Multiple vulnerabilities have been reported in various Oracle products which could be exploited by a remote attacker to execute arbitrary code, gain elevated privileges, cause denial-of-service conditions, access sensitive information, manipulate data, or bypass security controls on the targeted system.
Target Audience:
Organizations and IT administrators using Oracle Corporation products.
Risk Assessment:
Risk of remote code execution, system instability or sensitive information disclosure.
Impact Assessment:
Potential unauthorized access to sensitive information, denial of service, data manipulation, and complete takeover of control of the target system.
The information provided herein is on "as is" basis, without warranty of any kind.