB12). NOTE: Oracle has not disputed reliable researcher claims that DB02 is for SQL injection and DB12 is for a buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SSRT061201", "refsource": "HP", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00727143" }, { "name": "26114", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26114" }, { "name": "http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_prvtaqis.html", "refsource": "MISC", "url": "http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_prvtaqis.html" }, { "name": "26166", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26166" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujul2007-087014.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2007-087014.html" }, { "name": "TA07-200A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA07-200A.html" }, { "name": "ADV-2007-2562", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2562" }, { "name": "ADV-2007-2635", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2635" }, { "name": "oracle-prvtaqis-sql-injection(35497)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35497" }, { "name": "HPSBMA02133", "refsource": "HP", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00727143" }, { "name": "oracle-cpu-july2007(35490)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35490" }, { "name": "http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf", "refsource": "MISC", "url": "http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf" }, { "name": "1018415", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018415" }, { "name": "http://www.red-database-security.com/advisory/oracle_cpu_jul_2007.html", "refsource": "MISC", "url": "http://www.red-database-security.com/advisory/oracle_cpu_jul_2007.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-3854", "datePublished": "2007-07-18T19:00:00", "dateReserved": "2007-07-18T00:00:00", "dateUpdated": "2024-08-07T14:28:52.639Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2007-07-18 19:30
Modified
2024-11-21 00:34
Severity ?
Summary
Unspecified vulnerability in Oracle Application Express (formerly Oracle HTML DB) 2.2.0.00.32 up to 3.0.0.00.20 allows developers to have an unknown impact via unknown attack vectors, aka APEX01. NOTE: a reliable researcher states that this is SQL injection in the wwv_flow_security.check_db_password function due to insufficient checks for '"' characters.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:apex:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BFFB48F-BF7E-4256-AF04-E95D2DE17AB6", "versionEndIncluding": "3.0.0.00.20", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:apex:2.2.0.00.32:*:*:*:*:*:*:*", "matchCriteriaId": "9D862B21-8468-4246-9BB7-6669B27B17B8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Oracle Application Express (formerly Oracle HTML DB) 2.2.0.00.32 up to 3.0.0.00.20 allows developers to have an unknown impact via unknown attack vectors, aka APEX01. NOTE: a reliable researcher states that this is SQL injection in the wwv_flow_security.check_db_password function due to insufficient checks for \u0027\"\u0027 characters." }, { "lang": "es", "value": "Vulnerabilidad no especificada en Oracle Application Express (formerly Oracle HTML DB) 2.2.0.00.32 hasta la 3.0.0.00.20 permite a a desarolladores tener un impacto desconocido a trav\u00e9s de vectores de ataque desconocidos, tambi\u00e9n conocido como APEX01. NOTA: un investigador creible indica que esta es una inyecci\u00f3n SQL en la funci\u00f3n wwv_flow_security.check_db_password debido a los insuficientes controles de acceso para los caracteres \u0027\"\u0027." } ], "id": "CVE-2007-3860", "lastModified": "2024-11-21T00:34:14.863", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-07-18T19:30:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00727143" }, { "source": "cve@mitre.org", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00727143" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/26114" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/26166" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/2901" }, { "source": "cve@mitre.org", "url": "http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf" }, { "source": "cve@mitre.org", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2007-087014.html" }, { "source": "cve@mitre.org", "url": "http://www.red-database-security.com/advisory/oracle_apex_sql_injection_check_db_password.html" }, { "source": "cve@mitre.org", "url": "http://www.red-database-security.com/advisory/oracle_cpu_jul_2007.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/474002/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018415" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-200A.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/2562" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/2635" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35490" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35499" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00727143" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00727143" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/26114" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/26166" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/2901" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2007-087014.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.red-database-security.com/advisory/oracle_apex_sql_injection_check_db_password.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.red-database-security.com/advisory/oracle_cpu_jul_2007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/474002/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018415" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-200A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2562" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2635" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35490" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35499" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-03-07 20:19
Modified
2024-11-21 00:24
Severity ?
Summary
SQL injection vulnerability in wwv_flow_utilities.gen_popup_list in the WWV_FLOW_UTILITIES package for Oracle APEX/HTMLDB before 2.2 allows remote authenticated users to execute arbitrary SQL by modifying the P_LOV parameter and calculating a matching MD5 checksum for the P_LOV_CHECKSUM parameter. NOTE: it is likely that this issue is subsumed by CVE-2006-5351, but due to lack of details from Oracle, this cannot be proven.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:apex:*:*:*:*:*:*:*:*", "matchCriteriaId": "C78BE407-5A8B-43A9-8DF5-052D645BEA32", "versionEndIncluding": "2.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in wwv_flow_utilities.gen_popup_list in the WWV_FLOW_UTILITIES package for Oracle APEX/HTMLDB before 2.2 allows remote authenticated users to execute arbitrary SQL by modifying the P_LOV parameter and calculating a matching MD5 checksum for the P_LOV_CHECKSUM parameter. NOTE: it is likely that this issue is subsumed by CVE-2006-5351, but due to lack of details from Oracle, this cannot be proven." }, { "lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n SQL en wwv_flow_utilities.gen_popup_list en WWV_FLOW_UTILITIES paquete para Oracle APEX/HTMLDB versiones anteriores a 2.2 permite a usuarios remotos autenticados ejecutar comandos SQL de su elecci\u00f3n modificando el par\u00e1metro P_LOV y calculando un resumen MD5 que case con el par\u00e1metro P_LOV_CHECKSUM.\r\nNOTA: Es probable que esta vulnerabilidad est\u00e9 incluida en CVE-2006-5351, pero debido a la falta de detalles de Oracle, no se puede probar." } ], "evaluatorSolution": "This vulnerability is addressed in the following product patch:\r\nhttp://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2006.html \r\n", "id": "CVE-2006-7138", "lastModified": "2024-11-21T00:24:28.853", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-03-07T20:19:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050265.html" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/2346" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.red-database-security.com/advisory/oracle_apex_sql_injection_wwv_flow_utilities.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.red-database-security.com/advisory/oracle_cpu_oct_2006.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/449498/100/0/threaded" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30106" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050265.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/2346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.red-database-security.com/advisory/oracle_apex_sql_injection_wwv_flow_utilities.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.red-database-security.com/advisory/oracle_cpu_oct_2006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/449498/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30106" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-10-18 01:07
Modified
2024-11-21 00:18
Severity ?
Summary
Multiple unspecified vulnerabilities in Oracle Application Express (formerly Oracle HTML DB) 1.5 up to 2.0 have unknown impact and remote attack vectors, aka Vuln# (1) APEX01, (2) APEX02, (3) APEX03, (4) APEX05, (5) APEX06, (6) APEX07, (7) APEX08, (8) APEX09, (9) APEX10, (10) APEX11, (11) APEX12, (12) APEX13, (13) APEX14, (14) APEX15, (15) APEX16, (16) APEX17, (17) APEX18, (18) APEX19, (19) APEX22, (20) APEX23, (21) APEX24, (22) APEX25, (23) APEX26, (24) APEX27, (25) APEX28, (26) APEX29, (27) APEX30, (28) APEX31, (29) APEX32, (30) APEX33, (31) APEX34, and (32) APEX35. NOTE: as of 20061027, it is likely that some of these identifiers are associated with cross-site scripting (XSS) in WWV_FLOW_ITEM_HELP and NOTIFICATION_MSG, but these have been provided separate identifiers.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:apex:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "18E9031D-19DD-4E6D-BDB4-0EC93DB6C8CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:apex:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "2D813027-4F66-4CFB-A3C4-F5A302B0D9BC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Oracle Application Express (formerly Oracle HTML DB) 1.5 up to 2.0 have unknown impact and remote attack vectors, aka Vuln# (1) APEX01, (2) APEX02, (3) APEX03, (4) APEX05, (5) APEX06, (6) APEX07, (7) APEX08, (8) APEX09, (9) APEX10, (10) APEX11, (11) APEX12, (12) APEX13, (13) APEX14, (14) APEX15, (15) APEX16, (16) APEX17, (17) APEX18, (18) APEX19, (19) APEX22, (20) APEX23, (21) APEX24, (22) APEX25, (23) APEX26, (24) APEX27, (25) APEX28, (26) APEX29, (27) APEX30, (28) APEX31, (29) APEX32, (30) APEX33, (31) APEX34, and (32) APEX35. NOTE: as of 20061027, it is likely that some of these identifiers are associated with cross-site scripting (XSS) in WWV_FLOW_ITEM_HELP and NOTIFICATION_MSG, but these have been provided separate identifiers." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades no especificadas en Oracle Application Express (anteriormente Oracle HTML DB) 1.5 a 2.0 tienen impacto y vectores de ataque remotos desconocidos, tambi\u00e9n conocido como Vuln# (1) APEX01, (2) APEX02, (3) APEX03, (4) APEX05, (5) APEX06, (6) APEX07, (7) APEX08, (8) APEX09, (9) APEX10, (10) APEX11, (11) APEX12, (12) APEX13, (13) APEX14, (14) APEX15, (15) APEX16, (16) APEX17, (17) APEX18, (18) APEX19, (19) APEX22, (20) APEX23, (21) APEX24, (22) APEX25, (23) APEX26, (24) APEX27, (25) APEX28, (26) APEX29, (27) APEX30, (28) APEX31, (29) APEX32, (30) APEX33, (31) APEX34, y (32) APEX35. NOTA: a fecha de 27/10/2006, es probable que uno de estos identificadores est\u00e9 asociado con secuencias de comandos en sitios cruzados (XSS) en WWV_FLOW_ITEM_HELP, pero a ese problema se le ha asignado un identificador aparte." } ], "id": "CVE-2006-5351", "lastModified": "2024-11-21T00:18:52.703", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-10-18T01:07:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22396" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1017077" }, { "source": "cve@mitre.org", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2006-095368.html" }, { "source": "cve@mitre.org", "url": "http://www.red-database-security.com/advisory/oracle_cpu_oct_2006.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/449711/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/449711/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/20588" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-291A.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/4065" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22396" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1017077" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2006-095368.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.red-database-security.com/advisory/oracle_cpu_oct_2006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/449711/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/449711/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/20588" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-291A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/4065" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-10-18 01:07
Modified
2024-11-21 00:18
Severity ?
Summary
Multiple unspecified vulnerabilities in Oracle Application Express 1.5 up to 1.6.1 have unknown impact and remote attack vectors, aka Vuln# (1) APEX04, (2) APEX20, and (3) APEX21.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:apex:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "18E9031D-19DD-4E6D-BDB4-0EC93DB6C8CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:apex:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "574D3EEB-E1D4-4DB3-93D3-0410747EC8BC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Oracle Application Express 1.5 up to 1.6.1 have unknown impact and remote attack vectors, aka Vuln# (1) APEX04, (2) APEX20, and (3) APEX21." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades no especificadas en Oracle Application Express 1.5 a 1.6.1 tienen impacto y vectores de ataque remotos desconocidos, tambi\u00e9n conocido como Vuln# (1) APEX04, (2) APEX20, y (3) APEX21." } ], "id": "CVE-2006-5352", "lastModified": "2024-11-21T00:18:52.953", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-10-18T01:07:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/22396" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1017077" }, { "source": "cve@mitre.org", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2006-095368.html" }, { "source": "cve@mitre.org", "url": "http://www.red-database-security.com/advisory/oracle_cpu_oct_2006.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/449711/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/449711/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/20588" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-291A.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/4065" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/22396" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1017077" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2006-095368.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.red-database-security.com/advisory/oracle_cpu_oct_2006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/449711/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/449711/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/20588" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-291A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/4065" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-10-28 01:07
Modified
2024-11-21 00:19
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Oracle Application Express (formerly HTML DB) before 2.2.1 allows remote attackers to inject arbitrary HTML or web script via the WWV_FLOW_ITEM_HELP package. NOTE: it is likely that this issue overlaps one of the Oracle VulnIDs covered by CVE-2006-5351. Oracle has not publicly disputed claims by a reliable researcher that this has been fixed by the October 2006 CPU.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:apex:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "95351E3F-5B5C-48F1-9137-2CCCE11775AF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Oracle Application Express (formerly HTML DB) before 2.2.1 allows remote attackers to inject arbitrary HTML or web script via the WWV_FLOW_ITEM_HELP package. NOTE: it is likely that this issue overlaps one of the Oracle VulnIDs covered by CVE-2006-5351. Oracle has not publicly disputed claims by a reliable researcher that this has been fixed by the October 2006 CPU." }, { "lang": "es", "value": "Vulnerabilidad de cruce de sitios en scripts (XSS) en Oracle Application Express (anteriormente conocido como HTML DB) versiones anteriores a 2.2.1 permite a atacantes remotos inyectar scripts WEB o HTML de su elecci\u00f3n mediante el paquete WWV_FLOW_ITEM_HELP.\r\nNOTA: Es probable que esta vulnerabilidad se solape con alguna de las VulnIDs de Oracle, descritas en CVE-2006-5351. Oracle no ha impugnado p\u00fablicamente los comentarios de un investigador fiable que indica que esto se ha corregido en el CPU de Octubre de 2006." } ], "id": "CVE-2006-5599", "lastModified": "2024-11-21T00:19:51.150", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-10-28T01:07:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/1792" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2006.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.red-database-security.com/advisory/oracle_apex_css_wwv_flow_item_help.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/449500/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Patch", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-291A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/1792" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.red-database-security.com/advisory/oracle_apex_css_wwv_flow_item_help.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/449500/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-291A.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-03-07 20:19
Modified
2024-11-21 00:24
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Oracle Application Express (APEX) before 2.2.1, aka Oracle HTML DB, allows remote attackers to inject arbitrary web script or HTML via the NOTIFICATION_MSG parameter. NOTE: it is likely that this issue overlaps one of the identifiers in CVE-2006-5351.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:apex:*:*:*:*:*:*:*:*", "matchCriteriaId": "E235445A-FDFA-4A5C-B76E-579AFDAB6B17", "versionEndIncluding": "2.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Oracle Application Express (APEX) before 2.2.1, aka Oracle HTML DB, allows remote attackers to inject arbitrary web script or HTML via the NOTIFICATION_MSG parameter. NOTE: it is likely that this issue overlaps one of the identifiers in CVE-2006-5351." }, { "lang": "es", "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Oracle Application Express (APEX) versiones anteriores a 2.2.1, tambi\u00e9n conocido como Oracle HTML DB, permite a atacantes remotos inyectar scripts web o HTML de su elecci\u00f3n a trav\u00e9s del par\u00e1metro NOTIFICATION_MSG.\r\nNOTA: es probable que esta vulnerabilidad solape uno de los identificadores en CVE-2006-5351." } ], "evaluatorComment": "This vulnerability is addressed in the following product update:\r\nhttp://www.oracle.com/technology/products/database/application_express/download.html \r\n", "id": "CVE-2006-7158", "lastModified": "2024-11-21T00:24:31.590", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2007-03-07T20:19:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22396" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/2382" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.red-database-security.com/advisory/oracle_apex_css_notification_msg.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/449501/100/0/threaded" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30107" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22396" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/2382" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.red-database-security.com/advisory/oracle_apex_css_notification_msg.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/449501/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30107" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-07-18 19:30
Modified
2024-11-21 00:34
Severity ?
Summary
Multiple unspecified vulnerabilities in Oracle Database 9.0.1.5+, 9.2.0.7, and 10.1.0.5 allow remote authenticated users to have unknown impact via (1) SYS.DBMS_PRVTAQIS in the Advanced Queuing component (DB02) and (2) MDSYS.MD in the Spatial component (DB12). NOTE: Oracle has not disputed reliable researcher claims that DB02 is for SQL injection and DB12 is for a buffer overflow.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:apex:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "18E9031D-19DD-4E6D-BDB4-0EC93DB6C8CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:apex:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "574D3EEB-E1D4-4DB3-93D3-0410747EC8BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:apex:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "2D813027-4F66-4CFB-A3C4-F5A302B0D9BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:apex:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "95351E3F-5B5C-48F1-9137-2CCCE11775AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server:1.0.2.2:r2:*:*:*:*:*:*", "matchCriteriaId": "F7969E06-9E5E-4264-B235-B0C4C1DB56D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server:9.0.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "9CA9867F-D7BC-4230-9584-C2FBB6642482", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server:10.1.2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "FB8F5AAE-0365-4E01-AB04-CDC6D58B00B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server:10.1.2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F0B4BAA9-D045-4D2B-8220-47F47ED936DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server:10.1.2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "FE6C4D36-D9D1-4143-94AA-D8E08F23D2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server:10.1.2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F01A3ABC-2033-47E0-A84C-62CCA67C578F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server:10.1.3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "3DB877D9-C8BB-4A08-A953-043F7DB5BA6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server:10.1.3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "8B77FF3B-B84E-4918-8688-0B25CFC61141", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server:10.1.3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9D9D2A52-5131-4A24-A355-2DACAFFA22D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_server:10.1.3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE059C8C-BA43-4757-8CA6-8E1B67DF8903", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:collaboration_suite:10.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "DDF7ABE6-0AFB-4A74-A533-2D390991A6CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:database_server:9.0.1.5:*:fips:*:*:*:*:*", "matchCriteriaId": "D86DC2E3-3B89-4FAC-9B8F-DC629B50ADC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:database_server:9.2.0.7:r2:*:*:*:*:*:*", "matchCriteriaId": "FE7180CD-675E-4311-AE7A-6098EE241965", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:database_server:9.2.0.8:r2:*:*:*:*:*:*", "matchCriteriaId": "B2E404AB-7F54-48D5-BFA5-8D08BB3FC6C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:database_server:9.2.0.8dv:r2:*:*:*:*:*:*", "matchCriteriaId": "04E72F3A-E839-4CFF-9CB7-1E1FC6F8C8E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:database_server:10.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "03A522A3-07D7-481F-A538-EA3D13256F63", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:database_server:10.2.0.2:r2:*:*:*:*:*:*", "matchCriteriaId": "26BFEEFD-C652-46A2-A9E7-36210482DD48", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:database_server:10.2.0.3:r2:*:*:*:*:*:*", "matchCriteriaId": "A14DD3F3-2CC4-492A-9C78-9B3C39D7AD17", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:e-business_suite:11.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "D07FEA4F-B1C7-4250-81FD-AC1289769348", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:e-business_suite:11.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "78408427-3FFB-45C4-82EF-C8D636B3A718", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:e-business_suite:11.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "C9B1BE09-4A96-41A3-AA1D-74533F396998", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:e-business_suite:11.5.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "80B61990-9CC2-4215-9879-AC817F4E6767", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:e-business_suite:12.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D0CBDB5-B13D-4071-994A-E1318A3821DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:e-business_suite:12.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "610AE265-C18D-4895-8034-5DB331DC68DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_customer_relationship_management:8.9:*:*:*:*:*:*:*", "matchCriteriaId": "FEA79502-9191-422F-8F45-6CA1B95E1A04", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_customer_relationship_management:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "C7EDD576-D9BE-4478-84FE-833F89930A0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_human_capital_management:8.9:*:*:*:*:*:*:*", "matchCriteriaId": "F9D36815-CB02-4F65-988A-1F8B677D2F0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_human_capital_management:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "CDA3A737-0989-478B-BAA6-8DC84E937E49", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.22:*:*:*:*:*:*:*", "matchCriteriaId": "31D3B59F-EBAE-410A-9370-BD12956C11B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.47:*:*:*:*:*:*:*", "matchCriteriaId": "4C2CF929-6203-436A-AAEB-6E2142B2B1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.48:*:*:*:*:*:*:*", "matchCriteriaId": "7C098860-0862-4C5B-8EE4-9469D5D01815", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.49:*:*:*:*:*:*:*", "matchCriteriaId": "445508AC-3316-459F-98C1-8310EF327E8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:secure_enterprise_search:10.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "74835B56-8009-4688-99DC-E6CAD3BEEFD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:secure_enterprise_search:10.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "184FC430-F68B-4390-90C7-421F968425ED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Oracle Database 9.0.1.5+, 9.2.0.7, and 10.1.0.5 allow remote authenticated users to have unknown impact via (1) SYS.DBMS_PRVTAQIS in the Advanced Queuing component (DB02) and (2) MDSYS.MD in the Spatial component (DB12). NOTE: Oracle has not disputed reliable researcher claims that DB02 is for SQL injection and DB12 is for a buffer overflow." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades no especificadas en Oracle Database versiones 9.0.1.5+, 9.2.0.7 y 10.1.0.5, permiten a usuarios autenticados remotoss tener un impacto desconocido por medio de (1) SYS.DBMS_PRVTAQIS en el componente Advanced Queuing (DB02) y (2) MDSYS.MD en el componente Spatial (DB12). NOTA: Oracle no ha cuestionado las afirmaciones de investigadores confiables de que DB02 es para una inyecci\u00f3n SQL y DB12 para un desbordamiento de b\u00fafer." } ], "id": "CVE-2007-3854", "lastModified": "2024-11-21T00:34:13.937", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-07-18T19:30:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00727143" }, { "source": "cve@mitre.org", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00727143" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/26114" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/26166" }, { "source": "cve@mitre.org", "url": "http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf" }, { "source": "cve@mitre.org", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2007-087014.html" }, { "source": "cve@mitre.org", "url": "http://www.red-database-security.com/advisory/oracle_cpu_jul_2007.html" }, { "source": "cve@mitre.org", "url": "http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_prvtaqis.html" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018415" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-200A.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/2562" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/2635" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35490" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35497" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00727143" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00727143" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/26114" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/26166" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2007-087014.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.red-database-security.com/advisory/oracle_cpu_jul_2007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_prvtaqis.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018415" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-200A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/2562" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/2635" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35490" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35497" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }