Oracle threat watch

Oracle product CVE coverage from NVD — MySQL, Java, WebLogic, and enterprise application stack vulnerabilities.

Vendor watch hub

What this page covers

The Oraclewatch hub is a vendor-specific view inside ITECS MSP Threat Radar. We pull the latest security advisories, incidents, and known-exploited CVEs directly from the official feeds below, score each one for MSP relevance, and surface what's most likely to need attention this week.

  • Confirm whether recent Oracle activity overlaps with your environment.
  • Prioritize advisories by MSP-relevance score, severity, and status.
  • Turn the signal into an assessment, briefing, or managed-service engagement with ITECS.

At a glance

Tracked

46

Active

41

Featured

42

Unique CVEs

20

Most recent entry

Nov 20, 2025, 6:00 PM

Feed refreshes daily · 5:15 a.m. Central

Sources·CISA KEV and NVD (product vendor coverage)

"Most recent entry" is the newest item the upstream feed has published — not our sync time.

Watch items

Recent Oracle watch items

Showing the 20 most recent items, newest first. Each row links to the official advisory.

20 rows · sorted newest first

Operations view

Oracle Fusion Middleware Missing Authentication for Critical Function Vulnerability

critical
activeCISA KEVCVE-2025-61757

Oracle Fusion Middleware contains a missing authentication for critical function vulnerability, allowing unauthenticated remote attackers to take over Identity Manager.

Nov 20, 2025, 6:00 PMOfficial source

Oracle E-Business Suite Server-Side Request Forgery (SSRF) Vulnerability

critical
activeCISA KEVCVE-2025-61884

Oracle E-Business Suite contains a server-side request forgery (SSRF) vulnerability in the Runtime component of Oracle Configurator. This vulnerability is remotely exploitable without authentication. Known ransomware use: Known.

Oct 19, 2025, 7:00 PMOfficial source

Oracle E-Business Suite Unspecified Vulnerability

critical
activeCISA KEVCVE-2025-61882

Oracle E-Business Suite contains an unspecified vulnerability in the BI Publisher Integration component. The vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Concurrent Processing. Successful attacks can result in takeover of Oracle Concurrent Processing. Known ransomware use: Known.

Oct 5, 2025, 7:00 PMOfficial source

Oracle Agile Product Lifecycle Management (PLM) Deserialization Vulnerability

critical
activeCISA KEVCVE-2024-20953

Oracle Agile Product Lifecycle Management (PLM) contains a deserialization vulnerability that allows a low-privileged attacker with network access via HTTP to compromise the system.

Feb 23, 2025, 6:00 PMOfficial source

Oracle WebLogic Server Unspecified Vulnerability

critical
activeCISA KEVCVE-2020-2883

Oracle WebLogic Server, a product within the Fusion Middleware suite, contains an unspecified vulnerability exploitable by an unauthenticated attacker with network access via IIOP or T3.

Jan 6, 2025, 6:00 PMOfficial source

Oracle Agile Product Lifecycle Management (PLM) Incorrect Authorization Vulnerability

critical
activeCISA KEVCVE-2024-21287

Oracle Agile Product Lifecycle Management (PLM) contains an incorrect authorization vulnerability in the Process Extension component of the Software Development Kit. Successful exploitation of this vulnerability may result in unauthenticated file disclosure.

Nov 20, 2024, 6:00 PMOfficial source

Oracle WebLogic Server Remote Code Execution Vulnerability

critical
activeCISA KEVCVE-2020-14644

Oracle WebLogic Server, a product within the Fusion Middleware suite, contains a deserialization vulnerability. Unauthenticated attackers with network access via T3 or IIOP can exploit this vulnerability to achieve remote code execution.

Sep 17, 2024, 7:00 PMOfficial source

Oracle ADF Faces Deserialization of Untrusted Data Vulnerability

critical
activeCISA KEVCVE-2022-21445

Oracle ADF Faces library, included with Oracle JDeveloper Distribution, contains a deserialization of untrusted data vulnerability leading to unauthenticated remote code execution.

Sep 17, 2024, 7:00 PMOfficial source

Oracle Fusion Middleware Unspecified Vulnerability

critical
activeCISA KEVCVE-2020-2551

Oracle Fusion Middleware contains an unspecified vulnerability in the WLS Core Components that allows an unauthenticated attacker with network access via IIOP to compromise the WebLogic Server.

Nov 15, 2023, 6:00 PMOfficial source

Oracle WebLogic Server Unspecified Vulnerability

critical
activeCISA KEVCVE-2023-21839

Oracle WebLogic Server contains an unspecified vulnerability that allows an unauthenticated attacker with network access via T3, IIOP, to compromise Oracle WebLogic Server.

Apr 30, 2023, 7:00 PMOfficial source

Oracle E-Business Suite Unspecified Vulnerability

critical
activeCISA KEVCVE-2022-21587

Oracle E-Business Suite contains an unspecified vulnerability that allows an unauthenticated attacker with network access via HTTP to compromise Oracle Web Applications Desktop Integrator. Known ransomware use: Known.

Feb 1, 2023, 6:00 PMOfficial source

Oracle Fusion Middleware Unspecified Vulnerability

critical
activeCISA KEVCVE-2021-35587

Oracle Fusion Middleware Access Manager allows an unauthenticated attacker with network access via HTTP to takeover the Access Manager product.

Nov 27, 2022, 6:00 PMOfficial source

restaurant menu - food ordering system - table reservation vulnerability (CVE-2022-3776)

HIGH
watchNVDCVE-2022-3776

The Restaurant Menu – Food Ordering System – Table Reservation plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.3.1. This is due to missing or incorrect nonce validation on several functions called via AJAX actions such as forms_action, set_option, & chosen_options to name a few . This makes it possible for unauthenticated attackers to perform a variety of administrative actions like modifying forms, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

Nov 3, 2022, 12:15 PMOfficial source

Oracle WebLogic Server Unspecified Vulnerability

critical
activeCISA KEVCVE-2018-2628

Oracle WebLogic Server contains an unspecified vulnerability which can allow an unauthenticated attacker with T3 network access to compromise the server.

Sep 7, 2022, 7:00 PMOfficial source

Oracle JRE Sandbox Bypass Vulnerability

critical
activeCISA KEVCVE-2013-0431

Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle allows remote attackers to bypass the Java security sandbox. Known ransomware use: Known.

May 24, 2022, 7:00 PMOfficial source

Oracle JRE Unspecified Vulnerability

critical
activeCISA KEVCVE-2013-2423

Unspecified vulnerability in hotspot for Java Runtime Environment (JRE) allows remote attackers to affect integrity.

May 24, 2022, 7:00 PMOfficial source

Oracle Solaris Privilege Escalation Vulnerability

critical
activeCISA KEVCVE-2019-3010

Oracle Solaris component: XScreenSaver contains an unspecified vulnerability that allows for privilege escalation.

May 24, 2022, 7:00 PMOfficial source

Oracle Fusion Middleware Unspecified Vulnerability

critical
activeCISA KEVCVE-2012-0518

Unspecified vulnerability in the Oracle Application Server Single Sign-On component in Oracle Fusion Middleware allows remote attackers to affect integrity via Unknown vectors

Mar 27, 2022, 7:00 PMOfficial source

Oracle BI Publisher Unauthorized Access Vulnerability

critical
activeCISA KEVCVE-2019-2616

Oracle BI Publisher, formerly XML Publisher, contains an unspecified vulnerability that allows for various unauthorized actions. Open-source reporting attributes this vulnerability to allowing for authentication bypass.

Mar 24, 2022, 7:00 PMOfficial source

Oracle Java SE Runtime Environment (JRE) Arbitrary Code Execution Vulnerability

critical
activeCISA KEVCVE-2012-0507

An incorrect type vulnerability exists in the Concurrency component of Oracle's Java Runtime Environment allows an attacker to remotely execute arbitrary code. Known ransomware use: Known.

Mar 2, 2022, 6:00 PMOfficial source

Related vendors

Other productivity vendors in the radar

Vendor watch FAQ

Common questions

What is the Oracle threat watch page?

It is the Oracle-specific view inside ITECS Threat Radar, built to track recent advisories, incidents, and watch items that may affect Dallas-area business operations.

How should teams use the Oracle watch page?

Use it to confirm whether current Oracle issues overlap with your environment, prioritize remediation, and decide whether you need an assessment, managed security follow-through, or vendor-specific hardening work.

Can ITECS help respond to Oracle security issues?

Yes. ITECS can help map Oracle advisories against your systems, validate affected services, prioritize remediation, and connect the issue to broader managed cybersecurity or managed IT workflows.