Multiple vulnerabilities in Oracle TimesTen In-Memory Database

CERT-LatestNews ThreatsCybercrime Uncategorized VulnerabilitiesAll VulnerabilitiesApplications VulnerabilitiesCrypto VulnerabilitiesDBMS VulnerabilitiesNetwork VulnerabilitiesOracle

Exploit availability: No Description. CWE-284 – Improper Access Control The vulnerability allows a remote attacker to gain unauthorized access to sensitive information. The vulnerability exists due to improper access restrictions when “getACL()” command doesn’t check any permission when retrieves….