The Oraclewatch hub is a vendor-specific view inside ITECS MSP Threat Radar. We pull the latest security advisories, incidents, and known-exploited CVEs directly from the official feeds below, score each one for MSP relevance, and surface what's most likely to need attention this week.
Confirm whether recent Oracle activity overlaps with your environment.
Prioritize advisories by MSP-relevance score, severity, and status.
Turn the signal into an assessment, briefing, or managed-service engagement with ITECS.
At a glance
Tracked
46
Active
41
Featured
42
Unique CVEs
20
Most recent entry
Nov 20, 2025, 6:00 PM
Feed refreshes daily · 5:15 a.m. Central
Sources·CISA KEV and NVD (product vendor coverage)
"Most recent entry" is the newest item the upstream feed has published — not our sync time.
Watch items
Recent Oracle watch items
Showing the 20 most recent items, newest first. Each row links to the official advisory.
20 rows · sorted newest first
Operations view
Oracle Fusion Middleware Missing Authentication for Critical Function Vulnerability
critical
activeCISA KEVCVE-2025-61757
Oracle Fusion Middleware contains a missing authentication for critical function vulnerability, allowing unauthenticated remote attackers to take over Identity Manager.
Oracle E-Business Suite Server-Side Request Forgery (SSRF) Vulnerability
critical
activeCISA KEVCVE-2025-61884
Oracle E-Business Suite contains a server-side request forgery (SSRF) vulnerability in the Runtime component of Oracle Configurator. This vulnerability is remotely exploitable without authentication. Known ransomware use: Known.
Oracle E-Business Suite contains an unspecified vulnerability in the BI Publisher Integration component. The vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Concurrent Processing. Successful attacks can result in takeover of Oracle Concurrent Processing. Known ransomware use: Known.
Oracle Agile Product Lifecycle Management (PLM) contains a deserialization vulnerability that allows a low-privileged attacker with network access via HTTP to compromise the system.
Oracle WebLogic Server, a product within the Fusion Middleware suite, contains an unspecified vulnerability exploitable by an unauthenticated attacker with network access via IIOP or T3.
Oracle Agile Product Lifecycle Management (PLM) contains an incorrect authorization vulnerability in the Process Extension component of the Software Development Kit. Successful exploitation of this vulnerability may result in unauthenticated file disclosure.
Oracle WebLogic Server Remote Code Execution Vulnerability
critical
activeCISA KEVCVE-2020-14644
Oracle WebLogic Server, a product within the Fusion Middleware suite, contains a deserialization vulnerability. Unauthenticated attackers with network access via T3 or IIOP can exploit this vulnerability to achieve remote code execution.
Oracle ADF Faces Deserialization of Untrusted Data Vulnerability
critical
activeCISA KEVCVE-2022-21445
Oracle ADF Faces library, included with Oracle JDeveloper Distribution, contains a deserialization of untrusted data vulnerability leading to unauthenticated remote code execution.
Oracle Fusion Middleware contains an unspecified vulnerability in the WLS Core Components that allows an unauthenticated attacker with network access via IIOP to compromise the WebLogic Server.
Oracle WebLogic Server contains an unspecified vulnerability that allows an unauthenticated attacker with network access via T3, IIOP, to compromise Oracle WebLogic Server.
Oracle E-Business Suite contains an unspecified vulnerability that allows an unauthenticated attacker with network access via HTTP to compromise Oracle Web Applications Desktop Integrator. Known ransomware use: Known.
restaurant menu - food ordering system - table reservation vulnerability (CVE-2022-3776)
HIGH
watchNVDCVE-2022-3776
The Restaurant Menu – Food Ordering System – Table Reservation plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.3.1. This is due to missing or incorrect nonce validation on several functions called via AJAX actions such as forms_action, set_option, & chosen_options to name a few . This makes it possible for unauthenticated attackers to perform a variety of administrative actions like modifying forms, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Oracle WebLogic Server contains an unspecified vulnerability which can allow an unauthenticated attacker with T3 network access to compromise the server.
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle allows remote attackers to bypass the Java security sandbox. Known ransomware use: Known.
Unspecified vulnerability in the Oracle Application Server Single Sign-On component in Oracle Fusion Middleware allows remote attackers to affect integrity via Unknown vectors
Oracle BI Publisher Unauthorized Access Vulnerability
critical
activeCISA KEVCVE-2019-2616
Oracle BI Publisher, formerly XML Publisher, contains an unspecified vulnerability that allows for various unauthorized actions. Open-source reporting attributes this vulnerability to allowing for authentication bypass.
Oracle Java SE Runtime Environment (JRE) Arbitrary Code Execution Vulnerability
critical
activeCISA KEVCVE-2012-0507
An incorrect type vulnerability exists in the Concurrency component of Oracle's Java Runtime Environment allows an attacker to remotely execute arbitrary code. Known ransomware use: Known.
Oracle Fusion Middleware Missing Authentication for Critical Function Vulnerability
Oracle Fusion Middleware contains a missing authentication for critical function vulnerability, allowing unauthenticated remote attackers to take over Identity Manager.
Fusion Middleware
criticalCVE-2025-61757
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 87.8% EPSS.
Oracle E-Business Suite Server-Side Request Forgery (SSRF) Vulnerability
Oracle E-Business Suite contains a server-side request forgery (SSRF) vulnerability in the Runtime component of Oracle Configurator. This vulnerability is remotely exploitable without authentication. Known ransomware use: Known.
E-Business Suite
criticalCVE-2025-61884
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 59.3% EPSS.
Oracle E-Business Suite contains an unspecified vulnerability in the BI Publisher Integration component. The vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Concurrent Processing. Successful attacks can result in takeover of Oracle Concurrent Processing. Known ransomware use: Known.
E-Business Suite
criticalCVE-2025-61882
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 89.4% EPSS.
Oracle Agile Product Lifecycle Management (PLM) contains a deserialization vulnerability that allows a low-privileged attacker with network access via HTTP to compromise the system.
Agile Product Lifecycle Management (PLM)
criticalCVE-2024-20953
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 67.4% EPSS.
Oracle WebLogic Server, a product within the Fusion Middleware suite, contains an unspecified vulnerability exploitable by an unauthenticated attacker with network access via IIOP or T3.
WebLogic Server
criticalCVE-2020-2883
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 94.4% EPSS.
Oracle Agile Product Lifecycle Management (PLM) contains an incorrect authorization vulnerability in the Process Extension component of the Software Development Kit. Successful exploitation of this vulnerability may result in unauthenticated file disclosure.
Agile Product Lifecycle Management (PLM)
criticalCVE-2024-21287
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 69.8% EPSS.
Oracle WebLogic Server Remote Code Execution Vulnerability
Oracle WebLogic Server, a product within the Fusion Middleware suite, contains a deserialization vulnerability. Unauthenticated attackers with network access via T3 or IIOP can exploit this vulnerability to achieve remote code execution.
WebLogic Server
criticalCVE-2020-14644
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 93.6% EPSS.
Oracle ADF Faces Deserialization of Untrusted Data Vulnerability
Oracle ADF Faces library, included with Oracle JDeveloper Distribution, contains a deserialization of untrusted data vulnerability leading to unauthenticated remote code execution.
ADF Faces
criticalCVE-2022-21445
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 92.0% EPSS.
Oracle Fusion Middleware contains an unspecified vulnerability in the WLS Core Components that allows an unauthenticated attacker with network access via IIOP to compromise the WebLogic Server.
Fusion Middleware
criticalCVE-2020-2551
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 94.4% EPSS.
Oracle WebLogic Server contains an unspecified vulnerability that allows an unauthenticated attacker with network access via T3, IIOP, to compromise Oracle WebLogic Server.
WebLogic Server
criticalCVE-2023-21839
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 94.1% EPSS.
Oracle E-Business Suite contains an unspecified vulnerability that allows an unauthenticated attacker with network access via HTTP to compromise Oracle Web Applications Desktop Integrator. Known ransomware use: Known.
E-Business Suite
criticalCVE-2022-21587
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 94.4% EPSS.
restaurant menu - food ordering system - table reservation vulnerability (CVE-2022-3776)
The Restaurant Menu – Food Ordering System – Table Reservation plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.3.1. This is due to missing or incorrect nonce validation on several functions called via AJAX actions such as forms_action, set_option, & chosen_options to name a few . This makes it possible for unauthenticated attackers to perform a variety of administrative actions like modifying forms, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
restaurant menu - food ordering system - table reservation
HIGHCVE-2022-3776
Watch
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 0.7% EPSS.
Oracle WebLogic Server contains an unspecified vulnerability which can allow an unauthenticated attacker with T3 network access to compromise the server.
WebLogic Server
criticalCVE-2018-2628
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 94.4% EPSS.
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle allows remote attackers to bypass the Java security sandbox. Known ransomware use: Known.
Java Runtime Environment (JRE)
criticalCVE-2013-0431
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 91.6% EPSS.
Unspecified vulnerability in the Oracle Application Server Single Sign-On component in Oracle Fusion Middleware allows remote attackers to affect integrity via Unknown vectors
Fusion Middleware
criticalCVE-2012-0518
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 20.9% EPSS.
Oracle BI Publisher Unauthorized Access Vulnerability
Oracle BI Publisher, formerly XML Publisher, contains an unspecified vulnerability that allows for various unauthorized actions. Open-source reporting attributes this vulnerability to allowing for authentication bypass.
BI Publisher (Formerly XML Publisher)
criticalCVE-2019-2616
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 94.0% EPSS.
Oracle Java SE Runtime Environment (JRE) Arbitrary Code Execution Vulnerability
An incorrect type vulnerability exists in the Concurrency component of Oracle's Java Runtime Environment allows an attacker to remotely execute arbitrary code. Known ransomware use: Known.
Java SE
criticalCVE-2012-0507
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 93.6% EPSS.
It is the Oracle-specific view inside ITECS Threat Radar, built to track recent advisories, incidents, and watch items that may affect Dallas-area business operations.
How should teams use the Oracle watch page?
Use it to confirm whether current Oracle issues overlap with your environment, prioritize remediation, and decide whether you need an assessment, managed security follow-through, or vendor-specific hardening work.
Can ITECS help respond to Oracle security issues?
Yes. ITECS can help map Oracle advisories against your systems, validate affected services, prioritize remediation, and connect the issue to broader managed cybersecurity or managed IT workflows.