Multiple vulnerabilities have been reported in various Oracle products, which could be exploited by a remote attacker to trigger elevation of privilege, denial of service condition, remote code execution, data manipulation, obtain sensitive information, and/or bypass security restrictions on the targeted system.
Target Audience:
Individuals and organisational users of the above mentioned Oracle products.
Risk Assessment:
High risk of information disclosure, data manipulation, system instability and arbitrary code execution
Impact Assessment:
Potential unauthorized access to sensitive information, denial of service, data manipulation, and complete takeover of control of the target system.
The information provided herein is on "as is" basis, without warranty of any kind.