This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Data Quality. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the TSS12.LoaderWizard.lwctrl ActiveX control. The SetEntities method does not validate the type of data passed to it, instead treating any object passed in as if it were the expected type. An attacker could leverage this to execute arbitrary code in the context of the browser.