Vulnerabilities in Oracle One-to-One Fulfillment