Profitable assaults require human interaction from someone aside from the attacker. Successful attacks of this vulnerability may end up in unauthorized update, insert or delete usage of some of GoldenGate Stream Analytics obtainable facts and unauthorized go through access to a subset of GoldenGate Stream Analytics available knowledge and unauthori