Oracle.Database.Win32.OS.Command.Injection
Description
This indicates an attack attempt to exploit a Command Injection Vulnerability in Oracle Database.
The vulnerability is due to insufficient validation when handling user-supplied inputs. A remote attacker could exploit this vulnerability by sending a maliciously crafted request to the target server. Successful exploitation can lead to arbitrary command execution within the context of the system.
Affected Products
Oracle Database 10g
Oracle Database 9i
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Currently we are not aware of any solution or patch about this vulnerability.
Coverage
| IPS (Regular DB) | |
| IPS (Extended DB) |