{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T18:31:56.800","vulnerabilities":[{"cve":{"id":"CVE-2006-5332","sourceIdentifier":"cve@mitre.org","published":"2006-10-18T01:07:00.000","lastModified":"2026-04-23T00:35:47.467","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in xdb.dbms_xdbz in the XMLDB component for Oracle Database 9.2.0.6 and 10.1.0.4 has unknown impact and remote authenticated attack vectors, aka Vuln# DB01.  NOTE: as of 20061023, Oracle has not disputed reports from reliable third parties that DB01 is for PL/SQL injection in the ENABLE_HIERARCHY_INTERNAL procedure."},{"lang":"es","value":"Vulnerabilidad no especificada en xdb.dbms_xdbz en el componente XMLDB para Oracle Database 9.2.0.6 y 10.1.0.4 tiene impacto y vectores de ataque remotos autenticados desconocidos, también conocido como Vuln# DB01. NOTA: a fecha del 23/10/2006, Oracle no ha negado los informes de terceras partes fiables de que DB01 es una inyección PL/SQL en el procedimiento ENABLE_HIERARCHY_INTERNAL."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C","baseScore":9.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:database_server:9.2.0.6:*:*:*:*:*:*:*","matchCriteriaId":"07F11F24-415A-4E36-9D03-5B7594356183"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:database_server:10.1.0.4:*:*:*:*:*:*:*","matchCriteriaId":"F21B42DF-71DC-4FC4-8050-CFF7A3B641E5"}]}]}],"references":[{"url":"http://secunia.com/advisories/22396","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://securitytracker.com/id?1017077","source":"cve@mitre.org"},{"url":"http://www.databasesecurity.com/oracle/OracleOct2006-CPU-Analysis.pdf","source":"cve@mitre.org"},{"url":"http://www.kb.cert.org/vuls/id/717140","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2006-095368.html","source":"cve@mitre.org"},{"url":"http://www.red-database-security.com/advisory/oracle_cpu_oct_2006.html","source":"cve@mitre.org"},{"url":"http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_xdbz0.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/449110/100/0/threaded","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/449510/100/0/threaded","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/449711/100/0/threaded","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/20588","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://www.us-cert.gov/cas/techalerts/TA06-291A.html","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.vupen.com/english/advisories/2006/4065","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/22396","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://securitytracker.com/id?1017077","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.databasesecurity.com/oracle/OracleOct2006-CPU-Analysis.pdf","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.kb.cert.org/vuls/id/717140","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2006-095368.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.red-database-security.com/advisory/oracle_cpu_oct_2006.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_xdbz0.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/449110/100/0/threaded","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/449510/100/0/threaded","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/449711/100/0/threaded","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/20588","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www.us-cert.gov/cas/techalerts/TA06-291A.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.vupen.com/english/advisories/2006/4065","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}