A Critical Patch Update is a collection of patches for multiple security vulnerabilities. These patches address vulnerabilities in Oracle code and in third party components included in Oracle products. These patches are usually cumulative, but each advisory describes only the security patches added since the previous Critical Patch Update Advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security patches. Refer to “Critical Patch Updates, Security Alerts and Bulletins” for information about Oracle Security advisories.
Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released security patches. In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update security patches without delay.
This Critical Patch Update contains 481 new security patches across the product families listed below. Please note that an MOS note summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located at April 2026 Critical Patch Update: Executive Summary and Analysis.
Please note that since the release of the January 2026 Critical Patch Update, Oracle has released a Security Alert for Oracle Identity Manager and Oracle Web Services Manager, CVE-2026-21992 (March 20, 2026). Customers are strongly advised to apply the April 2026 Critical Patch Update for Fusion Middleware products, which includes patches for this Alert as well as additional patches.
Security vulnerabilities addressed by this Critical Patch Update affect the products listed below.
Please click on the links in the Patch Availability Document column below to access the documentation for patch availability information and installation instructions.
Risk matrices list only security vulnerabilities that are newly addressed by the patches associated with this advisory. Risk matrices for previous security patches can be found in previous Critical Patch Update advisories and Alerts. An English text version of the risk matrices provided in this document is here.
Several vulnerabilities addressed in this Critical Patch Update affect multiple products. Each vulnerability is identified by a CVE ID. A vulnerability that affects multiple products will appear with the same CVE ID in all risk matrices.
Security vulnerabilities are scored using CVSS version 3.1 (see Oracle CVSS Scoring for an explanation of how Oracle applies CVSS version 3.1).
Oracle conducts an analysis of each security vulnerability addressed by a Critical Patch Update. Oracle does not disclose detailed information about this security analysis to customers, but the resulting Risk Matrix and associated documentation provide information about conditions required to exploit the vulnerability and the potential impact of a successful exploit. Oracle provides this information so that customers may conduct their own risk analysis based on the particulars of their product usage. For more information, see Oracle vulnerability disclosure policies.
Third party component vulnerabilities that are deemed not exploitable in the context of their inclusion in an Oracle product are listed, with VEX justifications, below the respective Oracle product's risk matrix.
The protocol in the risk matrix implies that all of its secure variants are affected as well. For example, if HTTP is listed as an affected protocol, it implies that HTTPS is also affected. The secure variant of a protocol is listed in the risk matrix only if it is the only variant affected.
Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply Critical Patch Update security patches as soon as possible. Until you apply the Critical Patch Update patches, it may be possible to reduce the risk of successful attack by blocking network protocols required by an attack. For attacks that require certain privileges or access to certain packages, removing the privileges or the ability to access the packages from users that do not need the privileges may help reduce the risk of successful attack. Both approaches may break application functionality, so Oracle strongly recommends that customers test changes on non-production systems. Neither approach should be considered a long-term solution as neither corrects the underlying problem.
Oracle strongly recommends that customers apply security patches as soon as possible. For customers that have skipped one or more Critical Patch Updates and are concerned about products that do not have security patches announced in this Critical Patch Update, please review previous Critical Patch Update advisories to determine appropriate actions.
Patches released through the Critical Patch Update program are provided only for product versions that are covered under the Premier Support or Extended Support phases of the Lifetime Support Policy. Oracle recommends that customers plan product upgrades to ensure that patches released through the Critical Patch Update program are available for the versions they are currently running.
Product releases that are not under Premier Support or Extended Support are not tested for the presence of vulnerabilities addressed by this Critical Patch Update. However, it is likely that earlier versions of affected releases are also affected by these vulnerabilities. As a result, Oracle recommends that customers upgrade to supported versions.
Database, Fusion Middleware, and Oracle Enterprise Manager products are patched in accordance with the Software Error Correction Support Policy that further supplements the Lifetime Support Policy as explained in My Oracle Support Note KB65129. Please review the Technical Support Policies for further guidelines regarding support policies and phases of support.
The following people or organizations reported security vulnerabilities addressed by this Critical Patch Update to Oracle:
Oracle acknowledges people who have contributed to our Security-In-Depth program (see FAQ). People are acknowledged for Security-In-Depth contributions if they provide information, observations or suggestions pertaining to security vulnerability issues that result in significant modification of Oracle code or documentation in future releases, but are not of such a critical nature that they are distributed in Critical Patch Updates.
In this Critical Patch Update, Oracle recognizes the following for contributions to Oracle's Security-In-Depth program:
Oracle acknowledges people who have contributed to our On-Line Presence Security program (see FAQ). People are acknowledged for contributions relating to Oracle's on-line presence if they provide information, observations or suggestions pertaining to security-related issues that result in significant modification to Oracle's on-line external-facing systems.
For this quarter, Oracle recognizes the following for contributions to Oracle's On-Line Presence Security program:
Critical Patch Updates are released on the third Tuesday of January, April, July, and October. The next four dates are:
| Date | Note |
|---|---|
| 2026-April-21 | Rev 1. Initial Release. |
This Critical Patch Update contains 26 new security patches for Oracle Database Products divided as follows:
This Critical Patch Update contains 8 new security patches, plus additional third party patches noted below, for Oracle Database Products. 4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. 1 of these patches is applicable to client-only installations, i.e., installations that do not have the Oracle Database Server installed. The English text form of this Risk Matrix can be found here.
| CVE ID | Component | Package and/or Privilege Required | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
| CVE-2026-33870 | Clusterware (Micronaut) | None | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 19.3-19.30, 23.4.0-23.26.1 | |
| CVE-2026-35229 | Java VM | Create Session | Oracle Net | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 19.3-19.30, 21.3-21.21 | |
| CVE-2026-31790 | RDBMS (OpenSSL) | None | Multiple | No | 7.2 | Network | Low | High | None | Un- changed |
High | High | High | 19.3-19.30, 23.4.0-23.26.1 | |
| CVE-2026-26007 | RDBMS (Python) | Create Session | Multiple | Yes | 6.5 | Network | Low | None | Required | Un- changed |
High | None | None | 21.3-21.21, 23.4.0-23.26.1 | |
| CVE-2026-21999 | XML Database | HTTP Listener | HTTPS | Yes | 5.3 | Network | High | None | Required | Un- changed |
High | None | None | 23.4.0-23.26.1 | |
| CVE-2025-31948 | Data Mining (Intel oneAPI Toolkit OpenMP) | Authenticated User | None | No | 3.3 | Local | Low | Low | None | Un- changed |
None | None | Low | 19.3-19.30, 21.3-21.21, 23.4.0-23.26.1 | |
| CVE-2025-48924 | RDBMS (Apache Commons Lang) | DBMS Developer | Multiple | No | 3.3 | Local | Low | None | Required | Un- changed |
None | None | Low | 23.4.0-23.26.1 | |
| CVE-2026-34312 | RDBMS | Row Access Method | Multiple | No | 2.4 | Network | Low | High | Required | Un- changed |
Low | None | None | 19.3-19.30 | |
This Critical Patch Update contains 2 new security patches, plus additional third party patches noted below, for Oracle Adapter for Eclipse RDF4J. Both of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
| CVE ID | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
| CVE-2025-48976 | Oracle Adapter for Eclipse RDF4J | Adapter for Eclipse RDF (Apache Commons FileUpload) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 3.12.0 | |
| CVE-2023-46750 | Oracle Adapter for Eclipse RDF4J | Jena adapter (Apache Shiro) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 24.1.0 | |
This Critical Patch Update contains no new security patches for exploitable vulnerabilities but does include third party patches, noted below, for the following non-exploitable third party CVEs for Oracle APEX. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle APEX. The English text form of this Risk Matrix can be found here.
This Critical Patch Update contains 2 new security patches, plus additional third party patches noted below, for Oracle Autonomous Health Framework. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
| CVE ID | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
| CVE-2025-15467 | Oracle Autonomous Health Framework | Trace File Analyzer (OpenSSL) | Multiple | No | 7.2 | Network | Low | High | None | Un- changed |
High | High | High | 25.11-26.1 | |
| CVE-2025-9232 | Oracle Autonomous Health Framework | Command Line Interface and SDK (pynacl) | HTTP | Yes | 5.9 | Network | High | None | None | Un- changed |
None | None | High | 25.11-26.1 | |
This Critical Patch Update contains 3 new security patches, plus additional third party patches noted below, for Oracle Blockchain Platform. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
| CVE ID | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
| CVE-2025-61729 | Oracle Blockchain Platform | BCS Console (Golang Go) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 24.1.3 | |
| CVE-2025-59465 | Oracle Blockchain Platform | BCS Console (Node.js) | HTTP/2 | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 24.1.3 | |
| CVE-2025-5318 | Oracle Blockchain Platform | BCS Console (libssh) | HTTP | No | 5.4 | Network | Low | Low | None | Un- changed |
Low | Low | None | 24.1.3 | |
This Critical Patch Update contains no new security patches for exploitable vulnerabilities but does include third party patches, noted below, for the following non-exploitable third party CVEs for Oracle Essbase. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle Essbase. The English text form of this Risk Matrix can be found here.
This Critical Patch Update contains no new security patches for exploitable vulnerabilities but does include third party patches, noted below, for the following non-exploitable third party CVEs for Oracle Global Lifecycle Management. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle Global Lifecycle Management. The English text form of this Risk Matrix can be found here.
This Critical Patch Update contains 10 new security patches, plus additional third party patches noted below, for Oracle GoldenGate. 7 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
| CVE ID | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
| CVE-2025-66566 | Oracle GoldenGate Stream Analytics | General (lz4-java) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 19.1.0.0.0-19.1.0.0.14 | |
| CVE-2025-67735 | Oracle GoldenGate Big Data and Application Adapters | AWS SDK (Netty) | HTTP | Yes | 6.5 | Network | Low | None | None | Un- changed |
Low | Low | None | 23.4-23.10 | |
| CVE-2025-67735 | Oracle GoldenGate Big Data and Application Adapters | Java Delivery (Netty) | HTTP | Yes | 6.5 | Network | Low | None | None | Un- changed |
Low | Low | None | 21.3-21.20, 23.4-23.10 | |
| CVE-2024-7254 | Oracle GoldenGate Big Data and Application Adapters | Third Party (Google Protobuf-Java) | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed |
None | None | High | 23.4-23.10 | |
| CVE-2025-33042 | Oracle GoldenGate Big Data and Application Adapters | Third Party (Apache Avro) | None | No | 5.9 | Local | Low | None | None | Un- changed |
Low | Low | Low | 19.1.0.0.0-19.1.0.0.21, 21.3-21.21, 23.4-23.10 | |
| CVE-2026-34273 | Oracle GoldenGate | Libraries | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 23.4-23.10 | |
| CVE-2025-8916 | Oracle GoldenGate Big Data and Application Adapters | Java Delivery (Bouncy Castle Java Library) | HTTPS | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | None | Low | 21.3-21.20,23.4-23.10 | |
| CVE-2025-68161 | Oracle GoldenGate | Third Party (Apache Log4j) | TLS | Yes | 4.7 | Network | High | None | Required | Changed | Low | Low | None | 23.4-23.26.1 | |
| CVE-2025-48924 | Oracle GoldenGate Big Data and Application Adapters | Third Party (Apache Commons Lang) | HTTP | No | 4.3 | Network | Low | Low | None | Un- changed |
None | None | Low | 23.4-23.10 | |
| CVE-2025-11143 | Oracle GoldenGate Big Data and Application Adapters | Java Delivery (Eclipse Jetty) | HTTP | Yes | 3.7 | Network | High | None | None | Un- changed |
None | Low | None | 21.3-21.21, 23.4-23.10 | |
This Critical Patch Update contains no new security patches for exploitable vulnerabilities but does include third party patches, noted below, for the following non-exploitable third party CVEs for Oracle Graph Server and Client. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for the Oracle Graph Server and Client. The English text form of this Risk Matrix can be found here.
This Critical Patch Update contains no new security patches for exploitable vulnerabilities but does include third party patches, noted below, for the following non-exploitable third party CVEs for Oracle NoSQL Database. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle NoSQL Database. The English text form of this Risk Matrix can be found here.
This Critical Patch Update contains 2 new security patches, plus additional third party patches noted below, for Oracle REST Data Services. Both of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
| CVE ID | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
| CVE-2025-5115 | Oracle REST Data Services | Third Party (Eclipse Jetty) | HTTP/2 | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 24.2.0, 24.2.1, 24.3.0, 24.3.1, 24.4.0, 25.1.1, 25.2.0, 25.2.1, 25.2.2, 25.2.3, | |
| CVE-2025-66453 | Oracle REST Data Services | REST Services (Rhino) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | None | Low | 24.2.0, 24.2.1, 24.3.0, 24.3.1, 24.4.0, 25.1.1, 25.2.0, 25.2.1, 25.2.2, 25.2.3, 25.3.0, 25.3.1, 25.4.0 | |
This Critical Patch Update contains 1 new security patch for Oracle TimesTen In-Memory Database. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
| CVE ID | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
| CVE-2025-68121 | Oracle TimesTen In-Memory Database | Third-party components (Golang Go) | HTTPS | Yes | 7.4 | Network | High | None | None | Un- changed |
High | High | None | 18.1.4, 22.1.1 | |
This Critical Patch Update contains 3 new security patches for Oracle Commerce. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
| CVE ID | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
| CVE-2025-48734 | Oracle Commerce Guided Search | Experience Manager (Apache Commons BeanUtils) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 11.4.0 | |
| CVE-2024-56406 | Oracle Commerce Guided Search | Endeca Application Controller (Perl) | HTTP | Yes | 8.6 | Network | Low | None | None | Un- changed |
Low | Low | High | 11.4.0 | |
| CVE-2026-24734 | Oracle Commerce Guided Search | Content Acquisition System, Endeca Application Controller, Experience Manager (Apache Tomcat) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 11.4.0 | |
This Critical Patch Update contains 139 new security patches, plus additional third party patches noted below, for Oracle Communications. 93 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
| CVE ID | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
| CVE-2025-6965 | Oracle Communications Cloud Native Core Network Exposure Function | Platform (SQLite) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 24.2.1 | |
| CVE-2025-68615 | Oracle Communications EAGLE | Other (Net-SNMP) | UDP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 47.0 | |
| CVE-2025-68615 | Oracle Communications EAGLE Application Processor | Other (Net-SNMP) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 17.0 | |
| CVE-2025-68615 | Oracle Communications EAGLE LNP Application Processor | Patches (Net-SNMP) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 11.0 | |
| CVE-2025-68615 | Oracle Communications LSMS | Platform (Net-SNMP) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 14.0 | |
| CVE-2025-68615 | Oracle Communications Messaging Server | Security (Net-SNMP) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 8.1.0.0.0 | |
| CVE-2025-68615 | Oracle Communications Operations Monitor | Developer Infrastructure (Net-SNMP) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 5.2, 6.0, 6.1 | |
| CVE-2026-25968 | Oracle Communications Operations Monitor | Mediation Engine (ImageMagick) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 5.2, 6.0, 6.1 | |
| CVE-2025-68615 | Oracle Communications Policy Management | Configuration Management Platform (Net-SNMP) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 15.0.0.1.0 | |
| CVE-2025-48913 | Oracle Communications Unified Assurance | Core (Apache CXF) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 6.1.1-7.0.0 | |
| CVE-2025-12543 | Oracle Communications Cloud Native Core Policy | Alarms, KPI, and Measurements (Undertow) | HTTP | Yes | 9.6 | Network | Low | None | Required | Changed | High | High | High | 25.1.200 | |
| CVE-2025-12543 | Oracle Communications Cloud Native Core Unified Data Repository | Install (Undertow) | HTTP | Yes | 9.6 | Network | Low | None | Required | Changed | High | High | High | 25.1.100, 25.1.200 | |
| CVE-2024-5535 | Oracle Communications Cloud Native Core Network Slice Selection Function | Install (OpenSSL) | TLS | Yes | 9.1 | Network | Low | None | None | Un- changed |
High | None | High | 25.1.100 | |
| CVE-2025-55130 | Oracle Communications Cloud Native Core Policy | Install (Node.js) | HTTP | Yes | 9.1 | Network | Low | None | None | Un- changed |
High | High | None | 25.1.202 | |
| CVE-2025-58050 | Oracle Communications Operations Monitor | Mediation Engine (PCRE2) | HTTP | Yes | 9.1 | Network | Low | None | None | Un- changed |
High | None | High | 5.2, 6.0 | |
| CVE-2025-15467 | Oracle Communications Cloud Native Core Certificate Management | Configuration (OpenSSL) | HTTPS | Yes | 8.8 | Network | Low | None | Required | Un- changed |
High | High | High | 25.1.201 | |
| CVE-2025-15467 | Oracle Communications Cloud Native Core Console | Configuration (OpenSSL) | TLS | Yes | 8.8 | Network | Low | None | Required | Un- changed |
High | High | High | 25.1.201 | |
| CVE-2025-9900 | Oracle Communications Cloud Native Core Network Repository Function | Signaling (LibTIFF) | HTTP | Yes | 8.8 | Network | Low | None | Required | Un- changed |
High | High | High | 25.1.204 | |
| CVE-2025-9900 | Oracle Communications Cloud Native Core Network Slice Selection Function | Install (LibTIFF) | HTTP | Yes | 8.8 | Network | Low | None | Required | Un- changed |
High | High | High | 25.1.100, 25.1.200 | |
| CVE-2026-0861 | Oracle Communications Cloud Native Core Network Function Cloud Native Environment | Configuration (glibc) | None | No | 8.4 | Local | Low | None | None | Un- changed |
High | High | High | 25.1.200, 25.2.200 | |
| CVE-2025-55754 | Oracle Communications Unified Assurance | Core (Apache Pulsar) | HTTP | No | 8.4 | Network | Low | High | Required | Changed | High | High | High | 6.1.1-7.0.0 | |
| CVE-2026-0861 | Oracle Communications Unified Inventory Management | Third Party (glibc) | None | No | 8.4 | Local | Low | None | None | Un- changed |
High | High | High | 7.7.0, 7.8.0, 8.0.0 | |
| CVE-2026-0861 | Oracle Enterprise Operations Monitor | Mediation Engine (glibc) | None | No | 8.4 | Local | Low | None | None | Un- changed |
High | High | High | 6.1.0.0.0 | |
| CVE-2025-58098 | Oracle Communications Cloud Native Core Security Edge Protection Proxy | ATS Framework (Apache HTTP Server) | HTTP | No | 8.3 | Network | Low | Low | None | Un- changed |
High | High | Low | 25.1.200, 25.2.100 | |
| CVE-2025-58098 | Oracle Communications Cloud Native Core Service Communication Proxy | ATS Framework (Apache HTTP Server) | HTTP | No | 8.3 | Network | Low | Low | None | Un- changed |
High | High | Low | 25.1.202, 25.2.100 | |
| CVE-2025-58098 | Oracle Communications Cloud Native Core Unified Data Repository | ATS Framework (Apache HTTP Server) | HTTP | No | 8.3 | Network | Low | Low | None | Un- changed |
High | High | Low | 25.1.200 | |
| CVE-2025-32990 | Oracle Communications Cloud Native Core Security Edge Protection Proxy | Configuration (GnuTLS) | TLS | Yes | 8.2 | Network | Low | None | None | Un- changed |
None | Low | High | 25.1.200 | |
| CVE-2025-32990 | Oracle Communications Cloud Native Core Service Communication Proxy | Signaling (GnuTLS) | TLS | Yes | 8.2 | Network | Low | None | None | Un- changed |
None | Low | High | 25.1.202, 25.2.100 | |
| CVE-2026-22022 | Oracle Communications Unified Assurance | Core (Apache Solr) | HTTP | Yes | 8.2 | Network | Low | None | None | Un- changed |
High | Low | None | 6.1.1-7.0.0 | |
| CVE-2025-5318 | Oracle Communications Cloud Native Core Network Repository Function | Signaling (libssh) | SFTP | No | 8.1 | Network | Low | Low | None | Un- changed |
High | None | High | 25.1.204 | |
| CVE-2025-5318 | Oracle Communications Cloud Native Core Security Edge Protection Proxy | ATS Framework (libssh) | SFTP | No | 8.1 | Network | Low | Low | None | Un- changed |
High | None | High | 25.1.200 | |
| CVE-2025-5318 | Oracle Communications Cloud Native Core Service Communication Proxy | Install (libssh) | SFTP | No | 8.1 | Network | Low | Low | None | Un- changed |
High | None | High | 25.1.202, 25.2.100 | |
| CVE-2025-5318 | Oracle Communications EAGLE Application Processor | Other (libssh) | SFTP | No | 8.1 | Network | Low | Low | None | Un- changed |
High | None | High | 17.0-17.1 | |
| CVE-2025-5318 | Oracle Communications EAGLE LNP Application Processor | Patches (libssh) | SFTP | No | 8.1 | Network | Low | Low | None | Un- changed |
High | None | High | 11.0 | |
| CVE-2025-5318 | Oracle Communications LSMS | Platform (libssh) | SFTP | No | 8.1 | Network | Low | Low | None | Un- changed |
High | None | High | 14.0 | |
| CVE-2026-25646 | Oracle Communications Policy Management | Configuration Management Platform (libpng) | HTTP | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 15.0.0.0.0 | |
| CVE-2025-5318 | Oracle Communications Session Border Controller | Routing (libssh) | SFTP | No | 8.1 | Network | Low | Low | None | Un- changed |
High | None | High | 9.3.0, 10.0.0, 10.1.0 | |
| CVE-2026-27099 | Oracle Communications Cloud Native Core Binding Support Function | Install (Jenkins) | HTTP | No | 8.0 | Network | Low | Low | Required | Un- changed |
High | High | High | 25.1.200 | |
| CVE-2026-27099 | Oracle Communications Cloud Native Core Network Exposure Function | Install (Jenkins) | HTTP | No | 8.0 | Network | Low | Low | Required | Un- changed |
High | High | High | 24.2.1 | |
| CVE-2026-27099 | Oracle Communications Cloud Native Core Network Repository Function | Install (Jenkins) | HTTP | No | 8.0 | Network | Low | Low | Required | Un- changed |
High | High | High | 25.1.204 | |
| CVE-2026-27099 | Oracle Communications Cloud Native Core Policy | Alarms, KPI, and Measurements (Jenkins) | HTTP | No | 8.0 | Network | Low | Low | Required | Un- changed |
High | High | High | 25.1.200 | |
| CVE-2026-27099 | Oracle Communications Cloud Native Core Security Edge Protection Proxy | Automated Test Suite (Jenkins) | HTTP | No | 8.0 | Network | Low | Low | Required | Un- changed |
High | High | High | 25.1.200 | |
| CVE-2026-27099 | Oracle Communications Cloud Native Core Service Communication Proxy | ATS Framework (Jenkins) | HTTP | No | 8.0 | Network | Low | Low | Required | Un- changed |
High | High | High | 25.1.200, 25.2.100 | |
| CVE-2025-68973 | Oracle Communications Cloud Native Core Certificate Management | Configuration (GnuPG) | None | No | 7.8 | Local | High | None | None | Changed | High | High | None | 25.1.201 | |
| CVE-2025-68973 | Oracle Communications Cloud Native Core Console | Configuration (GnuPG) | None | No | 7.8 | Local | High | None | None | Changed | High | High | None | 25.1.201 | |
| CVE-2025-66566 | Oracle Communications BRM - Elastic Charging Engine | Security (lz4-java) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 15.0.0.0-15.0.1.0, 15.1.0.0-15.2.0.0 | |
| CVE-2026-21945 | Oracle Communications Cloud Native Core Certificate Management | Oracle Java SE | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 25.1.201 | |
| CVE-2026-21945 | Oracle Communications Cloud Native Core Console | Oracle Java SE | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 25.1.201 | |
| CVE-2025-8194 | Oracle Communications Cloud Native Core DBTier | Configuration (Python) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 25.2.100 | |
| CVE-2025-41253 | Oracle Communications Cloud Native Core Network Exposure Function | Install (Spring Cloud Gateway) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 24.2.4 | |
| CVE-2025-41249 | Oracle Communications Cloud Native Core Network Exposure Function | Install (Spring Framework) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 24.2.1 | |
| CVE-2025-48976 | Oracle Communications Cloud Native Core Network Exposure Function | Platform (Apache Commons FileUpload) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 24.2.1 | |
| CVE-2024-8184 | Oracle Communications Cloud Native Core Network Exposure Function | Platform (Eclipse Jetty) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 24.2.1 | |
| CVE-2025-13151 | Oracle Communications Cloud Native Core Network Exposure Function | Platform (Libtasn1) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 24.2.1 | |
| CVE-2023-34453 | Oracle Communications Cloud Native Core Network Exposure Function | Platform (Snappy) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 24.2.1 | |
| CVE-2025-55163 | Oracle Communications Cloud Native Core Network Function Cloud Native Environment | Configuration (Netty) | HTTP/2 | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 25.1.200, 25.2.200 | |
| CVE-2025-41253 | Oracle Communications Cloud Native Core Network Repository Function | Install (Spring Cloud Gateway) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 25.1.204 | |
| CVE-2025-48976 | Oracle Communications Cloud Native Core Network Repository Function | Signaling (Apache Commons FileUpload) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 25.1.204 | |
| CVE-2025-41248 | Oracle Communications Cloud Native Core Network Repository Function | Signaling (Spring Security) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 25.1.204 | |
| CVE-2025-66418 | Oracle Communications Cloud Native Core Network Repository Function | Signaling (urllib3) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 25.1.204 | |
| CVE-2025-55163 | Oracle Communications Cloud Native Core Network Repository Function | Signaling (Netty) | HTTP/2 | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 25.1.204 | |
| CVE-2025-67635 | Oracle Communications Cloud Native Core Network Slice Selection Function | Install (Jenkins) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 25.1.100, 25.1.200 | |
| CVE-2025-13151 | Oracle Communications Cloud Native Core Network Slice Selection Function | Install (Libtasn1) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 25.1.100, 25.1.200 | |
| CVE-2025-41253 | Oracle Communications Cloud Native Core Network Slice Selection Function | Install (Spring Cloud Gateway) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 25.1.100, 25.1.200 | |
| CVE-2026-21452 | Oracle Communications Cloud Native Core Policy | Configuration (MessagePack) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 25.1.200 | |
| CVE-2026-23490 | Oracle Communications Cloud Native Core Policy | Configuration (pyasn1) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 25.1.202 | |
| CVE-2026-21441 | Oracle Communications Cloud Native Core Policy | Configuration (urllib3) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 25.1.200 | |
| CVE-2026-33870 | Oracle Communications Cloud Native Core Policy | Install (Netty) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 25.1.200 | |
| CVE-2021-0341 | Oracle Communications Cloud Native Core Policy | Install (OkHttp) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 25.1.200 | |
| CVE-2025-67635 | Oracle Communications Cloud Native Core Security Edge Protection Proxy | ATS Framework (Jenkins) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 25.1.200, 25.2.100 | |
| CVE-2025-66418 | Oracle Communications Cloud Native Core Security Edge Protection Proxy | ATS Framework (urllib3) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 25.1.200 | |
| CVE-2025-5115 | Oracle Communications Cloud Native Core Security Edge Protection Proxy | Automated Test Suite (Eclipse Jetty) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 25.1.201, 25.2.100 | |
| CVE-2025-41249 | Oracle Communications Cloud Native Core Security Edge Protection Proxy | Signaling (Spring Framework) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 25.1.200 | |
| CVE-2025-55163 | Oracle Communications Cloud Native Core Security Edge Protection Proxy | Signaling (Netty) | HTTP/2 | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 25.1.201 | |
| CVE-2025-5115 | Oracle Communications Cloud Native Core Service Communication Proxy | Install (Eclipse Jetty) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 25.1.200 | |
| CVE-2025-67635 | Oracle Communications Cloud Native Core Service Communication Proxy | Signaling (Jenkins) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 25.1.202, 25.2.100 | |
| CVE-2025-58057 | Oracle Communications Cloud Native Core Service Communication Proxy | Signaling (Netty) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 25.1.100, 25.2.100 | |
| CVE-2025-66418 | Oracle Communications Cloud Native Core Service Communication Proxy | Signaling (urllib3) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 25.1.202, 25.2.100 | |
| CVE-2025-13151 | Oracle Communications Cloud Native Core Unified Data Repository | ATS Framework (Libtasn1) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 25.1.200 | |
| CVE-2025-66418 | Oracle Communications Cloud Native Core Unified Data Repository | ATS Framework (urllib3) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 25.1.200 | |
| CVE-2026-21441 | Oracle Communications Cloud Native Core Unified Data Repository | Install (urllib3) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 25.1.100, 25.1.200 | |
| CVE-2025-5115 | Oracle Communications EAGLE Element Management System | Security (Eclipse Jetty) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 47.0.0.1.0 | |
| CVE-2026-24734 | Oracle Communications Element Manager | Third Party (Apache Tomcat) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 9.0.0-9.0.4 | |
| CVE-2025-26333 | Oracle Communications Network Integrity | Other (BSAFE Crypto-J) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 7.3.6, 7.4.0, 7.5.0, 8.0.0 | |
| CVE-2025-69223 | Oracle Communications Operations Monitor | Mediation Engine (AIOHTTP) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 5.2, 6.0, 6.1 | |
| CVE-2026-24734 | Oracle Communications Policy Management | Configuration Management Platform (Apache Tomcat) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 15.0.0.0.0 | |
| CVE-2026-21441 | Oracle Communications Policy Management | Configuration Management Platform (urllib3) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 15.0.0.0.0 | |
| CVE-2025-58057 | Oracle Communications Service Catalog and Design | Patch Request (Netty) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.0.0.6.0, 8.1.0.5.0 | |
| CVE-2025-66566 | Oracle Communications Service Catalog and Design | Patch Request (lz4-java) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 8.0.0.6.0, 8.1.0.5.0, 8.2.0.2.0 | |
| CVE-2026-24734 | Oracle Communications Session Report Manager | Third Party (Apache Tomcat) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 9.0.0-9.0.4 | |
| CVE-2025-26333 | Oracle Communications Unified Inventory Management | Security Component (BSAFE Crypto-J) | HTTPS | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 7.5.0-7.5.1, 7.6.0-7.8.0, 8.0.0 | |
| CVE-2025-12383 | Oracle Communications Cloud Native Core Policy | Configuration (Eclipse Jersey) | HTTP | Yes | 7.4 | Network | High | None | None | Un- changed |
High | High | None | 25.1.200 | |
| CVE-2025-33042 | Oracle Communications Unified Assurance | Core (Apache Avro) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 6.1.1 | |
| CVE-2026-3288 | Oracle Communications Unified Assurance | Core (Ingress NGINX Controller) | HTTP | No | 6.8 | Network | Low | High | Required | Un- changed |
High | High | High | 7.0.0 | |
| CVE-2025-5372 | Oracle Communications Unified Assurance | Core (libssh) | SSH | No | 6.8 | Network | Low | High | Required | Un- changed |
High | High | High | 6.1.1-7.0.0 | |
| CVE-2025-68615 | Oracle Communications Unified Assurance | Core (Net-SNMP) | UDP | No | 6.8 | Network | Low | High | Required | Un- changed |
High | High | High | 7.0.0 | |
| CVE-2026-26007 | Oracle Communications Cloud Native Core Binding Support Function | Install (Cryptography) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed |
High | None | None | 25.1.200 | |
| CVE-2026-26007 | Oracle Communications Cloud Native Core Network Repository Function | Signaling (Cryptography) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed |
High | None | None | 25.1.204 | |
| CVE-2026-26007 | Oracle Communications Cloud Native Core Policy | Alarms, KPI, and Measurements (Cryptography) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed |
High | None | None | 25.1.200 | |
| CVE-2026-26007 | Oracle Communications Cloud Native Core Security Edge Protection Proxy | ATS Framework (Cryptography) | Multiple | Yes | 6.5 | Network | Low | None | Required | Un- changed |
High | None | None | 25.1.200 | |
| CVE-2026-26007 | Oracle Communications Cloud Native Core Service Communication Proxy | ATS Framework (Cryptography) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed |
High | None | None | 25.1.200, 25.2.100 | |
| CVE-2026-26007 | Oracle Communications Operations Monitor | Mediation Engine (Cryptography) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed |
High | None | None | 5.2, 6.0, 6.1 | |
| CVE-2026-25210 | Oracle Communications Unified Assurance | Core (LibExpat) | None | No | 6.5 | Local | Low | High | Required | Un- changed |
High | High | High | 6.1.1-7.0.0 | |
| CVE-2025-52967 | Oracle Communications Unified Assurance | Core (mlflow) | HTTP | No | 6.4 | Network | High | High | Required | Un- changed |
High | High | High | 6.1.1-7.0.0 | |
| CVE-2025-14017 | Oracle Communications Cloud Native Core Unified Data Repository | ATS Framework (curl) | None | No | 6.3 | Local | High | None | Required | Un- changed |
High | High | None | 25.1.200 | |
| CVE-2025-14104 | Oracle Communications Cloud Native Core Certificate Management | Configuration (util-linux) | None | No | 6.1 | Local | Low | Low | None | Un- changed |
Low | None | High | 25.1.201 | |
| CVE-2025-14104 | Oracle Communications Cloud Native Core Console | Configuration (util-linux) | None | No | 6.1 | Local | Low | Low | None | Un- changed |
Low | None | High | 25.1.201 | |
| CVE-2025-26791 | Oracle Communications Cloud Native Core Network Function Cloud Native Environment | Configuration (DOMPurify) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 25.1.200, 25.2.200 | |
| CVE-2026-1642 | Oracle Communications Operations Monitor | Mediation Engine (nginx) | HTTP | Yes | 5.9 | Network | High | None | None | Un- changed |
None | High | None | 5.2, 6.0, 6.1 | |
| CVE-2024-45339 | Oracle Communications Unified Assurance | Core (Golang Go) | None | No | 5.8 | Local | Low | High | Required | Un- changed |
High | High | None | 7.0.0 | |
| CVE-2025-48795 | Oracle Communications Cloud Native Core Unified Data Repository | Security (Apache CXF) | HTTP | Yes | 5.6 | Network | High | None | None | Un- changed |
Low | Low | Low | 25.1.200 | |
| CVE-2025-5318 | Oracle Enterprise Communications Broker | Third Party (libssh) | SSH | No | 5.4 | Network | Low | Low | None | Un- changed |
Low | Low | None | 4.2.0, 5.0.0 | |
| CVE-2025-61795 | Oracle Communications EAGLE Element Management System | Security (Apache Tomcat) | HTTP | No | 5.3 | Network | High | Low | None | Un- changed |
None | None | High | 47.0.0.1.0 | |
| CVE-2026-23903 | Oracle Communications Element Manager | Third Party (Apache Shiro) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 9.0.0-9.0.4 | |
| CVE-2026-23903 | Oracle Communications Session Report Manager | Third Party (Apache Shiro) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 9.0.0-9.0.4 | |
| CVE-2025-15284 | Oracle Communications Unified Assurance | Core (qs) | HTTP | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 6.1.1-7.0.0 | |
| CVE-2025-66418 | Oracle Communications Unified Assurance | Core (urllib3) | HTTP | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 6.1.1-7.0.0 | |
| CVE-2025-9230 | Oracle Communications Unified Assurance | Core (OpenSSL) | HTTPS | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 6.1.1-7.0.0 | |
| CVE-2025-68161 | Oracle Communications Billing and Revenue Management | Platform (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 15.0.0.0.0-15.0.1.0.0, 15.1.0.0.0-15.2.0.0.0 | |
| CVE-2025-68161 | Oracle Communications BRM - Elastic Charging Engine | Security issues (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 15.0.0.0-15.0.1.0, 15.1.0.0-15.2.0.0 | |
| CVE-2025-68161 | Oracle Communications Convergence | Configuration (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 3.0.3.4.0 | |
| CVE-2025-68161 | Oracle Communications EAGLE Element Management System | Security (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 47.0.0.1.0 | |
| CVE-2025-68161 | Oracle Communications Instant Messaging Server | Installation (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 10.0.1.8.0 | |
| CVE-2025-68161 | Oracle Communications Offline Mediation Controller | Installation (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 15.0.0.0.0-15.0.1.0.0, 15.1.0.0.0-15.2.0.0.0 | |
| CVE-2025-68161 | Oracle Communications Order and Service Management | Security (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 7.5.0, 8.0.0 | |
| CVE-2025-68161 | Oracle Communications Performance Intelligence Center | Management (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 10.5.0.0-10.5.0.2 | |
| CVE-2025-68161 | Oracle Communications Policy Management | Configuration Management Platform (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 15.0.0.0.0 | |
| CVE-2025-68161 | Oracle Communications Unified Assurance | Core (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 6.1.1 | |
| CVE-2025-68161 | Oracle Communications Unified Inventory Management | Security Component (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 7.5.0, 7.5.1, 7.6.0, 7.7.0, 7.8.0, 8.0.0 | |
| CVE-2025-58057 | Oracle Communications Unified Assurance | Core (Netty) | HTTP | No | 4.5 | Network | Low | High | Required | Un- changed |
None | None | High | 6.1.1-7.0.0 | |
| CVE-2025-41249 | Oracle Communications Unified Assurance | Core (Spring Framework) | HTTP | No | 4.5 | Network | Low | High | Required | Un- changed |
High | None | None | 6.1.1-7.0.0 | |
| CVE-2025-41248 | Oracle Communications Unified Assurance | Core (Spring Security) | HTTP | No | 4.5 | Network | Low | High | Required | Un- changed |
High | None | None | 6.1.1-7.0.0 | |
| CVE-2025-9086 | Oracle Communications Unified Assurance | Core (curl) | HTTP | No | 4.5 | Network | Low | High | Required | Un- changed |
None | None | High | 6.1.1-7.0.0 | |
| CVE-2026-26007 | Oracle Communications Unified Assurance | Core (Cryptography) | HTTPS | No | 4.5 | Network | Low | High | Required | Un- changed |
High | None | None | 6.1.1-7.0.0 | |
| CVE-2026-24734 | Oracle Communications Unified Assurance | Core (Apache Tomcat) | TLS | No | 4.5 | Network | Low | High | Required | Un- changed |
None | High | None | 6.1.1-7.0.0 | |
| CVE-2026-21637 | Oracle Communications Unified Assurance | Core (Node.js) | TLS | No | 4.5 | Network | Low | High | Required | Un- changed |
None | None | High | 6.1.1-7.0.0 | |
| CVE-2025-27821 | Oracle Communications Unified Assurance | Core (Apache Hadoop) | HTTP | No | 4.3 | Network | Low | High | Required | Un- changed |
Low | Low | Low | 6.1.1-7.0.0 | |
| CVE-2025-61984 | Oracle Communications Policy Management | Configuration Management Platform (OpenSSH) | None | No | 3.6 | Local | High | Low | None | Un- changed |
Low | Low | None | 15.0.0.0.0 | |
| CVE-2025-58181 | Oracle Communications Unified Assurance | Core (Golang Crypto) | SSH | No | 2.4 | Network | Low | High | Required | Un- changed |
None | None | Low | 7.0.0 | |
This Critical Patch Update contains 4 new security patches for Oracle Construction and Engineering. 3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
| CVE ID | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
| CVE-2025-52999 | Primavera P6 Enterprise Project Portfolio Management | Web Access (jackson-core) | HTTP | Yes | 6.5 | Network | Low | None | None | Un- changed |
Low | None | Low | 21.12.0.0-21.12.21.6, 22.12.0.0-22.12.21.1, 23.12.0.0-23.12.18.0, 24.12.0.0-24.12.13.0, 25.12.0.0-25.12.2.0 | |
| CVE-2025-48795 | Primavera P6 Enterprise Project Portfolio Management | P6 Web Services (Apache CXF) | HTTP | Yes | 5.6 | Network | High | None | None | Un- changed |
Low | Low | Low | 24.12.0.0-24.12.13.0, 25.12.0.0 | |
| CVE-2025-68161 | Primavera Unifier | Platform (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 21.12.0-21.12.17, 22.12.0-22.12.15, 23.12.0-23.12.16, 24.12.0-24.12.13, 25.12.0-25.12.3 | |
| CVE-2025-26791 | Primavera P6 Enterprise Project Portfolio Management | P6WS (DOMPurify) | HTTP | No | 4.1 | Network | Low | Low | Required | Changed | Low | None | None | 21.12.0.0-21.12.21.6, 22.12.0.0-22.12.21.1, 23.12.0.0-23.12.18.0, 24.12.0.0-24.12.13.0, 25.12.0.0-25.12.2.0 | |
This Critical Patch Update contains 18 new security patches for Oracle E-Business Suite. 8 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
Oracle E-Business Suite products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle E-Business Suite products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security updates are not listed in the Oracle E-Business Suite risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle E-Business Suite products, Oracle recommends that customers apply the April 2026 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Oracle E-Business Suite. For information on what patches need to be applied to your environments, refer to Oracle E-Business Suite Release 12 Critical Patch Update Knowledge Document (April 2026), My Oracle Support Note KA923.
| CVE ID | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
| CVE-2026-34275 | Oracle Advanced Inbound Telephony | Setup and Administration | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.2.3-12.2.15 | |
| CVE-2024-51504 | Oracle Enterprise Command Center Framework | Core (Apache ZooKeeper) | TCP | Yes | 9.1 | Network | Low | None | None | Un- changed |
High | None | High | 15.0 | |
| CVE-2025-48734 | Oracle Advanced Supply Chain Planning | User Interface (Apache Commons BeanUtils) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 12.2.3-12.2.15 | |
| CVE-2025-48734 | Oracle Flow Manufacturing | Security (Apache Commons BeanUtils) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 12.2.3-12.2.15 | |
| CVE-2025-48734 | Oracle Global Order Promising | Web Service (Apache Commons BeanUtils) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 12.2.3-12.2.15 | |
| CVE-2025-48734 | Oracle iProcurement | iProcurement ECC shopping (Apache Commons BeanUtils) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 12.2.3-12.2.15 | |
| CVE-2025-48734 | Oracle Rapid Planning | User Interface (Apache Commons BeanUtils) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 12.2.3-12.2.15 | |
| CVE-2025-48734 | Oracle Yard Management | Installation (Apache Commons BeanUtils) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 12.2.4-12.2.15 | |
| CVE-2026-22011 | Oracle Applications DBA | ADPatch | HTTP | No | 7.6 | Network | High | High | Required | Changed | High | High | High | 12.2.3-12.2.15 | |
| CVE-2025-58057 | Oracle Enterprise Command Center Framework | ECC Core (Netty) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 15.0 | |
| CVE-2026-34297 | Oracle HCM Common Architecture | Knowledge Integration | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 12.2.3-12.2.15 | |
| CVE-2026-34274 | Oracle Configurator | User Interface | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 12.2.3-12.2.15 | |
| CVE-2025-41242 | Oracle Enterprise Command Center Framework | ECC Core (Spring Framework) | HTTP | Yes | 5.9 | Network | High | None | None | Un- changed |
High | None | None | 15.0 | |
| CVE-2026-34302 | Oracle Workflow | Workflow Loader | HTTP | No | 5.5 | Network | Low | High | None | Changed | None | Low | Low | 12.2.3-12.2.15 | |
| CVE-2025-31672 | Oracle Enterprise Command Center Framework | ECC Core (Apache POI) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | Low | None | 15.0 | |
| CVE-2025-68161 | Oracle Enterprise Command Center Framework | ECC Core (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 15.0 | |
| CVE-2026-34298 | Oracle Applications Framework | Personalization | HTTP | No | 4.7 | Network | Low | High | None | Un- changed |
Low | Low | Low | 12.2.9-12.2.15 | |
| CVE-2026-22014 | Oracle User Management | Workflow and Business Events | HTTP | No | 3.8 | Network | Low | High | None | Un- changed |
Low | Low | None | 12.2.7-12.2.15 | |
This Critical Patch Update contains 9 new security patches for Oracle Enterprise Manager. 8 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. None of these patches are applicable to client-only installations, i.e., installations that do not have Oracle Enterprise Manager installed. The English text form of this Risk Matrix can be found here.
Oracle Enterprise Manager products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle Enterprise Manager products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security updates are not listed in the Oracle Enterprise Manager risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle Enterprise Manager products, Oracle recommends that customers apply the April 2026 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Enterprise Manager. For information on what patches need to be applied to your environments, refer to Critical Patch Update April 2026 Patch Availability Document for Oracle Products, My Oracle Support Note CPU59.
| CVE ID | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
| CVE-2026-34279 | Oracle Enterprise Manager Base Platform | Event Management | HTTP | No | 9.1 | Network | Low | High | None | Changed | High | High | High | 13.5, 24.1 | |
| CVE-2024-56406 | Oracle Enterprise Manager Base Platform | Agent Next Gen (Perl) | HTTP | Yes | 8.6 | Network | Low | None | None | Un- changed |
Low | Low | High | 13.5, 24.1 | |
| CVE-2024-56406 | Oracle Enterprise Manager Base Platform | Enterprise Manager Install (Perl) | HTTP | Yes | 8.6 | Network | Low | None | None | Un- changed |
Low | Low | High | 13.5, 24.1 | |
| CVE-2025-26333 | Oracle Application Testing Suite | Load Testing for Web Apps (BSAFE Crypto-J) | HTTPS | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 13.3.0.1 | |
| CVE-2025-52999 | Oracle Enterprise Manager Base Platform | Security Framework (jackson-core) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 13.5 | |
| CVE-2025-41249 | Oracle Enterprise Manager for Fusion Middleware | Infrastructure Management (Spring Framework) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 13.5, 24.1 | |
| CVE-2025-68161 | Oracle Configuration Manager | OCM Request Tunnel (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 13.5, 24.1 | |
| CVE-2025-68161 | Oracle Enterprise Manager Base Platform | Enterprise Manager Install (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 13.5, 24.1 | |
| CVE-2025-68161 | Oracle Enterprise Manager Base Platform | Oracle Management Service (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 13.5, 24.1 | |
This Critical Patch Update contains 75 new security patches, plus additional third party patches noted below, for Oracle Financial Services Applications. 59 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
| CVE ID | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
| CVE-2023-34034 | Oracle Banking Origination | Onboarding Batch Processes (Spring Security) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 14.5.0.0.0-14.8.0.0.0 | |
| CVE-2023-44981 | Oracle Banking Corporate Lending Process Management | Base (Apache ZooKeeper) | HTTP | Yes | 9.1 | Network | Low | None | None | Un- changed |
High | High | None | 14.5.0.0.0-14.8.0.0.0 | |
| CVE-2023-44981 | Oracle Banking Supply Chain Finance | Security (Apache ZooKeeper) | HTTP | Yes | 9.1 | Network | Low | None | None | Un- changed |
High | High | None | 14.5.0.0.0-14.8.0.0.0 | |
| CVE-2023-44981 | Oracle Banking Trade Finance Process Management | Common (Apache ZooKeeper) | HTTP | Yes | 9.1 | Network | Low | None | None | Un- changed |
High | High | None | 14.5.0.0.0-14.8.0.0.0 | |
| CVE-2025-48734 | Oracle Banking Corporate Lending Process Management | Base (Apache Commons BeanUtils) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 14.5.0.0.0-14.8.0.0.0 | |
| CVE-2025-48734 | Oracle Banking Origination | Configuration (Apache Commons BeanUtils) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 14.6.0.0.0-14.8.0.0.0 | |
| CVE-2025-48734 | Oracle Insurance Policy Administration Operational Data Store for Life and Annuity | Logger (Apache Commons BeanUtils) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 1.0.2.1 | |
| CVE-2026-25210 | Oracle Financial Services Behavior Detection Platform | Third Party (LibExpat) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 8.0.8.1, 8.1.2.10, 8.1.2.11 | |
| CVE-2026-25210 | Oracle Financial Services Trade-Based Anti Money Laundering Enterprise Edition | Platform (LibExpat) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 8.0.8 | |
| CVE-2025-41249 | Oracle Banking Branch | Reports (Spring Framework) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 14.5.0.0.0-14.8.0.0.0 | |
| CVE-2025-41248 | Oracle Banking Branch | Reports (Spring Security) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 14.5.0.0.0-14.8.0.0.0 | |
| CVE-2025-66566 | Oracle Banking Branch | Reports (lz4-java) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 14.5.0.0.0-14.8.0.0.0 | |
| CVE-2025-41249 | Oracle Banking Cash Management | Accessibility (Spring Framework) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 14.8.2.0.0 | |
| CVE-2025-66566 | Oracle Banking Cash Management | Common (lz4-java) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 14.8.2.0.0 | |
| CVE-2025-48976 | Oracle Banking Collections and Recovery | Infrastructure (Apache Commons FileUpload) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 14.6.0.0.0-14.8.0.0.0 | |
| CVE-2025-41249 | Oracle Banking Corporate Lending | Core (Spring Framework) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 14.5.0.0.0-14.8.0.0.0 | |
| CVE-2025-41249 | Oracle Banking Corporate Lending Process Management | Base (Spring Framework) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 14.5.0.0.0-14.8.0.0.0 | |
| CVE-2025-66566 | Oracle Banking Corporate Lending Process Management | Base (lz4-java) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 14.5.0.0.0-14.8.0.0.0 | |
| CVE-2025-48976 | Oracle Banking Corporate Lending Process Management | Core (Apache Commons FileUpload) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 14.5.0.0.0-14.8.0.0.0 | |
| CVE-2025-27817 | Oracle Banking Corporate Lending Process Management | Base (Apache Kafka) | HTTPS | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 14.5.0.0.0-14.8.0.0.0 | |
| CVE-2025-48976 | Oracle Banking Credit Facilities Process Management | Common (Apache Commons FileUpload) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 14.5.0.0.0-14.8.0.0.0 | |
| CVE-2025-5115 | Oracle Banking Credit Facilities Process Management | Common (Eclipse Jetty) | HTTP/2 | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 14.5.0.0.0-14.8.0.0.0 | |
| CVE-2025-27817 | Oracle Banking Credit Facilities Process Management | Common (Apache Kafka) | HTTPS | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 14.5.0.0.0-14.8.0.0.0 | |
| CVE-2025-48976 | Oracle Banking Origination | Configuration (Apache Commons FileUpload) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 14.6.0.0.0-14.8.0.0.0 | |
| CVE-2025-41249 | Oracle Banking Origination | Configuration (Spring Framework) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 14.6.0.0.0-14.8.0.0.0 | |
| CVE-2025-66566 | Oracle Banking Origination | Configuration (lz4-java) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 14.5.0.0.0-14.8.0.0.0 | |
| CVE-2025-1948 | Oracle Banking Origination | Configuration (Eclipse Jetty) | HTTP/2 | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 14.5.0.0.0-14.8.0.0.0 | |
| CVE-2025-55163 | Oracle Banking Origination | Configuration (Netty) | HTTP/2 | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 14.6.0.0.0-14.8.0.0.0 | |
| CVE-2025-27817 | Oracle Banking Origination | Configuration (Apache Kafka) | HTTPS | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 14.6.0.0.0-14.8.0.0.0 | |
| CVE-2025-55163 | Oracle Banking Payments | Payments (Netty) | HTTP/2 | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 14.5.0.0.0-14.8.0.0.0 | |
| CVE-2025-48976 | Oracle Banking Supply Chain Finance | Security (Apache Commons FileUpload) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 14.5.0.0.0-14.8.0.0.0 | |
| CVE-2025-27817 | Oracle Banking Supply Chain Finance | Security (Apache Kafka) | HTTPS | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 14.5.0.0.0-14.8.0.0.0 | |
| CVE-2025-41249 | Oracle Banking Trade Finance | Core (Spring Framework) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 14.5.0.0.0-14.8.0.0.0 | |
| CVE-2025-48976 | Oracle Banking Trade Finance Process Management | Dashboard (Apache Commons FileUpload) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 14.5.0.0.0-14.8.0.0.0 | |
| CVE-2025-55163 | Oracle Banking Trade Finance Process Management | Dashboard (Netty) | HTTP/2 | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 14.5.0.0.0-14.8.0.0.0 | |
| CVE-2025-27817 | Oracle Banking Trade Finance Process Management | Dashboard (Apache Kafka) | HTTPS | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 14.5.0.0.0-14.8.0.0.0 | |
| CVE-2025-41249 | Oracle Banking Virtual Account Management | Common Core (Spring Framework) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 14.5.0.0.0-14.8.0.0.0 | |
| CVE-2025-48976 | Oracle Banking Virtual Account Management | Core (Apache Commons FileUpload) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 14.5.0.0.0-14.8.0.0.0 | |
| CVE-2025-27817 | Oracle Banking Virtual Account Management | Core (Apache Kafka) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 14.5.0.0.0-14.8.0.0.0 | |
| CVE-2025-55163 | Oracle Banking Virtual Account Management | Core (Netty) | HTTP/2 | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 14.5.0.0.0-14.8.0.0.0 | |
| CVE-2026-34310 | Oracle Financial Services Analytical Applications Infrastructure | Platform | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 8.0.7.9, 8.0.8.7, 8.1.2.5 | |
| CVE-2026-22010 | Oracle Financial Services Analytical Applications Infrastructure | Platform | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 8.0.7.9, 8.0.8.7, 8.1.2.5 | |
| CVE-2025-27820 | Oracle Financial Services Analytical Applications Infrastructure | Platform (Apache HttpClient) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 8.0.7.9, 8.0.8.7, 8.1.2.5 | |
| CVE-2026-25990 | Oracle Financial Services Compliance Studio | Reports (Pillow) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.1.2.9 | |
| CVE-2026-34320 | Oracle Financial Services Customer Screening | User Interface | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 8.1.2.8.0 | |
| CVE-2025-27820 | Oracle Financial Services Regulatory Reporting | Installer (Apache HttpClient) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 8.1.2.10, 8.1.2.11 | |
| CVE-2026-35231 | Oracle Financial Services Transaction Filtering | User Interface | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 8.1.2.8.0 | |
| CVE-2025-48976 | Oracle FLEXCUBE Enterprise Limits and Collateral Management | Infrastructure (Apache Commons FileUpload) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 14.5.0.0.0-14.8.0.0.0 | |
| CVE-2025-27821 | Oracle Financial Services Model Management and Governance | Installer (Apache Hadoop) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 8.1.2.7 | |
| CVE-2026-34314 | Oracle Financial Services Analytical Applications Infrastructure | Platform | HTTP | No | 6.8 | Network | High | Low | None | Un- changed |
High | High | None | 8.0.7.9, 8.0.8.7, 8.1.2.5 | |
| CVE-2026-34325 | Oracle Financial Services Analytical Applications Infrastructure | User Interface | None | No | 6.8 | Local | Low | Low | Required | Un- changed |
High | Low | High | 8.0.7.9, 8.0.8.7, 8.1.2.5 | |
| CVE-2025-67735 | Oracle Banking Liquidity Management | Infrastructure (Netty) | HTTP | Yes | 6.5 | Network | Low | None | None | Un- changed |
Low | Low | None | 14.8.1.0.0 | |
| CVE-2025-12183 | Oracle Banking Liquidity Management | Infrastructure (lz4-java) | HTTP | No | 6.5 | Network | Low | High | None | Un- changed |
High | None | High | 14.8.0.0.0 | |
| CVE-2026-34313 | Oracle Financial Services Analytical Applications Infrastructure | Platform | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed |
High | None | None | 8.0.7.9, 8.0.8.7, 8.1.2.5 | |
| CVE-2023-20863 | Oracle Insurance Policy Administration Operational Data Store for Life and Annuity | Logger (Spring Framework) | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed |
None | None | High | 1.0.2.1 | |
| CVE-2021-28168 | Oracle Financial Services Analytical Applications Infrastructure | Platform (Eclipse Jersey) | None | No | 5.5 | Local | Low | Low | None | Un- changed |
High | None | None | 8.0.7.9, 8.0.8.7, 8.1.2.5 | |
| CVE-2025-48924 | Oracle Banking Trade Finance | Core (Apache Commons Lang) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | None | Low | 14.5.0.0.0-14.8.0.0.0 | |
| CVE-2025-48924 | Oracle Banking Virtual Account Management | Common Core (Apache Commons Lang) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | None | Low | 14.5.0.0.0-14.8.0.0.0 | |
| CVE-2025-48924 | Oracle Banking Virtual Account Management | Platform (Apache Commons Lang) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | None | Low | 14.5.0.0.0-14.8.0.0.0 | |
| CVE-2025-48924 | Oracle Documaker | Documaker Core (Apache Commons Lang) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | None | Low | 12.7.2-13.0.2 | |
| CVE-2025-41249 | Oracle Documaker | Documaker Core (Spring Framework) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 12.7.2-13.0.2 | |
| CVE-2025-48924 | Oracle Financial Services Lending and Leasing | Apache Commons (Apache Commons Lang) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | None | Low | 14.8.0.0.0, 14.10.0.0.0-14.12.0.0.0 | |
| CVE-2025-46392 | Oracle Banking Virtual Account Management | Common Core (Apache Commons Configuration) | HTTP | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 14.5.0.0.0-14.8.0.0.0 | |
| CVE-2025-48976 | Oracle Banking Virtual Account Management | Platform (Apache Commons FileUpload) | HTTP | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 14.5.0.0.0-14.8.0.0.0 | |
| CVE-2025-58057 | Oracle Banking Virtual Account Management | Platform (Netty) | HTTP | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 14.5.0.0.0-14.8.0.0.0 | |
| CVE-2025-68161 | Oracle Banking Virtual Account Management | Platform (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 14.5.0.0.0-14.8.0.0.0 | |
| CVE-2026-34321 | Oracle Financial Services Analytical Applications Infrastructure | User Interface | HTTP | No | 4.8 | Network | High | Low | Required | Un- changed |
High | None | None | 8.0.7.9, 8.0.8.7, 8.1.2.5 | |
| CVE-2025-68161 | Oracle Financial Services Analytical Applications Infrastructure | Platform (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 8.0.7.9, 8.0.8.7, 8.1.2.5 | |
| CVE-2025-68161 | Oracle Financial Services Behavior Detection Platform | Third Party (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 8.0.8.1, 8.1.2.10, 8.1.2.11 | |
| CVE-2025-68161 | Oracle Financial Services Enterprise Case Management | Installers (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 8.0.8.2, 8.1.2.10, 8.1.2.11 | |
| CVE-2025-68161 | Oracle Financial Services Model Management and Governance | Installer (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 8.1.2.7 | |
| CVE-2025-68161 | Oracle Financial Services Trade-Based Anti Money Laundering Enterprise Edition | Platform (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 8.0.8 | |
| CVE-2025-68161 | Oracle Insurance Policy Administration J2EE | Architecture (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 11.3.1.0, 11.3.2.0, 12.0.5.0, 12.1.1.0 | |
| CVE-2025-41254 | Oracle Financial Services Analytical Applications Infrastructure | Platform (Spring Framework) | HTTP | Yes | 4.3 | Network | Low | None | Required | Un- changed |
None | Low | None | 8.0.7.9, 8.0.8.7, 8.1.2.5 | |
| CVE-2025-27636 | Oracle Banking Virtual Account Management | Platform (Apache Camel) | HTTP | No | 4.1 | Network | High | High | None | Un- changed |
Low | Low | Low | 14.5.0.0.0-14.8.0.0.0 | |
This Critical Patch Update contains 59 new security patches, plus additional third party patches noted below, for Oracle Fusion Middleware. 46 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
To get the full list of current and previously released Critical Patch Update patches for Oracle Fusion Middleware products, refer to My Oracle Support Doc ID KA1182.
| CVE ID | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
| CVE-2022-45047 | Oracle Managed File Transfer | Runtime Server (Apache Mina SSHD) | SSH | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.2.1.4.0 | |
| CVE-2025-68615 | Oracle Tuxedo | Docs-ATMI-IB (Net-SNMP) | UDP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 22.1.0, 22.1.1 | |
| CVE-2026-34285 | Oracle Identity Manager Connector | Core | HTTPS | Yes | 9.1 | Network | Low | None | None | Un- changed |
High | High | None | 12.2.1.4.0 | |
| CVE-2026-34286 | Oracle Identity Manager Connector | Core | HTTPS | Yes | 9.1 | Network | Low | None | None | Un- changed |
High | High | None | 12.2.1.4.0 | |
| CVE-2026-34287 | Oracle Identity Manager Connector | Core | HTTPS | Yes | 9.1 | Network | Low | None | None | Un- changed |
High | High | None | 12.2.1.4.0 | |
| CVE-2021-45046 | Oracle Business Activity Monitoring | Centralized Thirdparty Jars (Apache Log4j) | HTTP | Yes | 9.0 | Network | High | None | None | Changed | High | High | High | 12.2.1.4.0 | |
| CVE-2026-34291 | Oracle HTTP Server | Core | HTTP | Yes | 8.7 | Network | High | None | None | Changed | High | High | None | 12.2.1.4.0, 14.1.2.0.0 | |
| CVE-2025-58098 | Oracle HTTP Server | Core (Apache HTTP Server) | HTTP | No | 8.3 | Network | Low | Low | None | Un- changed |
High | High | Low | 12.2.1.4.0, 14.1.2.0.0 | |
| CVE-2026-25646 | Oracle Outside In Technology | DC-Specific Component (libpng) | HTTP | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 8.5.8 | |
| CVE-2026-35243 | Oracle Application Development Framework (ADF) | ADF Faces | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 12.2.1.4.0, 14.1.2.0.0 | |
| CVE-2026-25210 | Oracle Outside In Technology | DC-Specific Component (LibExpat) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 8.5.8 | |
| CVE-2026-22184 | Oracle Outside In Technology | Outside In Maintenance (zlib) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 8.5.8 | |
| CVE-2025-52999 | Oracle Business Process Management Suite | Document Service (jackson-core) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 12.2.1.4.0 | |
| CVE-2024-43394 | Oracle HTTP Server | Core (Apache HTTP Server) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 12.2.1.4.0, 14.1.2.0.0 | See Note 1 |
| CVE-2025-59775 | Oracle HTTP Server | Core (Apache HTTP Server) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 12.2.1.4.0, 14.1.2.0.0 | See Note 1 |
| CVE-2026-34290 | Oracle Identity Manager Connector | Core | TCP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 12.2.1.4.0 | |
| CVE-2024-29857 | Oracle SOA Suite | B2B Engine (Bouncy Castle Java Library) | HTTPS | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 12.2.1.4.0 | |
| CVE-2025-41249 | Oracle WebCenter Forms Recognition | Learnset Manager (Spring Framework) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 14.1.1.0.0 | |
| CVE-2026-34305 | Oracle WebLogic Server | Web Services | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 12.2.1.4.0, 14.1.1.0.0, 14.1.2.0.0, 15.1.1.0.0 | |
| CVE-2025-12383 | Oracle SOA Suite | B2B Engine (Eclipse Jersey) | HTTPS | Yes | 7.4 | Network | High | None | None | Un- changed |
High | High | None | 14.1.2.0.0 | |
| CVE-2025-0725 | Oracle Access Manager | Web Server Plugin (curl) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 14.1.2.0.0 | |
| CVE-2025-33042 | Oracle Business Process Management Suite | Composer (Apache Avro) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 12.2.1.4.0, 14.1.2.0.0 | |
| CVE-2025-33042 | Oracle Middleware Common Libraries and Tools | Third Party (Apache Avro) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 12.2.1.4.0, 14.1.2.0.0 | |
| CVE-2025-35036 | Oracle Middleware Common Libraries and Tools | Third Party (Validator) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 12.2.1.4.0, 14.1.2.0.0 | |
| CVE-2021-22573 | Oracle Middleware Common Libraries and Tools | Third Party (Google OAuth Client) | HTTPS | No | 7.3 | Network | Low | Low | Required | Un- changed |
High | High | None | 12.2.1.4.0, 14.1.2.0.0 | |
| CVE-2025-33042 | Oracle SOA Suite | Adapters (Apache Avro) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 14.1.2.0.0 | |
| CVE-2025-35036 | Oracle WebLogic Server | Centralized Thirdparty Jars (Validator) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 12.2.1.4.0 | |
| CVE-2024-13009 | Oracle Identity Manager | Third Party (jackson-databind) | HTTP | Yes | 7.2 | Network | Low | None | None | Changed | Low | Low | None | 12.2.1.4.0 | |
| CVE-2026-34292 | Oracle WebLogic Server | Core | HTTP | No | 7.2 | Network | Low | High | None | Un- changed |
High | High | High | 12.2.1.4.0, 14.1.1.0.0 | |
| CVE-2023-2976 | Oracle Managed File Transfer | Oracle MFT Installer (Google Guava) | None | No | 7.1 | Local | Low | Low | None | Un- changed |
High | High | None | 12.2.1.4.0 | |
| CVE-2025-68431 | Oracle Outside In Technology | DC-Specific Component (libheif) | HTTP | Yes | 7.1 | Network | Low | None | Required | Un- changed |
Low | None | High | 8.5.8 | |
| CVE-2026-21939 | Oracle Fusion Middleware | Oracle Database Client for Fusion Middleware | None | No | 7.0 | Local | High | None | Required | Un- changed |
High | High | High | 14.1.2.0.0 | |
| CVE-2025-65082 | Oracle HTTP Server | Core (Apache HTTP Server) | HTTP | Yes | 6.5 | Network | Low | None | None | Un- changed |
Low | Low | None | 12.2.1.4.0, 14.1.2.0.0 | |
| CVE-2026-34315 | Oracle WebLogic Server | Web Services | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed |
None | High | None | 12.2.1.4.0, 14.1.1.0.0, 14.1.2.0.0, 15.1.1.0.0 | |
| CVE-2025-46392 | Oracle WebLogic Server | Centralized Thirdparty Jars (Apache Commons Lang) | HTTPS | No | 6.5 | Network | Low | Low | None | Un- changed |
None | None | High | 12.2.1.4.0, 14.1.1.0.0 | |
| CVE-2026-35252 | Oracle Security Service | C Oracle SSL API | HTTPS | No | 6.4 | Network | High | Low | Required | Un- changed |
High | High | None | 12.2.1.4.0, 12.1.3.0.0 | |
| CVE-2026-34284 | Oracle Business Process Management Suite | Human workflow 11g+ | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 12.2.1.4.0, 14.1.2.0.0 | |
| CVE-2026-34283 | Oracle Identity Manager | Identity Console | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 12.2.1.4.0, 14.1.2.0.0 | |
| CVE-2026-34288 | Oracle Identity Manager Connector | Core | HTTP | Yes | 5.9 | Network | High | None | None | Un- changed |
High | None | None | 12.2.1.4.0 | |
| CVE-2026-34289 | Oracle Identity Manager Connector | Core | HTTPS | Yes | 5.9 | Network | High | None | None | Un- changed |
High | None | None | 12.2.1.4.0 | |
| CVE-2026-34294 | Oracle Identity Manager Connector | Microsoft Active Directory | LDAP | No | 5.9 | Network | High | Low | None | Un- changed |
Low | High | None | 12.2.1.4.0 | |
| CVE-2025-53864 | Oracle Data Integrator | Security (Nimbus JOSE+JWT) | HTTP | Yes | 5.8 | Network | Low | None | None | Changed | None | None | Low | 12.2.1.4.0, 14.1.2.0.0 | |
| CVE-2026-35232 | Oracle Fusion Middleware | Dynamic Monitoring Service | HTTP | No | 5.4 | Network | Low | Low | Required | Changed | Low | Low | None | 12.2.1.4.0, 14.1.2.0.0 | |
| CVE-2025-48924 | Oracle Application Development Framework (ADF) | ADF Faces (Apache Commons Lang) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | None | Low | 14.1.2.0.0 | |
| CVE-2025-31672 | Oracle Application Development Framework (ADF) | ADF Faces (Apache POI) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | Low | None | 14.1.2.0.0 | |
| CVE-2025-48924 | Oracle Business Process Management Suite | Composer (Apache Commons Lang) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | None | Low | 14.1.2.0.0 | |
| CVE-2025-48924 | Oracle Middleware Common Libraries and Tools | Third Party (Apache Commons Lang) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | None | Low | 12.2.1.4.0 | |
| CVE-2025-8916 | Oracle Middleware Common Libraries and Tools | Thirdparty Patch (Bouncy Castle Java Library) | HTTPS | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | None | Low | 14.1.2.0.0 | |
| CVE-2025-48924 | Oracle Web Services Manager | Third Party (Apache Commons Lang) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | None | Low | 12.2.1.4.0, 14.1.2.0.0 | |
| CVE-2025-8916 | Oracle WebLogic Server | Centralized Thirdparty Jars (Bouncy Castle Java Library) | HTTPS | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | None | Low | 12.2.1.4.0, 14.1.1.0.0 | |
| CVE-2025-68161 | Oracle Business Process Management Suite | Runtime Engine (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 12.2.1.4.0, 14.1.2.0.0 | |
| CVE-2025-68161 | Oracle Data Integrator | Security (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 12.2.1.4.0 | |
| CVE-2025-68161 | Oracle Identity Manager | Installer (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 12.2.1.4.0, 14.1.2.1.0 | |
| CVE-2025-68161 | Oracle Managed File Transfer | MFT Runtime Server (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 12.2.1.4.0, 14.1.2.0.0 | |
| CVE-2025-68161 | Oracle Middleware Common Libraries and Tools | Thirdparty Patch (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 12.2.1.4.0, 14.1.2.0.0 | |
| CVE-2025-68161 | Oracle WebCenter Sites | Thick Client (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 12.2.1.4.0, 14.1.2.0.0 | |
| CVE-2025-68161 | Oracle WebLogic Server | Centralized Third Party Jars (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 12.2.1.4.0, 14.1.1.0.0, 14.1.2.0.0, 15.1.1.0.0 | |
| CVE-2025-41254 | Oracle Middleware Common Libraries and Tools | Third Party (Spring Web Services) | HTTP | Yes | 4.3 | Network | Low | None | Required | Un- changed |
None | Low | None | 12.2.1.4.0, 14.1.2.0.0 | |
| CVE-2024-31573 | Oracle SOA Suite | Fabric Layer (xmlunit) | None | No | 4.0 | Local | High | None | None | Un- changed |
Low | Low | None | 12.2.1.4.0, 14.1.2.0.0 | |
This Critical Patch Update contains 15 new security patches for Oracle Analytics. 11 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
| CVE ID | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
| CVE-2026-27727 | Oracle Business Intelligence Enterprise Edition | Platform Security (Mchange Commons Java) | LDAP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 7.6.0.0.0, 8.2.0.0.0 | |
| CVE-2026-27830 | Oracle Business Intelligence Enterprise Edition | Platform Security (c3p0) | LDAP | No | 9.0 | Adjacent Network |
Low | Low | None | Changed | High | High | High | 7.6.0.0.0, 8.2.0.0.0 | |
| CVE-2025-48734 | Oracle Business Intelligence Enterprise Edition | Platform Security (Apache Commons BeanUtils) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 7.6.0.0.0, 8.2.0.0.0 | |
| CVE-2025-15467 | Oracle Business Intelligence Enterprise Edition | BI Platform Security (OpenSSL) | TLS | Yes | 8.8 | Network | Low | None | Required | Un- changed |
High | High | High | 8.2.0.0.0 | |
| CVE-2025-46762 | Oracle Business Intelligence Enterprise Edition | Platform Security (Apache Parquet Java) | HTTP | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 8.2.0.0.0 | |
| CVE-2026-21441 | Oracle Business Intelligence Enterprise Edition | Pipeline Test Failures (urllib3) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.2.0.0.0 | |
| CVE-2025-58057 | Oracle Business Intelligence Enterprise Edition | Platform Security (Netty) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.2.0.0.0 | |
| CVE-2023-52428 | Oracle Business Intelligence Enterprise Edition | Platform Security (Nimbus JOSE+JWT) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 7.6.0.0.0, 8.2.0.0.0 | |
| CVE-2025-24970 | Oracle Business Intelligence Enterprise Edition | Analytics Server (Netty) | TLS | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.2.0.0.0 | |
| CVE-2025-33042 | Oracle Business Intelligence Enterprise Edition | Platform Security (Apache Avro) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 7.6.0.0.0, 8.2.0.0.0 | |
| CVE-2021-28168 | Oracle Business Intelligence Enterprise Edition | Platform Security (Eclipse Jersey) | None | No | 5.5 | Local | Low | Low | None | Un- changed |
High | None | None | 7.6.0.0.0, 8.2.0.0.0 | |
| CVE-2025-48924 | Oracle BI Publisher | BI Publisher Microservice (Apache Commons Lang) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | None | Low | 7.6.0.0.0, 8.2.0.0.0 | |
| CVE-2025-59419 | Oracle Business Intelligence Enterprise Edition | Platform Security (netty-codec-smtp) | SMTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | Low | None | 8.2.0.0.0 | |
| CVE-2025-68161 | Oracle Business Intelligence Enterprise Edition | Analytics Server (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 7.6.0.0.0, 8.2.0.0.0 | |
| CVE-2023-35116 | Oracle Business Intelligence Enterprise Edition | Platform Security (jackson-databind) | None | No | 4.7 | Local | High | Low | None | Un- changed |
None | None | High | 8.2.0.0.0 | |
This Critical Patch Update contains 4 new security patches for Oracle Life Science Applications. 3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
| CVE ID | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
| CVE-2026-21997 | Oracle Life Sciences Empirica Signal | Common Core | HTTP | No | 8.5 | Network | Low | Low | None | Changed | Low | High | None | 9.2.1-9.2.3 | |
| CVE-2026-34324 | Oracle Life Sciences InForm | App Server | HTTP | Yes | 6.5 | Network | Low | None | None | Un- changed |
Low | Low | None | 7.0.1.0, 7.0.1.1 | |
| CVE-2026-34323 | Oracle Life Sciences InForm | IDM Authentication | HTTP | Yes | 6.3 | Network | Low | None | Required | Un- changed |
Low | Low | Low | 7.0.1.0, 7.0.1.1 | |
| CVE-2025-68161 | Oracle Life Sciences Empirica Signal | Common Core (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 9.2.1-9.2.3 | |
This Critical Patch Update contains 1 new security patch for Oracle Hospitality Applications. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
| CVE ID | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
| CVE-2026-24734 | Oracle Hospitality Cruise Shipboard Property Management (SPMS) | Next-Gen SPMS (Apache Tomcat) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 23.1.5-23.3.0 | |
This Critical Patch Update contains 6 new security patches for Oracle Hyperion. 4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
| CVE ID | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
| CVE-2025-64775 | Oracle Hyperion Infrastructure Technology | Installation and Configuration (Apache Struts) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 11.2.24.0.000 | |
| CVE-2025-9086 | Oracle Hyperion Infrastructure Technology | Installation and Configuration (curl) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 11.2.24.0.000 | |
| CVE-2025-66566 | Oracle Hyperion Infrastructure Technology | Installation and Configuration (lz4-java) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 11.2.24.0.000 | |
| CVE-2025-65018 | Oracle Hyperion Infrastructure Technology | Installation and Configuration (libpng) | None | No | 7.1 | Local | Low | None | Required | Un- changed |
None | High | High | 11.2.24.0.000 | |
| CVE-2025-54571 | Oracle Hyperion Infrastructure Technology | Installation and Configuration (ModSecurity) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 11.2.24.0.000 | |
| CVE-2026-35244 | Oracle Hyperion Infrastructure Technology | Lifecycle Management | HTTP | No | 5.2 | Network | Low | High | Required | Un- changed |
Low | High | None | 11.2.24.0.000 | |
This Critical Patch Update contains 11 new security patches, plus additional third party patches noted below, for Oracle Java SE. 7 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
The CVSS scores below assume that a user running a Java applet or Java Web Start application has administrator privileges (typical on Windows). When the user does not run with administrator privileges (typical on Solaris and Linux), the corresponding CVSS impact scores for Confidentiality, Integrity, and Availability are "Low" instead of "High", lowering the CVSS Base Score. For example, a Base Score of 9.6 becomes 7.1.
Java Management Service, available to all users, can help you find vulnerable Java versions in your systems. Java SE Subscribers and customers running in Oracle Cloud can use Java Management Service to update Java Runtimes and to do further security reviews like identifying potentially vulnerable third party libraries used by your Java programs. Existing Java Management Service user click here to log in to your dashboard. The Java Management Service Documentation provides a list of features available to everyone and those available only to customers. Learn more about using Java Management Service to monitor and secure your Java Installations.
| CVE ID | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
| CVE-2026-20652 | Oracle Java SE | JavaFX (WebKitGTK) | Multiple | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | Oracle Java SE: 8u481-b50 | See Note 1 |
| CVE-2026-22016 | Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition | JAXP | Multiple | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18, 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17 | See Note 2 |
| CVE-2026-34282 | Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition | Networking | Multiple | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | Oracle Java SE: 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18, 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17 | See Note 2 |
| CVE-2026-22003 | Oracle Java SE, Oracle GraalVM Enterprise Edition | Hotspot | None | No | 6.0 | Local | High | Low | Required | Un- changed |
None | High | High | Oracle Java SE: 8u481, 8u481-b50; Oracle GraalVM Enterprise Edition: 21.3.17 | See Note 1 |
| CVE-2026-22021 | Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition | JSSE | HTTPS | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | None | Low | Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18, 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17 | See Note 2 |
| CVE-2026-22013 | Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition | JGSS | Multiple | Yes | 5.3 | Network | High | None | Required | Un- changed |
High | None | None | Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18, 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17 | See Note 1 |
| CVE-2026-23865 | Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition | 2D (FreeType) | None | No | 5.3 | Local | Low | None | Required | Un- changed |
Low | Low | Low | Oracle Java SE: 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18, 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17 | See Note 2 |
| CVE-2026-22008 | Oracle Java SE | Libraries | Multiple | Yes | 3.7 | Network | High | None | None | Un- changed |
None | Low | None | Oracle Java SE: 25.0.1 | See Note 1 |
| CVE-2026-22018 | Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition | Libraries | Multiple | Yes | 3.7 | Network | High | None | None | Un- changed |
None | None | Low | Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18, 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17 | See Note 2 |
| CVE-2026-22007 | Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition | Security | None | No | 2.9 | Local | High | None | None | Un- changed |
Low | None | None | Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18, 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17 | See Note 2 |
| CVE-2026-34268 | Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition | Security | None | No | 2.9 | Local | High | None | None | Un- changed |
Low | None | None | Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18, 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17 | See Note 2 |
This Critical Patch Update contains 3 new security patches for Oracle JD Edwards. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
| CVE ID | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
| CVE-2025-9230 | JD Edwards EnterpriseOne Tools | Enterprise Infrastructure Security (OpenSSL) | HTTPS | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 9.2.0.0-9.2.26.1 | |
| CVE-2023-5388 | JD Edwards EnterpriseOne Tools | Enterprise Infrastructure Security (NSS) | HTTPS | Yes | 6.5 | Network | Low | None | None | Un- changed |
Low | None | Low | 9.2.0.0-9.2.26.1 | |
| CVE-2025-48924 | JD Edwards EnterpriseOne Tools | Web Runtime Security (Apache Commons Lang) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | None | Low | 9.2.0.0-9.2.26.1 | |
This Critical Patch Update contains 34 new security patches, plus additional third party patches noted below, for Oracle MySQL. 3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
| CVE ID | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
| CVE-2025-15467 | MySQL Enterprise Backup | Enterprise Backup (OpenSSL) | TLS | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 8.0.0-8.0.45, 8.4.0-8.4.8, 9.0.0-9.6.0 | |
| CVE-2025-15467 | MySQL Server | Server: Packaging (OpenSSL) | MySQL Protocol | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 8.0.0-8.0.45, 8.4.0-8.4.8, 9.0.0-9.6.0 | |
| CVE-2025-15467 | MySQL Workbench | MySQL Workbench (OpenSSL) | MySQL Workbench | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 8.0.0-8.0.46 | |
| CVE-2026-34270 | MySQL Server | Server: Group Replication Plugin | MySQL Protocol | No | 6.5 | Network | Low | Low | None | Un- changed |
None | None | High | 8.0.0-8.0.45, 8.4.0-8.4.8, 9.0.0-9.6.0 | |
| CVE-2026-34271 | MySQL Server | Server: Group Replication Plugin | MySQL Protocol | No | 6.5 | Network | Low | Low | None | Un- changed |
None | None | High | 8.0.0-8.0.45, 8.4.0-8.4.8, 9.0.0-9.6.0 | |
| CVE-2026-34276 | MySQL Server | Server: Group Replication Plugin | MySQL Protocol | No | 6.5 | Network | Low | Low | None | Un- changed |
None | None | High | 8.0.0-8.0.45, 8.4.0-8.4.8, 9.0.0-9.6.0 | |
| CVE-2026-34308 | MySQL Server | Server: JSON | MySQL Protocol | No | 6.5 | Network | Low | Low | None | Un- changed |
None | None | High | 8.0.0-8.0.45, 8.4.0-8.4.8, 9.0.0-9.6.0 | |
| CVE-2026-22009 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 6.5 | Network | Low | Low | None | Un- changed |
None | None | High | 8.0.0-8.0.45, 8.4.0-8.4.8, 9.0.0-9.6.0 | |
| CVE-2026-22017 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 6.5 | Network | Low | Low | None | Un- changed |
None | None | High | 8.0.0-8.0.45, 8.4.0-8.4.8, 9.0.0-9.6.0 | |
| CVE-2026-34272 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 6.5 | Network | Low | Low | None | Un- changed |
None | None | High | 9.0.0-9.6.0 | |
| CVE-2026-34303 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 6.5 | Network | Low | Low | None | Un- changed |
None | None | High | 8.0.0-8.0.45, 8.4.0-8.4.8, 9.0.0-9.6.0 | |
| CVE-2025-14017 | MySQL Enterprise Backup | Enterprise Backup (curl) | None | No | 6.3 | Local | High | None | Required | Un- changed |
High | High | None | 8.0.0-8.0.45, 8.4.0-8.4.8, 9.0.0-9.6.0 | |
| CVE-2025-14017 | MySQL Server | Server: Packaging (curl) | None | No | 6.3 | Local | High | None | Required | Un- changed |
High | High | None | 8.0.0-8.0.45, 8.4.0-8.4.8, 9.0.0-9.6.0 | |
| CVE-2026-34318 | MySQL Shell | Shell: Core Client | Multiple | No | 5.8 | Network | High | High | None | Changed | High | None | None | 8.0.0-8.0.45, 8.4.0-8.4.8, 9.0.0-9.6.0 | |
| CVE-2025-5318 | MySQL Cluster | Cluster: General (libssh) | Multiple | No | 5.4 | Network | Low | Low | None | Un- changed |
Low | Low | None | 8.0.0-8.0.44, 8.4.0-8.4.7, 9.0.0-9.5.0 | |
| CVE-2026-34317 | MySQL Shell | Shell: Core Client | None | No | 5.0 | Local | Low | Low | Required | Un- changed |
None | None | High | 8.0.0-8.0.45, 8.4.0-8.4.8, 9.0.0-9.6.0 | |
| CVE-2026-34319 | MySQL Shell | Shell: Core Client | None | No | 5.0 | Local | Low | Low | Required | Un- changed |
None | None | High | 8.0.0-8.0.45, 8.4.0-8.4.8, 9.0.0-9.6.0 | |
| CVE-2026-22004 | MySQL Server | InnoDB | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.0-8.0.45, 8.4.0-8.4.8, 9.0.0-9.6.0 | |
| CVE-2026-34304 | MySQL Server | InnoDB | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.0-8.0.45, 8.4.0-8.4.8, 9.0.0-9.6.0 | |
| CVE-2026-35236 | MySQL Server | InnoDB | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.0-8.0.45, 8.4.0-8.4.8, 9.0.0-9.6.0 | |
| CVE-2026-35237 | MySQL Server | InnoDB | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.0-8.0.45, 8.4.0-8.4.8, 9.0.0-9.6.0 | |
| CVE-2026-35238 | MySQL Server | InnoDB | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.0-8.0.45, 8.4.0-8.4.8, 9.0.0-9.6.0 | |
| CVE-2026-34293 | MySQL Server | Server: DML | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.0-8.0.45 | |
| CVE-2026-35239 | MySQL Server | Server: DML | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.0-8.0.45, 8.4.0-8.4.8, 9.0.0-9.6.0 | |
| CVE-2026-35235 | MySQL Server | Server: GIS | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 9.0.0-9.6.0 | |
| CVE-2026-21998 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.0-8.0.45, 8.4.0-8.4.8, 9.0.0-9.6.0 | |
| CVE-2026-22005 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.0-8.0.45, 8.4.0-8.4.8, 9.0.0-9.6.0 | |
| CVE-2026-22002 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.0-8.0.45, 8.4.0-8.4.8, 9.0.0-9.6.0 | |
| CVE-2026-34267 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.0-8.0.45 | |
| CVE-2026-34278 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.0-8.0.45 | |
| CVE-2026-35240 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.0-8.0.45, 8.4.0-8.4.8, 9.0.0-9.6.0 | |
| CVE-2026-35234 | MySQL Server | Server: Partition | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 9.0.0-9.6.0 | |
| CVE-2026-22015 | MySQL Server | Server: Information Schema | MySQL Protocol | No | 4.3 | Network | Low | Low | None | Un- changed |
Low | None | None | 8.0.0-8.0.45, 8.4.0-8.4.8, 9.0.0-9.6.0 | |
| CVE-2026-22001 | MySQL Server | Server: Information Schema | MySQL Protocol | No | 2.7 | Network | Low | High | None | Un- changed |
Low | None | None | 8.0.0-8.0.45, 8.4.0-8.4.8, 9.0.0-9.6.0 | |
This Critical Patch Update contains 21 new security patches for Oracle PeopleSoft. 7 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
| CVE ID | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
| CVE-2025-15467 | PeopleSoft Enterprise PeopleTools | Security (OpenSSL) | HTTPS | Yes | 8.8 | Network | Low | None | Required | Un- changed |
High | High | High | 8.61-8.62 | |
| CVE-2026-34309 | PeopleSoft Enterprise PeopleTools | Security | HTTP | No | 8.1 | Network | Low | Low | None | Un- changed |
High | High | None | 8.61-8.62 | |
| CVE-2025-58754 | PeopleSoft Enterprise CC Common Application Objects | Common Application Objects (Axios) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 9.2 | |
| CVE-2025-8194 | PeopleSoft Enterprise PeopleTools | Porting (Python) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.61-8.62 | |
| CVE-2025-66418 | PeopleSoft Enterprise PeopleTools | Porting (urllib3) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.61-8.62 | |
| CVE-2025-43967 | PeopleSoft Enterprise PeopleTools | XMLPublisher (libheif) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.61-8.62 | |
| CVE-2026-34277 | PeopleSoft Enterprise PeopleTools | Fluid Core | HTTP | No | 6.6 | Network | Low | High | None | Changed | Low | Low | Low | 8.61-8.62 | |
| CVE-2026-34300 | PeopleSoft Enterprise FIN Contracts | Contracts | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed |
High | None | None | 9.2 | |
| CVE-2026-34299 | PeopleSoft Enterprise FIN Maintenance Management | Work Order Management | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed |
High | None | None | 9.2 | |
| CVE-2026-34301 | PeopleSoft Enterprise FIN Maintenance Management | Work Order Management | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed |
High | None | None | 9.2 | |
| CVE-2026-34306 | PeopleSoft Enterprise FIN Project Costing | Projects | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed |
High | None | None | 9.2 | |
| CVE-2026-34266 | PeopleSoft Enterprise HCM Absence Management | Absence Management | HTTP | No | 6.5 | Network | Low | High | None | Un- changed |
High | High | None | 9.2 | |
| CVE-2026-34280 | PeopleSoft Enterprise HCM Human Resources | Job Profile Manager | HTTP | No | 6.5 | Network | Low | High | None | Un- changed |
High | High | None | 9.2 | |
| CVE-2026-34295 | PeopleSoft Enterprise SCM Purchasing | Purchasing | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed |
High | None | None | 9.2 | |
| CVE-2025-14017 | PeopleSoft Enterprise PeopleTools | File Processing (libcurl) | None | No | 6.3 | Local | High | None | Required | Un- changed |
High | High | None | 8.61-8.62 | |
| CVE-2026-34269 | PeopleSoft Enterprise PeopleTools | Portal | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 8.61-8.62 | |
| CVE-2026-35241 | PeopleSoft Enterprise CS Student Records | Research Tracking | HTTP | No | 5.7 | Network | Low | Low | Required | Un- changed |
High | None | None | 9.2 | |
| CVE-2026-22006 | PeopleSoft Enterprise HCM Human Resources | Employee Snapshot | HTTP | No | 5.4 | Network | Low | Low | Required | Changed | Low | Low | None | 9.2 | |
| CVE-2026-22019 | PeopleSoft Enterprise HCM Shared Components | Person Search | HTTP | No | 5.4 | Network | Low | Low | Required | Changed | Low | Low | None | 9.2 | |
| CVE-2026-34307 | PeopleSoft Enterprise PeopleTools | Workflow | HTTP | No | 5.4 | Network | Low | Low | Required | Changed | Low | Low | None | 8.61-8.62 | |
| CVE-2025-68161 | PeopleSoft Enterprise PeopleTools | OpenSearch (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 8.61-8.62 | |
This Critical Patch Update contains 15 new security patches for Oracle Retail Applications. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
| CVE ID | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
| CVE-2025-7962 | Oracle Retail Xstore Point of Service | Point of Sale (Jakarta Mail) | SMTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 21.0.5, 22.0.3 | |
| CVE-2025-48924 | Oracle Retail Assortment Planning | Application Core (Apache Commons Lang) | TCP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | None | Low | 15.0, 16.0 | |
| CVE-2025-48924 | Oracle Retail Warehouse Management System | Security (Apache Commons Lang) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | None | Low | 16.0 | |
| CVE-2025-68161 | Oracle Retail Assortment Planning | Application Core (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 15.0, 16.0 | |
| CVE-2025-68161 | Oracle Retail Bulk Data Integration | BDI Job Scheduler (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 16.0.3, 19.0.1 | |
| CVE-2025-68161 | Oracle Retail EFTLink | Core/Plugin (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 21.0.0-25.0.0 | |
| CVE-2025-68161 | Oracle Retail Extract Tranform and Load | Mathematical Operators (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 13.0.5 | |
| CVE-2025-68161 | Oracle Retail Financial Integration | PeopleSoft Integration (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 16.0.3, 19.0.1 | |
| CVE-2025-68161 | Oracle Retail Fiscal Management | NF Issuing (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 14.2 | |
| CVE-2025-68161 | Oracle Retail Integration Bus | RIB Kernal (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 16.0.3, 19.0.1 | |
| CVE-2025-68161 | Oracle Retail Merchandise Financial Planning | Application Core (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 15.0, 16.0 | |
| CVE-2025-68161 | Oracle Retail Merchandising System | Security (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 16.0.3, 19.0.1 | |
| CVE-2025-68161 | Oracle Retail Predictive Application Server | RPAS Fusion Client (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 16.0.3 | |
| CVE-2025-68161 | Oracle Retail Price Management | Security (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 16.0.3 | |
| CVE-2025-68161 | Oracle Retail Service Backbone | RSB Installation (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 16.0.3, 19.0.1 | |
This Critical Patch Update contains 14 new security patches for Oracle Siebel CRM. 13 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
| CVE ID | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
| CVE-2025-13601 | Siebel CRM Cloud Applications | Siebel Cloud Manager (glib) | None | No | 7.7 | Local | Low | None | None | Un- changed |
None | High | High | 17.0-26.2 | |
| CVE-2022-45688 | Siebel CRM Administration | Data Archival (Quartz) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 17.0-25.11 | |
| CVE-2025-69223 | Siebel CRM Cloud Applications | Siebel Cloud Manager (AIOHTTP) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 17.0-26.2 | |
| CVE-2025-8869 | Siebel CRM Cloud Applications | Siebel Cloud Manager (pip) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 17.0-26.2 | |
| CVE-2025-58057 | Siebel CRM Deployment | Keyword Automation (Netty) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 17.0-26.2 | |
| CVE-2023-26464 | Siebel CRM Deployment | Server Infrastructure (Apache Log4j) | TLS | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 17.0-25.11 | |
| CVE-2025-7962 | Siebel CRM End User | Communications Panel/Dashboard (Jakarta Mail) | SMTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 17.0-25.11 | |
| CVE-2024-29371 | Siebel CRM Integration | Event Publish and Subscribe (jose4j) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 17.0-26.2 | |
| CVE-2023-1436 | Siebel CRM Integration | REST (Jettison) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 17.0-26.2 | |
| CVE-2025-27817 | Siebel CRM Integration | Event Publish and Subscribe (Apache Kafka) | TCP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 17.0-26.2 | |
| CVE-2025-48924 | Siebel CRM Deployment | Keyword Automation (Apache Commons Lang) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | None | Low | 17.0-26.2 | |
| CVE-2024-36124 | Siebel CRM Integration | Open Integration (Snappy) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | None | Low | 17.0-26.1 | |
| CVE-2025-68161 | Siebel CRM Development | Siebel Approval Manager (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 17.0-26.2 | |
| CVE-2025-68161 | Siebel CRM Integration | EAI (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 17.0-26.2 | |
This Critical Patch Update contains 4 new security patches for Oracle Supply Chain. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
| CVE ID | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
| CVE-2025-9900 | Oracle AutoVue | Security (LibTIFF) | HTTP | Yes | 8.8 | Network | Low | None | Required | Un- changed |
High | High | High | 21.1.0 | See Note 1 |
| CVE-2026-22801 | Oracle AutoVue | Security (libpng) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 21.1.0 | See Note 1 |
| CVE-2025-68161 | Oracle Product Lifecycle Analytics | Installation Issues (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 3.6.1 | |
| CVE-2026-34296 | Oracle Agile Product Lifecycle Management for Process | Product Quality Management | HTTP | No | 4.3 | Network | Low | Low | None | Un- changed |
Low | None | None | 6.2.4 | |
This Critical Patch Update contains 2 new security patches for Oracle Systems. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
| CVE ID | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
| CVE-2024-6387 | Sun ZFS Storage Appliance Kit | Firmware subsystem (OpenSSH) | HTTPS | Yes | 9.0 | Network | High | None | None | Changed | High | High | High | 8.8 | |
| CVE-2026-34281 | Oracle Solaris | Kernel | None | No | 6.5 | Local | Low | Low | None | Changed | None | None | High | 11.4 | |
This Critical Patch Update contains 7 new security patches, plus additional third party patches noted below, for Oracle Utilities Applications. 6 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
| CVE ID | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
| CVE-2025-53643 | Oracle Utilities Live Energy Connect | Python Scripting (AIOHTTP) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 7.1.0.0.45, 25.12.0.0.0 | |
| CVE-2025-66418 | Oracle Utilities Network Management System | System Wide (urllib3) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 2.5.0.1.16, 2.5.0.2.10, 2.6.0.1.10, 2.6.0.2.6 | |
| CVE-2026-24734 | Oracle Utilities Testing Accelerator | Tools (Apache Tomcat) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 7.0.0.0.7, 7.0.0.1.5, 25.4.0.0.2 | |
| CVE-2020-17521 | Oracle Utilities Application Framework | Security (Apache Groovy) | None | No | 5.5 | Local | Low | Low | None | Un- changed |
High | None | None | 4.3.0.5.0-4.3.0.6.0, 4.4.0.0.0-4.4.0.3.0 | |
| CVE-2025-48924 | Oracle Utilities Testing Accelerator | Tools (Apache Commons Lang) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | None | Low | 7.0.0.0.7, 7.0.0.1.5, 25.4.0.0.2 | |
| CVE-2025-68161 | Oracle Utilities Application Framework | Security (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 4.3.0.5.0-4.3.0.6.0, 4.4.0.0.0-4.4.0.4.0, 4.5.0.0.0-4.5.0.2.0, 25.4, 25.10, 26.4 | |
| CVE-2025-68161 | Oracle Utilities Testing Accelerator | Tools (Apache Log4j) | TLS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 7.0.0.0.7, 7.0.0.1.5, 25.4.0.0.2 | |
This Critical Patch Update contains 9 new security patches for Oracle Virtualization. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
| CVE ID | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
| CVE-2026-35242 | Oracle VM VirtualBox | Core | None | No | 7.5 | Local | High | High | None | Changed | High | High | High | 7.2.6 | |
| CVE-2026-35246 | Oracle VM VirtualBox | Core | None | No | 7.5 | Local | High | High | None | Changed | High | High | High | 7.2.6 | |
| CVE-2026-35251 | Oracle VM VirtualBox | Core | None | No | 7.5 | Local | High | High | None | Changed | High | High | High | 7.2.6 | |
| CVE-2026-35230 | Oracle VM VirtualBox | Core | None | No | 7.5 | Local | High | High | None | Changed | High | High | High | 7.2.6 | |
| CVE-2026-35245 | Oracle VM VirtualBox | Core | RDP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 7.2.6 | |
| CVE-2026-35247 | Oracle VM VirtualBox | Core | None | No | 6.0 | Local | Low | High | None | Changed | High | None | None | 7.2.6 | |
| CVE-2026-35248 | Oracle VM VirtualBox | Core | None | No | 5.0 | Local | High | High | None | Changed | Low | Low | Low | 7.2.6 | |
| CVE-2026-35249 | Oracle VM VirtualBox | Core | None | No | 3.2 | Local | Low | High | None | Changed | None | Low | None | 7.2.6 | |
| CVE-2026-35250 | Oracle VM VirtualBox | Core | None | No | 2.3 | Local | Low | High | None | Un- changed |
None | None | Low | 7.2.6 | |