CVE-2006-0265

N/A Unknown
Published: January 18, 2006 Modified: April 16, 2026
View on NVD

Description

Multiple unspecified vulnerabilities in Oracle Database server 8.1.7.4, 9.0.1.5, 9.2.0.7, 10.1.0.5, and 10.2.0.1 have unspecified impact and attack vectors, as identified by Oracle Vuln# (1) DB17 in the Oracle Text component and (2) DB18 in the Program Interface Network component. NOTE: details are unavailable from Oracle, but they have not publicly disputed a claim by a reliable independent researcher that states that DB17 involves SQL injection in the (a) VALIDATE_STATEMENT and BUILD_DML functions in CTXSYS.DRILOAD; (b) CLEAN_DML function in CTXSYS.DRIDML; (c) GET_ROWID function in CTXSYS.CTX_DOC; (d) BROWSE_WORDS function in CTXSYS.CTX_QUERY; and (e) ODCIINDEXTRUNCATE, ODCIINDEXDROP, and ODCIINDEXDELETE functions in CATINDEXMETHODS.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/18493
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/18608
Source: cve@mitre.org
Patch Vendor Advisory
http://securitytracker.com/id?1015499
Source: cve@mitre.org
Patch
http://www.kb.cert.org/vuls/id/545804
Source: cve@mitre.org
Third Party Advisory US Government Resource
http://www.osvdb.org/22555
Source: cve@mitre.org
http://www.osvdb.org/22639
Source: cve@mitre.org
http://www.osvdb.org/22640
Source: cve@mitre.org
http://www.osvdb.org/22641
Source: cve@mitre.org
http://www.osvdb.org/22642
Source: cve@mitre.org
http://www.securityfocus.com/bid/16287
Source: cve@mitre.org
Exploit
http://www.vupen.com/english/advisories/2006/0243
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2006/0323
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/18493
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/18608
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://securitytracker.com/id?1015499
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.kb.cert.org/vuls/id/545804
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.osvdb.org/22555
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/22639
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/22640
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/22641
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/22642
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.red-database-security.com/advisory/oracle_cpu_jan_2006.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/bid/16287
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.vupen.com/english/advisories/2006/0243
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2006/0323
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/24321
Source: af854a3a-2127-422b-91ae-364da2661108

30 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
2.8%
86th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

oracle