Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux

CVE-2006-0435
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
Unspecified vulnerability in Oracle PL/SQL (PLSQL), as used in Database Server DS 9.2.0.7 and 10.1.0.5, Application Server 1.0.2.2, 9.0.4.2, 10.1.2.0.2, 10.1.2.1.0, and 10.1.3.0.0, E-Business Suite and Applications 11.5.10, and Collaboration Suite 10.1.1, 10.1.2.0, 10.1.2.1, and 9.0.4.2, allows attackers to bypass the PLSQLExclusion list and access excluded packages and procedures, aka Vuln# PLSQL01..
CVSSv2.0 Score
- Severity
- High
- Base Score
- 7.5/10
- Exploit Score
- 10/10
- Access Vector
- Network
- Access Complexity
- Low
- Authentication Required
- None
- Impact Score
- 6.4/10
- Confidentiality Impact
- Partial
- Availability Impact
- Partial
- Integrity Impact
- Partial
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:oracle:http_server:9.0.3.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:application_server:10.1.2.0.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:http_server:9.0.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:application_server:9.0.2.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:application_server:*:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:application_server:10.1.2.1.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:http_server:1.0.2.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:http_server:9.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:application_server:9.0.2.0.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:application_server:1.0.2.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:http_server:8.1.7:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:application_server:10.1.0.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:application_server:9.0.2.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:http_server:9.2.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:http_server:9.0.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:application_server:9.0.4.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:http_server:1.0.2.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:application_server:9.2.0.7:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:application_server:9.0.2.0.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:http_server:1.0.2.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:application_server:9.0.4.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:application_server:9.0.2.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:application_server:1.0.2.2.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:application_server:1.0.2.1s:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:application_server:9.0.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:application_server:1.0.2.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:application_server:9.0.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:application_server:10.1.0.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:application_server:9.0.3.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:application_server:10.1.2_.0.1:*:*:*:*:*:*: |
Yes
|
- | - | |
cpe:2.3:a:oracle:application_server:10.1.0.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:http_server:1.0.2.1s_for_apps:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:application_server:1.0.2.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:application_server:9.2.0.6:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:application_server:10.1.0.3.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:http_server:9.0.2.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:http_server:1.0.2.2_roll_up_2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:application_server:10.1.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:application_server:9.0.4.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:application_server:1.0.2:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://www.securityfocus.com/bid/16384
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041742.html
- http://www.kb.cert.org/vuls/id/169164
- http://www.osvdb.org/22719
- http://securitytracker.com/id?1015544
- http://secunia.com/advisories/18621
- http://www.oracle.com/technology/deploy/security/pdf/public_vuln_to_advisory_mapping.htm
- http://securitytracker.com/id?1015961
- http://secunia.com/advisories/19712
- http://secunia.com/advisories/19859
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-February/041899.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-February/041898.html
- http://securityreason.com/securityalert/402
- http://securityreason.com/securityalert/403
- http://www.vupen.com/english/advisories/2006/1397
- http://www.vupen.com/english/advisories/2006/1571
- http://www.vupen.com/english/advisories/2006/0338
- http://www.oracle.com/technetwork/topics/security/cpuapr2006-090826.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24363
- http://www.securityfocus.com/archive/1/432267/100/0/threaded
- http://www.securityfocus.com/archive/1/424394/100/0/threaded
- http://www.securityfocus.com/archive/1/423822/100/0/threaded
- http://www.securityfocus.com/archive/1/423819/100/0/threaded
- http://www.securityfocus.com/archive/1/423673/100/0/threaded
- http://www.securityfocus.com/archive/1/423029/100/0/threaded