This vulnerability allows local malicious users to escalate privileges on affected installations of Oracle Database. Authentication is required to exploit this vulnerability. The specific flaw exists within the execution of stored procedures. When executing stored procedures, the process does not properly check the caller's privileges. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from users with limited privileges.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
oracle rdbms sharding 12.2.0.1 |
||
oracle rdbms sharding 18c |
||
oracle rdbms sharding 19c |