6 results (0.008 seconds)

CVSS: 5.5EPSS: 1%CPEs: 38EXPL: 0

Multiple unspecified vulnerabilities in Oracle Database 9.0.1.5+, 9.2.0.7, and 10.1.0.5 allow remote authenticated users to have unknown impact via (1) SYS.DBMS_PRVTAQIS in the Advanced Queuing component (DB02) and (2) MDSYS.MD in the Spatial component (DB12). NOTE: Oracle has not disputed reliable researcher claims that DB02 is for SQL injection and DB12 is for a buffer overflow. Múltiples vulnerabilidades no especificadas en Oracle Database versiones 9.0.1.5+, 9.2.0.7 y 10.1.0.5, permiten a usuarios autenticados remotoss tener un impacto desconocido por medio de (1) SYS.DBMS_PRVTAQIS en el componente Advanced Queuing (DB02) y (2) MDSYS.MD en el componente Spatial (DB12). NOTA: Oracle no ha cuestionado las afirmaciones de investigadores confiables de que DB02 es para una inyección SQL y DB12 para un desbordamiento de búfer. • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00727143 http://secunia.com/advisories/26114 http://secunia.com/advisories/26166 http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf http://www.oracle.com/technetwork/topics/security/cpujul2007-087014.html http://www.red-database-security.com/advisory/oracle_cpu_jul_2007.html http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_prvtaqis.html http://w •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

Unspecified vulnerability in Oracle Application Express (formerly Oracle HTML DB) 2.2.0.00.32 up to 3.0.0.00.20 allows developers to have an unknown impact via unknown attack vectors, aka APEX01. NOTE: a reliable researcher states that this is SQL injection in the wwv_flow_security.check_db_password function due to insufficient checks for '"' characters. Vulnerabilidad no especificada en Oracle Application Express (formerly Oracle HTML DB) 2.2.0.00.32 hasta la 3.0.0.00.20 permite a a desarolladores tener un impacto desconocido a través de vectores de ataque desconocidos, también conocido como APEX01. NOTA: un investigador creible indica que esta es una inyección SQL en la función wwv_flow_security.check_db_password debido a los insuficientes controles de acceso para los caracteres '"'. • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00727143 http://secunia.com/advisories/26114 http://secunia.com/advisories/26166 http://securityreason.com/securityalert/2901 http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf http://www.oracle.com/technetwork/topics/security/cpujul2007-087014.html http://www.red-database-security.com/advisory/oracle_apex_sql_injection_check_db_password.html http://www.red-database-security& •

CVSS: 6.0EPSS: 0%CPEs: 1EXPL: 1

SQL injection vulnerability in wwv_flow_utilities.gen_popup_list in the WWV_FLOW_UTILITIES package for Oracle APEX/HTMLDB before 2.2 allows remote authenticated users to execute arbitrary SQL by modifying the P_LOV parameter and calculating a matching MD5 checksum for the P_LOV_CHECKSUM parameter. NOTE: it is likely that this issue is subsumed by CVE-2006-5351, but due to lack of details from Oracle, this cannot be proven. Vulnerabilidad de inyección SQL en wwv_flow_utilities.gen_popup_list en WWV_FLOW_UTILITIES paquete para Oracle APEX/HTMLDB versiones anteriores a 2.2 permite a usuarios remotos autenticados ejecutar comandos SQL de su elección modificando el parámetro P_LOV y calculando un resumen MD5 que case con el parámetro P_LOV_CHECKSUM. NOTA: Es probable que esta vulnerabilidad esté incluida en CVE-2006-5351, pero debido a la falta de detalles de Oracle, no se puede probar. • http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050265.html http://securityreason.com/securityalert/2346 http://www.red-database-security.com/advisory/oracle_apex_sql_injection_wwv_flow_utilities.html http://www.red-database-security.com/advisory/oracle_cpu_oct_2006.html http://www.securityfocus.com/archive/1/449498/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/30106 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 4.3EPSS: 1%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in Oracle Application Express (APEX) before 2.2.1, aka Oracle HTML DB, allows remote attackers to inject arbitrary web script or HTML via the NOTIFICATION_MSG parameter. NOTE: it is likely that this issue overlaps one of the identifiers in CVE-2006-5351. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Oracle Application Express (APEX) versiones anteriores a 2.2.1, también conocido como Oracle HTML DB, permite a atacantes remotos inyectar scripts web o HTML de su elección a través del parámetro NOTIFICATION_MSG. NOTA: es probable que esta vulnerabilidad solape uno de los identificadores en CVE-2006-5351. • http://secunia.com/advisories/22396 http://securityreason.com/securityalert/2382 http://www.red-database-security.com/advisory/oracle_apex_css_notification_msg.html http://www.securityfocus.com/archive/1/449501/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/30107 •

CVSS: 10.0EPSS: 1%CPEs: 2EXPL: 0

Multiple unspecified vulnerabilities in Oracle Application Express 1.5 up to 1.6.1 have unknown impact and remote attack vectors, aka Vuln# (1) APEX04, (2) APEX20, and (3) APEX21. Múltiples vulnerabilidades no especificadas en Oracle Application Express 1.5 a 1.6.1 tienen impacto y vectores de ataque remotos desconocidos, también conocido como Vuln# (1) APEX04, (2) APEX20, y (3) APEX21. • http://secunia.com/advisories/22396 http://securitytracker.com/id?1017077 http://www.oracle.com/technetwork/topics/security/cpuoct2006-095368.html http://www.red-database-security.com/advisory/oracle_cpu_oct_2006.html http://www.securityfocus.com/archive/1/449711/100/0/threaded http://www.securityfocus.com/bid/20588 http://www.us-cert.gov/cas/techalerts/TA06-291A.html http://www.vupen.com/english/advisories/2006/4065 •