Oracle Security Vulnerabilities (CVEs)
Track 682 security vulnerabilities affecting Oracle products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.
This vulnerability in Oracle Database Enterprise Edition Sharding allows attackers with local logon privileges to compromise the sharding component, p...
Jul 19, 2022This vulnerability allows a high-privileged attacker with local access to the Oracle ZFS Storage Appliance infrastructure to completely compromise the...
Jul 19, 2022An unauthenticated attacker can exploit this vulnerability in Oracle Enterprise Manager Base Platform via HTTP to partially modify or delete data, rea...
Jul 19, 2022This vulnerability in Oracle Solaris 11's filesystem component allows authenticated attackers with network access via SMB to cause denial of service (...
Jul 19, 2022This vulnerability in Oracle Communications Billing and Revenue Management allows an unauthenticated attacker with network access via HTTP to potentia...
Jul 19, 2022CVE-2020-29505 is a key management vulnerability in Dell BSAFE cryptographic libraries that could allow attackers to compromise cryptographic operatio...
Jul 11, 2022CVE-2020-35169 is an improper input validation vulnerability in Dell BSAFE cryptographic libraries that could allow attackers to execute arbitrary cod...
Jul 11, 2022This vulnerability in curl versions before 7.83.1 could cause the wrong file to be deleted when using the --no-clobber option with --remove-on-error. ...
Jun 2, 2022CVE-2020-26185 is a buffer over-read vulnerability in Dell BSAFE Micro Edition Suite that could allow attackers to read sensitive information from adj...
Jun 1, 2022CVE-2022-1292 is a command injection vulnerability in the c_rehash script distributed with OpenSSL. It allows attackers to execute arbitrary commands ...
May 3, 2022CVE-2022-25647 is a deserialization vulnerability in Google's Gson library versions before 2.8.9. Attackers can exploit the writeReplace() method in i...
May 1, 2022This vulnerability in Oracle VM VirtualBox allows a low-privileged attacker with local access to the Windows host system to completely compromise the ...
Apr 19, 2022This vulnerability in Oracle Web Services Manager allows unauthenticated attackers with network access via HTTP to compromise the system when a user i...
Apr 19, 2022This vulnerability in Oracle Java SE and GraalVM Enterprise Edition allows unauthenticated remote attackers to access sensitive data from Java applica...
Apr 19, 2022This vulnerability in Oracle Java SE and GraalVM Enterprise Edition allows unauthenticated attackers with network access to modify critical data witho...
Apr 19, 2022This vulnerability in Oracle JD Edwards EnterpriseOne Tools allows unauthenticated attackers with network access via HTTP to cause denial of service (...
Apr 19, 2022This vulnerability in Oracle Commerce Guided Search allows unauthenticated attackers to remotely access sensitive data via HTTP. It affects Oracle Com...
Apr 19, 2022This vulnerability in Oracle Communications Billing and Revenue Management allows authenticated attackers with network access to manipulate critical d...
Apr 19, 2022This vulnerability in Oracle Communications Billing and Revenue Management allows low-privileged attackers with network access via TCP to potentially ...
Apr 19, 2022This critical vulnerability in Oracle Communications Billing and Revenue Management allows unauthenticated attackers with network access via TCP to co...
Apr 19, 2022CVE-2022-21441 is a denial-of-service vulnerability in Oracle WebLogic Server that allows unauthenticated attackers to crash the server via T3/IIOP ne...
Apr 19, 2022CVE-2022-21445 is a critical deserialization vulnerability in Oracle ADF Faces that allows unauthenticated remote attackers to execute arbitrary code....
Apr 19, 2022This vulnerability in Oracle Helidon's Reactive WebServer component allows an unauthenticated remote attacker with network access via HTTP to potentia...
Apr 19, 2022This vulnerability in Oracle Database 19c Enterprise Edition Sharding allows attackers with Create Any Procedure privilege and network access via Orac...
Apr 19, 2022This critical vulnerability in Oracle Coherence allows unauthenticated attackers with network access via the T3 protocol to completely compromise the ...
Apr 19, 2022This vulnerability in Oracle Communications Billing and Revenue Management allows authenticated attackers with network access to potentially compromis...
Apr 19, 2022This vulnerability in Twisted's HTTP 1.1 server allows HTTP request smuggling due to non-RFC-compliant parsing of HTTP requests. Attackers can exploit...
Apr 4, 2022This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of Spring Cloud Function. Attackers can cr...
Apr 1, 2022CVE-2022-1154 is a use-after-free vulnerability in Vim's utf_ptr2char function that could allow an attacker to execute arbitrary code or cause a denia...
Mar 30, 2022This vulnerability is an out-of-bounds memory write flaw in the Linux kernel's NFS subsystem, specifically affecting mirroring/replication functionali...
Mar 25, 2022This Linux kernel vulnerability allows a local unprivileged user to write to file handlers in the cgroups subsystem, potentially leading to system cra...
Mar 23, 2022A use-after-free vulnerability in the Linux kernel's FUSE filesystem allows a local attacker to trigger write() operations that can lead to unauthoriz...
Mar 18, 2022CVE-2022-22719 is a memory corruption vulnerability in Apache HTTP Server where a specially crafted request body can cause the server to read from ran...
Mar 14, 2022Apache HTTP Server versions 2.4.52 and earlier contain a vulnerability where the server fails to properly close inbound connections when encountering ...
Mar 14, 2022CVE-2022-23943 is a critical heap memory corruption vulnerability in Apache HTTP Server's mod_sed module that allows attackers to write data beyond al...
Mar 14, 2022CVE-2020-36518 is a denial-of-service vulnerability in Jackson Databind where processing deeply nested JSON objects causes a Java StackOverflowError, ...
Mar 11, 2022This vulnerability in Apache Spark allows attackers to recover full encryption keys from RPC connections using a flawed mutual authentication protocol...
Mar 10, 2022This vulnerability allows attackers to perform XML External Entity (XXE) attacks through Liquibase, potentially leading to sensitive data disclosure, ...
Mar 4, 2022CVE-2022-22947 is a critical remote code execution vulnerability in Spring Cloud Gateway when the Actuator endpoint is enabled and exposed without pro...
Mar 3, 2022CVE-2022-21716 is a memory exhaustion vulnerability in Twisted's SSH client and server implementations. Attackers can send unlimited data during SSH v...
Mar 3, 2022CVE-2022-23308 is a use-after-free vulnerability in libxml2's validation component that allows attackers to potentially execute arbitrary code or caus...
Feb 26, 2022This CVE describes a prototype pollution vulnerability in Node.js's console.table() function when user-controlled input is passed to the 'properties' ...
Feb 24, 2022This vulnerability in Node.js allows attackers to bypass certificate name constraints by using arbitrary Subject Alternative Name (SAN) types, particu...
Feb 24, 2022CVE-2022-25636 is a heap out-of-bounds write vulnerability in the Linux kernel's netfilter component that allows local users to escalate privileges to...
Feb 24, 2022CVE-2022-24407 is a SQL injection vulnerability in Cyrus SASL authentication library. It allows attackers to inject arbitrary SQL commands via unescap...
Feb 24, 2022This high-severity vulnerability in Oracle Talent Acquisition Cloud - Taleo Enterprise Edition allows attackers to execute arbitrary code remotely on ...
Feb 24, 2022This Linux kernel vulnerability allows remote attackers to bypass UDP source port randomization by exploiting flaws in ICMP error processing. Attacker...
Feb 18, 2022CVE-2022-25314 is an integer overflow vulnerability in Expat's copyString function that can lead to heap buffer overflow. This allows attackers to pot...
Feb 18, 2022CVE-2022-25315 is an integer overflow vulnerability in Expat's storeRawNames function that can lead to heap buffer overflow. This allows attackers to ...
Feb 18, 2022Traefik versions before 2.6.1 incorrectly handle TLS configuration when requests use fully qualified domain names (FQDNs) in the Host header, potentia...
Feb 17, 2022Why Monitor Oracle Security Vulnerabilities?
Real-time CVE tracking: Our automated system monitors 682+ known vulnerabilities affecting Oracle products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.
Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Oracle packages in under 60 seconds. No agents required - completely agentless scanning that works across Oracle deployments.
Free vulnerability database: Access detailed information about every Oracle CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.
🚀 Get Started in 60 Seconds
- Register free account & add your servers
- Run one-time scan or schedule automatic monitoring (every 1-24 hours)
- Receive instant alerts when new Oracle CVEs affect your systems
- Access dashboard with severity breakdown & fix instructions