Show plain JSON{"id": "CVE-2006-5333", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.1, "accessVector": "NETWORK", "vectorString": "AV:N/AC:H/Au:S/C:C/I:C/A:C", "authentication": "SINGLE", "integrityImpact": "COMPLETE", "accessComplexity": "HIGH", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2006-10-18T01:07:00.000", "references": [{"url": "http://secunia.com/advisories/22396", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://securitytracker.com/id?1017077", "source": "cve@mitre.org"}, {"url": "http://www.databasesecurity.com/oracle/OracleOct2006-CPU-Analysis.pdf", "source": "cve@mitre.org"}, {"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2006-095368.html", "source": "cve@mitre.org"}, {"url": "http://www.red-database-security.com/advisory/oracle_cpu_oct_2006.html", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/449110/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/449711/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/449711/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/20588", "tags": ["Patch"], "source": "cve@mitre.org"}, {"url": "http://www.us-cert.gov/cas/techalerts/TA06-291A.html", "tags": ["US Government Resource"], "source": "cve@mitre.org"}, {"url": "http://www.vupen.com/english/advisories/2006/4065", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/22396", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://securitytracker.com/id?1017077", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.databasesecurity.com/oracle/OracleOct2006-CPU-Analysis.pdf", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2006-095368.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.red-database-security.com/advisory/oracle_cpu_oct_2006.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/449110/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/449711/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/449711/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/20588", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.us-cert.gov/cas/techalerts/TA06-291A.html", "tags": ["US Government Resource"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vupen.com/english/advisories/2006/4065", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "descriptions": [{"lang": "en", "value": "Unspecified vulnerability in Oracle Spatial component in Oracle Database 10.2.0.2 has unknown impact and remote authenticated attack vectors related to \"create session\" privileges, aka Vuln# DB02. NOTE: as of 20061023, Oracle has not disputed reports from reliable third parties that DB02 is for SQL injection in the SDO_DROP_USER_BEFORE package using a Trigger for a DROP USER statement in an anonymous PL/SQL block."}, {"lang": "es", "value": "Vulnerabilidad no especificada en el componente Oracle Spatial en Oracle Database 10.2.0.2 tiene impacto y vectores de ataque autenticado remoto desconocidos relacionados con privilegios \"create session\", tambi\u00e9n conocido como Vuln# DB02. NOTA: a partir de 20061023, Oracle no ha disputado informes de terceras partes confiables sobre que DB02 es para inyecci\u00f3n SQL en el paquete SDO_DROP_USER_BEFORE utilizando un Trigger para una sentencia DROP USER en un bloque an\u00f3nimo PL/SQL."}], "lastModified": "2025-04-09T00:30:58.490", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:oracle:database_server:10.2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "67FF2A2E-3693-424E-B53D-0BAD01D53F7A"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}