Oracle Security Vulnerabilities (CVEs)

Track 682 security vulnerabilities affecting Oracle products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.

104 Critical
392 High
185 Medium
1 Low
🔔 Get Alerts for Oracle
CVE-2022-21510 8.8

This vulnerability in Oracle Database Enterprise Edition Sharding allows attackers with local logon privileges to compromise the sharding component, p...

Jul 19, 2022
CVE-2022-21513 8.2

This vulnerability allows a high-privileged attacker with local access to the Oracle ZFS Storage Appliance infrastructure to completely compromise the...

Jul 19, 2022
CVE-2022-21516 7.3

An unauthenticated attacker can exploit this vulnerability in Oracle Enterprise Manager Base Platform via HTTP to partially modify or delete data, rea...

Jul 19, 2022
CVE-2022-21524 7.6

This vulnerability in Oracle Solaris 11's filesystem component allows authenticated attackers with network access via SMB to cause denial of service (...

Jul 19, 2022
CVE-2022-21429 8.1

This vulnerability in Oracle Communications Billing and Revenue Management allows an unauthenticated attacker with network access via HTTP to potentia...

Jul 19, 2022
CVE-2020-29505 7.1

CVE-2020-29505 is a key management vulnerability in Dell BSAFE cryptographic libraries that could allow attackers to compromise cryptographic operatio...

Jul 11, 2022
CVE-2020-35169 9.1

CVE-2020-35169 is an improper input validation vulnerability in Dell BSAFE cryptographic libraries that could allow attackers to execute arbitrary cod...

Jul 11, 2022
CVE-2022-27778 8.1

This vulnerability in curl versions before 7.83.1 could cause the wrong file to be deleted when using the --no-clobber option with --remove-on-error. ...

Jun 2, 2022
CVE-2020-26185 7.5

CVE-2020-26185 is a buffer over-read vulnerability in Dell BSAFE Micro Edition Suite that could allow attackers to read sensitive information from adj...

Jun 1, 2022
CVE-2022-1292 7.3

CVE-2022-1292 is a command injection vulnerability in the c_rehash script distributed with OpenSSL. It allows attackers to execute arbitrary commands ...

May 3, 2022
CVE-2022-25647 7.7

CVE-2022-25647 is a deserialization vulnerability in Google's Gson library versions before 2.8.9. Attackers can exploit the writeReplace() method in i...

May 1, 2022
CVE-2022-21491 7.8

This vulnerability in Oracle VM VirtualBox allows a low-privileged attacker with local access to the Windows host system to completely compromise the ...

Apr 19, 2022
CVE-2022-21497 8.1

This vulnerability in Oracle Web Services Manager allows unauthenticated attackers with network access via HTTP to compromise the system when a user i...

Apr 19, 2022
CVE-2022-21476 7.5

This vulnerability in Oracle Java SE and GraalVM Enterprise Edition allows unauthenticated remote attackers to access sensitive data from Java applica...

Apr 19, 2022
CVE-2022-21449 7.5

This vulnerability in Oracle Java SE and GraalVM Enterprise Edition allows unauthenticated attackers with network access to modify critical data witho...

Apr 19, 2022
CVE-2022-21464 8.2

This vulnerability in Oracle JD Edwards EnterpriseOne Tools allows unauthenticated attackers with network access via HTTP to cause denial of service (...

Apr 19, 2022
CVE-2022-21466 7.5

This vulnerability in Oracle Commerce Guided Search allows unauthenticated attackers to remotely access sensitive data via HTTP. It affects Oracle Com...

Apr 19, 2022
CVE-2022-21424 8.3

This vulnerability in Oracle Communications Billing and Revenue Management allows authenticated attackers with network access to manipulate critical d...

Apr 19, 2022
CVE-2022-21430 8.5

This vulnerability in Oracle Communications Billing and Revenue Management allows low-privileged attackers with network access via TCP to potentially ...

Apr 19, 2022
CVE-2022-21431 10.0

This critical vulnerability in Oracle Communications Billing and Revenue Management allows unauthenticated attackers with network access via TCP to co...

Apr 19, 2022
CVE-2022-21441 7.5

CVE-2022-21441 is a denial-of-service vulnerability in Oracle WebLogic Server that allows unauthenticated attackers to crash the server via T3/IIOP ne...

Apr 19, 2022
CVE-2022-21445 9.8

CVE-2022-21445 is a critical deserialization vulnerability in Oracle ADF Faces that allows unauthenticated remote attackers to execute arbitrary code....

Apr 19, 2022
CVE-2022-21404 8.1

This vulnerability in Oracle Helidon's Reactive WebServer component allows an unauthenticated remote attacker with network access via HTTP to potentia...

Apr 19, 2022
CVE-2022-21410 7.2

This vulnerability in Oracle Database 19c Enterprise Edition Sharding allows attackers with Create Any Procedure privilege and network access via Orac...

Apr 19, 2022
CVE-2022-21420 9.8

This critical vulnerability in Oracle Coherence allows unauthenticated attackers with network access via the T3 protocol to completely compromise the ...

Apr 19, 2022
CVE-2022-21422 7.5

This vulnerability in Oracle Communications Billing and Revenue Management allows authenticated attackers with network access to potentially compromis...

Apr 19, 2022
CVE-2022-24801 8.1

This vulnerability in Twisted's HTTP 1.1 server allows HTTP request smuggling due to non-RFC-compliant parsing of HTTP requests. Attackers can exploit...

Apr 4, 2022
CVE-2022-22963 9.8

This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of Spring Cloud Function. Attackers can cr...

Apr 1, 2022
CVE-2022-1154 7.8

CVE-2022-1154 is a use-after-free vulnerability in Vim's utf_ptr2char function that could allow an attacker to execute arbitrary code or cause a denia...

Mar 30, 2022
CVE-2021-4157 8.0

This vulnerability is an out-of-bounds memory write flaw in the Linux kernel's NFS subsystem, specifically affecting mirroring/replication functionali...

Mar 25, 2022
CVE-2021-4197 7.8

This Linux kernel vulnerability allows a local unprivileged user to write to file handlers in the cgroups subsystem, potentially leading to system cra...

Mar 23, 2022
CVE-2022-1011 7.8

A use-after-free vulnerability in the Linux kernel's FUSE filesystem allows a local attacker to trigger write() operations that can lead to unauthoriz...

Mar 18, 2022
CVE-2022-22719 7.5

CVE-2022-22719 is a memory corruption vulnerability in Apache HTTP Server where a specially crafted request body can cause the server to read from ran...

Mar 14, 2022
CVE-2022-22720 9.8

Apache HTTP Server versions 2.4.52 and earlier contain a vulnerability where the server fails to properly close inbound connections when encountering ...

Mar 14, 2022
CVE-2022-23943 9.8

CVE-2022-23943 is a critical heap memory corruption vulnerability in Apache HTTP Server's mod_sed module that allows attackers to write data beyond al...

Mar 14, 2022
CVE-2020-36518 7.5

CVE-2020-36518 is a denial-of-service vulnerability in Jackson Databind where processing deeply nested JSON objects causes a Java StackOverflowError, ...

Mar 11, 2022
CVE-2021-38296 7.5

This vulnerability in Apache Spark allows attackers to recover full encryption keys from RPC connections using a flawed mutual authentication protocol...

Mar 10, 2022
CVE-2022-0839 9.8

This vulnerability allows attackers to perform XML External Entity (XXE) attacks through Liquibase, potentially leading to sensitive data disclosure, ...

Mar 4, 2022
CVE-2022-22947 10.0

CVE-2022-22947 is a critical remote code execution vulnerability in Spring Cloud Gateway when the Actuator endpoint is enabled and exposed without pro...

Mar 3, 2022
CVE-2022-21716 7.5

CVE-2022-21716 is a memory exhaustion vulnerability in Twisted's SSH client and server implementations. Attackers can send unlimited data during SSH v...

Mar 3, 2022
CVE-2022-23308 7.5

CVE-2022-23308 is a use-after-free vulnerability in libxml2's validation component that allows attackers to potentially execute arbitrary code or caus...

Feb 26, 2022
CVE-2022-21824 8.2

This CVE describes a prototype pollution vulnerability in Node.js's console.table() function when user-controlled input is passed to the 'properties' ...

Feb 24, 2022
CVE-2021-44531 7.4

This vulnerability in Node.js allows attackers to bypass certificate name constraints by using arbitrary Subject Alternative Name (SAN) types, particu...

Feb 24, 2022
CVE-2022-25636 7.8

CVE-2022-25636 is a heap out-of-bounds write vulnerability in the Linux kernel's netfilter component that allows local users to escalate privileges to...

Feb 24, 2022
CVE-2022-24407 8.8

CVE-2022-24407 is a SQL injection vulnerability in Cyrus SASL authentication library. It allows attackers to inject arbitrary SQL commands via unescap...

Feb 24, 2022
CVE-2021-35689 9.8

This high-severity vulnerability in Oracle Talent Acquisition Cloud - Taleo Enterprise Edition allows attackers to execute arbitrary code remotely on ...

Feb 24, 2022
CVE-2021-20322 7.4

This Linux kernel vulnerability allows remote attackers to bypass UDP source port randomization by exploiting flaws in ICMP error processing. Attacker...

Feb 18, 2022
CVE-2022-25314 7.5

CVE-2022-25314 is an integer overflow vulnerability in Expat's copyString function that can lead to heap buffer overflow. This allows attackers to pot...

Feb 18, 2022
CVE-2022-25315 9.8

CVE-2022-25315 is an integer overflow vulnerability in Expat's storeRawNames function that can lead to heap buffer overflow. This allows attackers to ...

Feb 18, 2022
CVE-2022-23632 7.4

Traefik versions before 2.6.1 incorrectly handle TLS configuration when requests use fully qualified domain names (FQDNs) in the Host header, potentia...

Feb 17, 2022

Why Monitor Oracle Security Vulnerabilities?

Real-time CVE tracking: Our automated system monitors 682+ known vulnerabilities affecting Oracle products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.

Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Oracle packages in under 60 seconds. No agents required - completely agentless scanning that works across Oracle deployments.

Free vulnerability database: Access detailed information about every Oracle CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.

🚀 Get Started in 60 Seconds

  • Register free account & add your servers
  • Run one-time scan or schedule automatic monitoring (every 1-24 hours)
  • Receive instant alerts when new Oracle CVEs affect your systems
  • Access dashboard with severity breakdown & fix instructions
Start Monitoring Oracle CVEs Free