Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
supply_chain_products_suite Vendor: oracle

About This Product

supply_chain_products_suite is a software product developed by oracle, a major technology provider with a global presence in enterprise and consumer markets. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 97 known vulnerabilities affecting oracle supply_chain_products_suite. This includes 3 high-severity issues requiring prompt remediation. Vulnerabilities in this product have been disclosed spanning from 2010 to 2026, indicating a sustained research interest and ongoing security attention. 69 medium-severity issues and 25 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2010-2371 2010-07-13 2025-04-11 - 1.9 Unknown
CVE-2010-2372 2010-07-13 2025-04-11 - 4.3 Likely
CVE-2010-2417 2010-10-14 2025-04-11 - 4.0 Likely
CVE-2010-3505 2011-01-19 2025-04-11 - 3.5 Unknown
CVE-2010-4429 2011-01-19 2025-04-11 - 3.5 Unknown
CVE-2010-4432 2011-01-19 2025-04-11 - 3.5 Unknown
CVE-2011-0837 2011-04-20 2025-04-11 - 4.3 Likely
CVE-2011-2273 2011-07-21 2025-04-11 - 4.0 Likely
CVE-2011-3532 2011-10-18 2025-04-11 - 5.0 Likely
CVE-2012-0549 2012-05-03 2025-04-11 - 7.5 Likely
CVE-2012-0565 2012-05-03 2025-04-11 - 5.5 Likely
CVE-2012-0566 2012-05-03 2025-04-11 - 4.3 Likely
CVE-2012-0580 2012-05-03 2025-04-11 - 5.0 Likely
CVE-2012-0581 2012-05-03 2025-04-11 - 4.3 Likely
CVE-2012-1758 2012-07-17 2025-04-11 - 4.0 Likely
CVE-2012-1759 2012-07-17 2025-04-11 - 4.0 Likely
CVE-2012-3114 2012-07-17 2025-04-11 - 4.3 Likely
CVE-2012-3116 2012-07-17 2025-04-11 - 1.9 Unknown
CVE-2012-3117 2012-07-17 2025-04-11 - 4.0 Likely
CVE-2012-3140 2012-10-16 2025-04-11 - 5.5 Likely
CVE-2012-3154 2012-10-16 2025-04-11 - 4.0 Likely
CVE-2012-3161 2012-10-16 2025-04-11 - 4.3 Likely
CVE-2012-3200 2012-10-17 2025-04-11 - 4.0 Likely
CVE-2012-5090 2012-10-17 2025-04-11 - 4.0 Likely
CVE-2012-5091 2012-10-17 2025-04-11 - 4.3 Likely
CVE-2012-5092 2012-10-17 2025-04-11 - 5.5 Likely
CVE-2012-5093 2012-10-17 2025-04-11 - 4.3 Likely
CVE-2012-5094 2012-10-17 2025-04-11 - 5.0 Likely
CVE-2013-0370 2013-01-17 2025-04-11 - 2.1 Unknown
CVE-2013-0410 2013-04-17 2025-04-11 - 4.3 Likely
CVE-2013-1536 2013-04-17 2025-04-11 - 4.0 Likely
CVE-2013-2441 2013-04-17 2025-04-11 - 4.0 Likely
CVE-2013-3822 2013-07-17 2025-04-11 - 4.3 Likely
CVE-2013-3823 2013-07-17 2025-04-11 - 4.0 Likely
CVE-2013-3824 2013-07-17 2025-04-11 - 4.0 Likely
CVE-2013-3825 2013-07-17 2025-04-11 - 4.0 Likely
CVE-2013-5799 2013-10-16 2025-04-11 - 4.3 Likely
CVE-2013-5826 2013-10-16 2025-04-11 - 5.0 Likely
CVE-2013-5897 2014-01-15 2025-04-11 - 5.5 Likely
CVE-2014-0371 2014-01-15 2025-04-11 - 3.5 Unknown
CVE-2014-0372 2014-01-15 2025-04-11 - 5.5 Likely
CVE-2014-0379 2014-01-15 2025-04-11 - 4.3 Likely
CVE-2014-0399 2014-01-15 2025-04-11 - 4.0 Likely
CVE-2014-0434 2014-01-15 2025-04-11 - 4.3 Likely
CVE-2014-0435 2014-01-15 2025-04-11 - 4.0 Likely
CVE-2014-0444 2014-01-15 2025-04-11 - 3.5 Unknown
CVE-2013-5795 2014-01-15 2025-04-11 - 5.0 Likely
CVE-2013-5868 2014-01-15 2025-04-11 - 3.5 Unknown
CVE-2013-5871 2014-01-15 2025-04-11 - 3.5 Unknown
CVE-2013-5877 2014-01-15 2025-04-11 - 5.0 Likely
CVE-2013-5880 2014-01-15 2025-04-11 - 5.0 Likely
CVE-2014-2445 2014-04-16 2025-04-12 - 3.5 Unknown
CVE-2014-2457 2014-04-16 2025-04-12 - 4.3 Likely
CVE-2014-2458 2014-04-16 2025-04-12 - 4.3 Likely
CVE-2014-2459 2014-04-16 2025-04-12 - 3.7 Unknown
CVE-2014-2460 2014-04-16 2025-04-12 - 4.0 Likely
CVE-2014-2461 2014-04-16 2025-04-12 - 5.0 Likely
CVE-2014-2464 2014-04-16 2025-04-12 - 3.5 Unknown
CVE-2014-2465 2014-04-16 2025-04-12 - 4.3 Likely
CVE-2014-2466 2014-04-16 2025-04-12 - 2.1 Unknown
CVE-2014-2467 2014-04-16 2025-04-12 - 3.5 Unknown
CVE-2014-2492 2014-07-17 2025-04-12 - 4.3 Likely
CVE-2014-4229 2014-07-17 2025-04-12 - 5.5 Likely
CVE-2014-4234 2014-07-17 2025-04-12 - 5.0 Likely
CVE-2014-6461 2014-10-15 2025-04-12 - 4.9 Unknown
CVE-2014-6498 2014-10-15 2025-04-12 - 5.0 Likely
CVE-2014-6533 2014-10-15 2025-04-12 - 6.8 Likely
CVE-2014-6536 2014-10-15 2025-04-12 - 3.5 Unknown
CVE-2014-6543 2014-10-15 2025-04-12 - 3.6 Unknown
CVE-2014-6574 2015-01-21 2025-04-12 - 4.3 Likely
CVE-2015-0368 2015-01-21 2025-04-12 - 5.0 Likely
CVE-2015-0416 2015-01-21 2025-04-12 - 3.5 Unknown
CVE-2015-0422 2015-01-21 2025-04-12 - 4.0 Likely
CVE-2015-0431 2015-01-21 2025-04-12 - 4.3 Likely
CVE-2015-0435 2015-01-21 2025-04-12 - 6.8 Likely
CVE-2015-0462 2015-04-16 2025-04-12 - 4.0 Likely
CVE-2015-0463 2015-04-16 2025-04-12 - 4.0 Likely
CVE-2015-0464 2015-04-16 2025-04-12 - 5.0 Likely
CVE-2015-0465 2015-04-16 2025-04-12 - 4.0 Likely
CVE-2015-0490 2015-04-16 2025-04-12 - 4.9 Unknown
CVE-2015-2570 2015-04-16 2025-04-12 - 6.5 Likely
CVE-2015-1793 2015-07-09 2025-04-12 6.5 6.4 Likely
CVE-2015-2644 2015-07-16 2025-04-12 - 4.3 Likely
CVE-2015-2657 2015-07-16 2025-04-12 - 4.0 Likely
CVE-2015-2660 2015-07-16 2025-04-12 - 3.6 Unknown
CVE-2015-2663 2015-07-16 2025-04-12 - 7.5 Likely
CVE-2015-4746 2015-07-16 2025-04-12 - 4.0 Likely
CVE-2015-4763 2015-07-16 2025-04-12 - 3.6 Unknown
CVE-2015-4768 2015-07-16 2025-04-12 - 4.0 Likely
CVE-2015-4797 2015-10-21 2025-04-12 - 3.5 Unknown
CVE-2015-4824 2015-10-21 2025-04-12 - 2.1 Unknown
CVE-2015-4847 2015-10-21 2025-04-12 - 4.3 Likely
CVE-2015-4848 2015-10-21 2025-04-12 - 5.0 Likely
CVE-2015-4892 2015-10-21 2025-04-12 - 3.5 Unknown
CVE-2015-4917 2015-10-22 2025-04-12 - 3.5 Unknown
CVE-2015-4924 2016-01-21 2025-04-12 - 3.5 Unknown
CVE-2026-21940 2026-01-20 2026-01-29 7.5 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for oracle supply_chain_products_suite by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.