Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
peoplesoft_products Vendor: oracle

About This Product

peoplesoft_products is a software product developed by oracle, a major technology provider with a global presence in enterprise and consumer markets. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 158 known vulnerabilities affecting oracle peoplesoft_products. The vulnerability profile ranges across medium and low-severity classifications. Vulnerabilities in this product have been disclosed spanning from 2011 to 2020, indicating a sustained research interest and ongoing security attention. 131 medium-severity issues and 27 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2011-2250 2011-07-20 2025-04-11 - 5.5 Likely
CVE-2011-2272 2011-07-21 2025-04-11 - 5.5 Likely
CVE-2011-2274 2011-07-21 2025-04-11 - 3.5 Unknown
CVE-2011-2275 2011-07-21 2025-04-11 - 4.3 Likely
CVE-2011-2277 2011-07-21 2025-04-11 - 5.5 Likely
CVE-2011-2278 2011-07-21 2025-04-11 - 4.0 Likely
CVE-2011-2279 2011-07-21 2025-04-11 - 5.5 Likely
CVE-2011-2280 2011-07-21 2025-04-11 - 4.0 Likely
CVE-2011-2281 2011-07-21 2025-04-11 - 5.5 Likely
CVE-2011-2282 2011-07-21 2025-04-11 - 3.5 Unknown
CVE-2011-2283 2011-07-21 2025-04-11 - 5.5 Likely
CVE-2011-2284 2011-07-21 2025-04-11 - 4.0 Likely
CVE-2011-3520 2011-10-18 2025-04-11 - 2.8 Unknown
CVE-2011-3527 2011-10-18 2025-04-11 - 5.5 Likely
CVE-2011-3528 2011-10-18 2025-04-11 - 5.5 Likely
CVE-2011-3529 2011-10-18 2025-04-11 - 4.0 Likely
CVE-2011-3530 2011-10-18 2025-04-11 - 4.0 Likely
CVE-2011-3533 2011-10-18 2025-04-11 - 5.5 Likely
CVE-2012-0074 2012-01-18 2025-04-11 - 4.0 Likely
CVE-2012-0076 2012-01-18 2025-04-11 - 4.0 Likely
CVE-2012-0080 2012-01-18 2025-04-11 - 5.5 Likely
CVE-2012-0088 2012-01-18 2025-04-11 - 4.0 Likely
CVE-2012-0089 2012-01-18 2025-04-11 - 4.0 Likely
CVE-2012-0091 2012-01-18 2025-04-11 - 2.7 Unknown
CVE-2012-0514 2012-05-03 2025-04-11 - 4.0 Likely
CVE-2012-0517 2012-05-03 2025-04-11 - 5.5 Likely
CVE-2012-0521 2012-05-03 2025-04-11 - 4.0 Likely
CVE-2012-0524 2012-05-03 2025-04-11 - 3.2 Unknown
CVE-2012-0529 2012-05-03 2025-04-11 - 3.5 Unknown
CVE-2012-0530 2012-05-03 2025-04-11 - 4.0 Likely
CVE-2012-0531 2012-05-03 2025-04-11 - 3.5 Unknown
CVE-2012-0533 2012-05-03 2025-04-11 - 4.0 Likely
CVE-2012-0536 2012-05-03 2025-04-11 - 4.0 Likely
CVE-2012-0538 2012-05-03 2025-04-11 - 5.5 Likely
CVE-2012-0559 2012-05-03 2025-04-11 - 4.0 Likely
CVE-2012-0560 2012-05-03 2025-04-11 - 4.3 Likely
CVE-2012-0561 2012-05-03 2025-04-11 - 3.5 Unknown
CVE-2012-0562 2012-05-03 2025-04-11 - 4.0 Likely
CVE-2012-0564 2012-05-03 2025-04-11 - 6.5 Likely
CVE-2012-1733 2012-07-17 2025-04-11 - 3.5 Unknown
CVE-2012-1748 2012-07-17 2025-04-11 - 4.0 Likely
CVE-2012-1753 2012-07-17 2025-04-11 - 5.4 Unknown
CVE-2012-1762 2012-07-17 2025-04-11 - 3.5 Unknown
CVE-2012-1764 2012-07-17 2025-04-11 - 3.5 Unknown
CVE-2012-3111 2012-07-17 2025-04-11 - 3.5 Unknown
CVE-2012-3113 2012-07-17 2025-04-11 - 5.5 Likely
CVE-2012-3118 2012-07-17 2025-04-11 - 4.0 Likely
CVE-2012-3119 2012-07-17 2025-04-11 - 4.0 Likely
CVE-2012-3176 2012-10-17 2025-04-11 - 3.5 Unknown
CVE-2012-3179 2012-10-17 2025-04-11 - 3.5 Unknown
CVE-2012-3181 2012-10-17 2025-04-11 - 4.0 Likely
CVE-2012-3182 2012-10-17 2025-04-11 - 4.3 Likely
CVE-2012-3188 2012-10-17 2025-04-11 - 3.5 Unknown
CVE-2012-3191 2012-10-17 2025-04-11 - 2.1 Unknown
CVE-2012-3195 2012-10-17 2025-04-11 - 4.0 Likely
CVE-2012-3198 2012-10-17 2025-04-11 - 4.0 Likely
CVE-2012-3201 2012-10-17 2025-04-11 - 4.0 Likely
CVE-2012-1755 2013-01-17 2025-04-11 - 4.3 Likely
CVE-2012-3192 2013-01-17 2025-04-11 - 3.5 Unknown
CVE-2012-5059 2013-01-17 2025-04-11 - 4.3 Likely
CVE-2013-0356 2013-01-17 2025-04-11 - 4.3 Likely
CVE-2013-0357 2013-01-17 2025-04-11 - 4.3 Likely
CVE-2013-0369 2013-01-17 2025-04-11 - 5.5 Likely
CVE-2013-0387 2013-01-17 2025-04-11 - 4.3 Unknown
CVE-2013-0388 2013-01-17 2025-04-11 - 4.3 Likely
CVE-2013-0391 2013-01-17 2025-04-11 - 5.5 Likely
CVE-2013-0392 2013-01-17 2025-04-11 - 4.3 Likely
CVE-2013-0394 2013-01-17 2025-04-11 - 5.0 Likely
CVE-2013-0395 2013-01-17 2025-04-11 - 4.0 Likely
CVE-2013-1513 2013-04-17 2025-04-11 - 4.3 Likely
CVE-2013-1527 2013-04-17 2025-04-11 - 4.0 Likely
CVE-2013-1550 2013-04-17 2025-04-11 - 4.3 Likely
CVE-2013-2374 2013-04-17 2025-04-11 - 4.0 Likely
CVE-2013-2401 2013-04-17 2025-04-11 - 3.5 Unknown
CVE-2013-2402 2013-04-17 2025-04-11 - 4.3 Likely
CVE-2013-2404 2013-04-17 2025-04-11 - 4.3 Likely
CVE-2013-2408 2013-04-17 2025-04-11 - 4.3 Likely
CVE-2013-2410 2013-04-17 2025-04-11 - 4.0 Likely
CVE-2013-3761 2013-07-17 2025-04-11 - 4.3 Likely
CVE-2013-3768 2013-07-17 2025-04-11 - 4.3 Likely
CVE-2013-3780 2013-07-17 2025-04-11 - 4.0 Likely
CVE-2013-3784 2013-07-17 2025-04-11 - 5.5 Likely
CVE-2013-3800 2013-07-17 2025-04-11 - 6.4 Likely
CVE-2013-3818 2013-07-17 2025-04-11 - 4.3 Likely
CVE-2013-3819 2013-07-17 2025-04-11 - 6.4 Likely
CVE-2013-3820 2013-07-17 2025-04-11 - 5.0 Likely
CVE-2013-3821 2013-07-17 2025-04-11 - 6.4 Likely
CVE-2013-3785 2013-10-16 2025-04-11 - 4.0 Likely
CVE-2013-3835 2013-10-16 2025-04-11 - 5.0 Likely
CVE-2013-5765 2013-10-16 2025-04-11 - 5.0 Likely
CVE-2013-5779 2013-10-16 2025-04-11 - 4.0 Likely
CVE-2013-5794 2013-10-16 2025-04-11 - 5.0 Likely
CVE-2013-5836 2013-10-16 2025-04-11 - 5.0 Likely
CVE-2013-5841 2013-10-16 2025-04-11 - 5.0 Likely
CVE-2013-5847 2013-10-16 2025-04-11 - 4.0 Likely
CVE-2013-5909 2014-01-15 2025-04-11 - 4.9 Unknown
CVE-2014-0380 2014-01-15 2025-04-11 - 4.3 Likely
CVE-2014-0381 2014-01-15 2025-04-11 - 2.6 Unknown
CVE-2014-0388 2014-01-15 2025-04-11 - 4.0 Likely
CVE-2014-0392 2014-01-15 2025-04-11 - 4.0 Likely
CVE-2014-0394 2014-01-15 2025-04-11 - 5.0 Likely
CVE-2014-0395 2014-01-15 2025-04-11 - 5.0 Likely
CVE-2014-0396 2014-01-15 2025-04-11 - 5.0 Likely
CVE-2014-0425 2014-01-15 2025-04-11 - 4.0 Likely
CVE-2014-0438 2014-01-15 2025-04-11 - 4.0 Likely
CVE-2014-0439 2014-01-15 2025-04-11 - 4.0 Likely
CVE-2014-0440 2014-01-15 2025-04-11 - 4.0 Likely
CVE-2014-0441 2014-01-15 2025-04-11 - 5.0 Likely
CVE-2014-0443 2014-01-15 2025-04-11 - 5.0 Likely
CVE-2014-0445 2014-01-15 2025-04-11 - 4.3 Likely
CVE-2013-5873 2014-01-15 2025-04-11 - 5.0 Likely
CVE-2013-5886 2014-01-15 2025-04-11 - 4.3 Likely
CVE-2014-2429 2014-04-16 2025-04-12 - 4.0 Likely
CVE-2014-2433 2014-04-16 2025-04-12 - 5.0 Likely
CVE-2014-2437 2014-04-16 2025-04-12 - 5.0 Likely
CVE-2014-2443 2014-04-16 2025-04-12 - 4.3 Likely
CVE-2014-2446 2014-04-16 2025-04-12 - 4.0 Likely
CVE-2014-2447 2014-04-16 2025-04-12 - 5.0 Likely
CVE-2014-2448 2014-04-16 2025-04-12 - 5.0 Likely
CVE-2014-2449 2014-04-16 2025-04-12 - 4.0 Likely
CVE-2014-2456 2014-07-17 2025-04-12 - 5.5 Likely
CVE-2014-2495 2014-07-17 2025-04-12 - 2.3 Unknown
CVE-2014-2496 2014-07-17 2025-04-12 - 5.5 Likely
CVE-2014-4204 2014-07-17 2025-04-12 - 3.5 Unknown
CVE-2014-4226 2014-07-17 2025-04-12 - 5.1 Unknown
CVE-2014-6460 2014-10-15 2025-04-12 - 4.9 Unknown
CVE-2014-6475 2014-10-15 2025-04-12 - 3.5 Unknown
CVE-2014-6482 2014-10-15 2025-04-12 - 4.0 Likely
CVE-2014-6486 2014-10-15 2025-04-12 - 4.0 Likely
CVE-2014-6535 2014-10-15 2025-04-12 - 5.8 Likely
CVE-2014-4279 2015-01-21 2025-04-12 - 3.5 Unknown
CVE-2014-6566 2015-01-21 2025-04-12 - 4.0 Likely
CVE-2014-6579 2015-01-21 2025-04-12 - 4.0 Likely
CVE-2014-6586 2015-01-21 2025-04-12 - 5.5 Likely
CVE-2014-6597 2015-01-21 2025-04-12 - 4.0 Likely
CVE-2015-0379 2015-01-21 2025-04-12 - 4.3 Likely
CVE-2015-0394 2015-01-21 2025-04-12 - 4.0 Likely
CVE-2015-0453 2015-04-16 2025-04-12 - 3.3 Unknown
CVE-2015-0472 2015-04-16 2025-04-12 - 3.5 Unknown
CVE-2015-0485 2015-04-16 2025-04-12 - 3.5 Unknown
CVE-2015-0487 2015-04-16 2025-04-12 - 4.0 Likely
CVE-2015-0496 2015-04-16 2025-04-12 - 4.0 Likely
CVE-2015-0497 2015-04-16 2025-04-12 - 4.3 Likely
CVE-2015-0467 2015-07-16 2025-04-12 - 4.3 Likely
CVE-2015-2588 2015-07-16 2025-04-12 - 4.3 Likely
CVE-2015-2591 2015-07-16 2025-04-12 - 4.0 Likely
CVE-2015-2622 2015-07-16 2025-04-12 - 4.3 Likely
CVE-2015-2650 2015-07-16 2025-04-12 - 4.0 Likely
CVE-2015-4738 2015-07-16 2025-04-12 - 4.0 Likely
CVE-2015-4804 2015-10-21 2025-04-12 - 4.0 Likely
CVE-2015-4818 2015-10-21 2025-04-12 - 5.5 Likely
CVE-2015-4825 2015-10-21 2025-04-12 - 3.5 Unknown
CVE-2015-4828 2015-10-21 2025-04-12 - 4.0 Likely
CVE-2015-4850 2015-10-21 2025-04-12 - 5.5 Likely
CVE-2015-4876 2015-10-21 2025-04-12 - 4.0 Likely
CVE-2015-4887 2015-10-21 2025-04-12 - 6.0 Unknown
CVE-2016-0409 2016-01-21 2025-04-12 - 4.0 Likely
CVE-2020-14587 2020-07-15 2024-11-21 5.4 5.5 Likely

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for oracle peoplesoft_products by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.