7 results (0.005 seconds)

CVSS: 5.5EPSS: 1%CPEs: 38EXPL: 0

Multiple unspecified vulnerabilities in Oracle Database 9.0.1.5+, 9.2.0.7, and 10.1.0.5 allow remote authenticated users to have unknown impact via (1) SYS.DBMS_PRVTAQIS in the Advanced Queuing component (DB02) and (2) MDSYS.MD in the Spatial component (DB12). NOTE: Oracle has not disputed reliable researcher claims that DB02 is for SQL injection and DB12 is for a buffer overflow. Múltiples vulnerabilidades no especificadas en Oracle Database versiones 9.0.1.5+, 9.2.0.7 y 10.1.0.5, permiten a usuarios autenticados remotoss tener un impacto desconocido por medio de (1) SYS.DBMS_PRVTAQIS en el componente Advanced Queuing (DB02) y (2) MDSYS.MD en el componente Spatial (DB12). NOTA: Oracle no ha cuestionado las afirmaciones de investigadores confiables de que DB02 es para una inyección SQL y DB12 para un desbordamiento de búfer. • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00727143 http://secunia.com/advisories/26114 http://secunia.com/advisories/26166 http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf http://www.oracle.com/technetwork/topics/security/cpujul2007-087014.html http://www.red-database-security.com/advisory/oracle_cpu_jul_2007.html http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_prvtaqis.html http://w •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

Unspecified vulnerability in Oracle Application Express (formerly Oracle HTML DB) 2.2.0.00.32 up to 3.0.0.00.20 allows developers to have an unknown impact via unknown attack vectors, aka APEX01. NOTE: a reliable researcher states that this is SQL injection in the wwv_flow_security.check_db_password function due to insufficient checks for '"' characters. Vulnerabilidad no especificada en Oracle Application Express (formerly Oracle HTML DB) 2.2.0.00.32 hasta la 3.0.0.00.20 permite a a desarolladores tener un impacto desconocido a través de vectores de ataque desconocidos, también conocido como APEX01. NOTA: un investigador creible indica que esta es una inyección SQL en la función wwv_flow_security.check_db_password debido a los insuficientes controles de acceso para los caracteres '"'. • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00727143 http://secunia.com/advisories/26114 http://secunia.com/advisories/26166 http://securityreason.com/securityalert/2901 http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf http://www.oracle.com/technetwork/topics/security/cpujul2007-087014.html http://www.red-database-security.com/advisory/oracle_apex_sql_injection_check_db_password.html http://www.red-database-security& •

CVSS: 6.0EPSS: 0%CPEs: 1EXPL: 1

SQL injection vulnerability in wwv_flow_utilities.gen_popup_list in the WWV_FLOW_UTILITIES package for Oracle APEX/HTMLDB before 2.2 allows remote authenticated users to execute arbitrary SQL by modifying the P_LOV parameter and calculating a matching MD5 checksum for the P_LOV_CHECKSUM parameter. NOTE: it is likely that this issue is subsumed by CVE-2006-5351, but due to lack of details from Oracle, this cannot be proven. Vulnerabilidad de inyección SQL en wwv_flow_utilities.gen_popup_list en WWV_FLOW_UTILITIES paquete para Oracle APEX/HTMLDB versiones anteriores a 2.2 permite a usuarios remotos autenticados ejecutar comandos SQL de su elección modificando el parámetro P_LOV y calculando un resumen MD5 que case con el parámetro P_LOV_CHECKSUM. NOTA: Es probable que esta vulnerabilidad esté incluida en CVE-2006-5351, pero debido a la falta de detalles de Oracle, no se puede probar. • http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050265.html http://securityreason.com/securityalert/2346 http://www.red-database-security.com/advisory/oracle_apex_sql_injection_wwv_flow_utilities.html http://www.red-database-security.com/advisory/oracle_cpu_oct_2006.html http://www.securityfocus.com/archive/1/449498/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/30106 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 4.3EPSS: 1%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in Oracle Application Express (APEX) before 2.2.1, aka Oracle HTML DB, allows remote attackers to inject arbitrary web script or HTML via the NOTIFICATION_MSG parameter. NOTE: it is likely that this issue overlaps one of the identifiers in CVE-2006-5351. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Oracle Application Express (APEX) versiones anteriores a 2.2.1, también conocido como Oracle HTML DB, permite a atacantes remotos inyectar scripts web o HTML de su elección a través del parámetro NOTIFICATION_MSG. NOTA: es probable que esta vulnerabilidad solape uno de los identificadores en CVE-2006-5351. • http://secunia.com/advisories/22396 http://securityreason.com/securityalert/2382 http://www.red-database-security.com/advisory/oracle_apex_css_notification_msg.html http://www.securityfocus.com/archive/1/449501/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/30107 •

CVSS: 4.3EPSS: 5%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in Oracle Application Express (formerly HTML DB) before 2.2.1 allows remote attackers to inject arbitrary HTML or web script via the WWV_FLOW_ITEM_HELP package. NOTE: it is likely that this issue overlaps one of the Oracle VulnIDs covered by CVE-2006-5351. Oracle has not publicly disputed claims by a reliable researcher that this has been fixed by the October 2006 CPU. Vulnerabilidad de cruce de sitios en scripts (XSS) en Oracle Application Express (anteriormente conocido como HTML DB) versiones anteriores a 2.2.1 permite a atacantes remotos inyectar scripts WEB o HTML de su elección mediante el paquete WWV_FLOW_ITEM_HELP. NOTA: Es probable que esta vulnerabilidad se solape con alguna de las VulnIDs de Oracle, descritas en CVE-2006-5351. Oracle no ha impugnado públicamente los comentarios de un investigador fiable que indica que esto se ha corregido en el CPU de Octubre de 2006. • http://securityreason.com/securityalert/1792 http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2006.html http://www.red-database-security.com/advisory/oracle_apex_css_wwv_flow_item_help.html http://www.securityfocus.com/archive/1/449500/100/0/threaded http://www.us-cert.gov/cas/techalerts/TA06-291A.html •