Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
zfs_storage_appliance_kit Vendor: oracle

About This Product

zfs_storage_appliance_kit is a software product developed by oracle, a major technology provider with a global presence in enterprise and consumer markets. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 117 known vulnerabilities affecting oracle zfs_storage_appliance_kit. This includes 17 critical-severity issues and 47 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2019 to 2025, indicating a sustained research interest and ongoing security attention. 44 medium-severity issues and 9 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2018-20781 2019-02-12 2024-11-21 7.8 2.1 Unknown
CVE-2019-12387 2019-06-10 2024-11-25 6.1 4.3 Likely
CVE-2019-13038 2019-06-29 2024-11-21 6.1 4.3 Likely
CVE-2019-13057 2019-07-26 2024-11-21 4.9 3.5 Unknown
CVE-2019-13565 2019-07-26 2024-11-21 7.5 5.0 Likely
CVE-2019-16056 2019-09-06 2024-11-21 7.5 5.0 Likely
CVE-2019-10219 2019-11-08 2025-07-07 6.1 4.3 Likely
CVE-2019-11135 2019-11-14 2024-11-21 6.5 2.1 Unknown
CVE-2019-14822 2019-11-25 2024-11-21 7.1 3.6 Unknown
CVE-2020-7044 2020-01-16 2024-11-21 7.5 5.0 Likely
CVE-2020-9327 2020-02-21 2024-11-21 7.5 5.0 Likely
CVE-2020-10108 2020-03-12 2024-11-25 9.8 7.5 Likely
CVE-2020-1934 2020-04-01 2024-11-21 5.3 5.0 Likely
CVE-2020-1927 2020-04-02 2024-11-21 6.1 5.8 Likely
CVE-2020-11655 2020-04-09 2024-11-21 7.5 5.0 Likely
CVE-2020-11656 2020-04-09 2024-11-21 9.8 7.5 Likely
CVE-2020-12243 2020-04-28 2024-11-21 7.5 5.0 Likely
CVE-2020-13630 2020-05-27 2024-11-21 7.0 4.4 Unknown
CVE-2020-13631 2020-05-27 2024-11-21 5.5 2.1 Unknown
CVE-2020-13632 2020-05-27 2024-11-21 5.5 2.1 Unknown
CVE-2020-13254 2020-06-03 2024-11-21 5.9 4.3 Likely
CVE-2020-13596 2020-06-03 2024-11-21 6.1 4.3 Likely
CVE-2020-13871 2020-06-06 2024-11-21 7.5 5.0 Likely
CVE-2020-15025 2020-06-24 2024-11-21 4.4 4.0 Likely
CVE-2019-20892 2020-06-25 2024-11-21 6.5 4.0 Likely
CVE-2019-20907 2020-07-13 2024-11-21 7.5 5.0 Likely
CVE-2020-11984 2020-08-07 2024-11-21 9.8 7.5 Likely
CVE-2020-11993 2020-08-07 2025-05-01 7.5 4.3 Likely
CVE-2020-9490 2020-08-07 2024-11-21 7.5 5.0 Likely
CVE-2020-17498 2020-08-13 2024-11-21 6.5 4.3 Likely
CVE-2020-1472 2020-08-17 2026-02-23 5.5 9.3 Likely
CVE-2020-24583 2020-09-01 2024-11-21 7.5 5.0 Likely
CVE-2020-24584 2020-09-01 2024-11-21 7.5 5.0 Likely
CVE-2020-26116 2020-09-27 2024-11-21 7.2 6.4 Likely
CVE-2020-26137 2020-09-30 2024-11-21 6.5 6.4 Likely
CVE-2020-25866 2020-10-06 2024-11-21 7.5 5.0 Likely
CVE-2020-27783 2020-12-03 2025-12-17 6.1 4.3 Likely
CVE-2020-29651 2020-12-09 2025-11-03 7.5 5.0 Likely
CVE-2020-26418 2020-12-11 2024-11-21 3.1 5.0 Likely
CVE-2020-26419 2020-12-11 2024-11-21 3.1 5.0 Likely
CVE-2020-26420 2020-12-11 2024-11-21 3.1 5.0 Likely
CVE-2020-26421 2020-12-11 2024-11-21 4.2 5.0 Likely
CVE-2020-26422 2020-12-21 2024-11-21 3.7 5.0 Likely
CVE-2021-3177 2021-01-19 2025-12-18 9.8 7.5 Likely
CVE-2021-23839 2021-02-16 2024-11-21 3.7 4.3 Likely
CVE-2021-23841 2021-02-16 2024-11-21 5.9 4.3 Likely
CVE-2021-28957 2021-03-21 2025-12-17 6.1 4.3 Likely
CVE-2021-20227 2021-03-23 2024-11-21 5.5 2.1 Unknown
CVE-2021-3449 2021-03-25 2024-11-21 5.9 4.3 Likely
CVE-2021-22207 2021-04-23 2024-11-21 5.5 5.0 Likely
CVE-2021-29921 2021-05-06 2025-11-03 9.8 7.5 Likely
CVE-2021-3517 2021-05-19 2025-12-02 8.6 7.5 Likely
CVE-2021-3426 2021-05-20 2025-12-18 5.7 2.7 Unknown
CVE-2021-3516 2021-06-01 2024-11-21 7.8 6.8 Likely
CVE-2021-3520 2021-06-02 2024-11-21 9.8 7.5 Likely
CVE-2021-22222 2021-06-07 2024-11-21 7.5 5.0 Likely
CVE-2019-17567 2021-06-10 2024-11-21 5.3 5.0 Likely
CVE-2020-13950 2021-06-10 2024-11-21 7.5 5.0 Likely
CVE-2020-35452 2021-06-10 2024-11-21 7.3 6.8 Likely
CVE-2021-26690 2021-06-10 2024-11-21 7.5 5.0 Likely
CVE-2021-26691 2021-06-10 2024-11-21 9.8 7.5 Likely
CVE-2021-30641 2021-06-10 2024-11-21 5.3 5.0 Likely
CVE-2021-31618 2021-06-15 2024-11-21 7.5 5.0 Likely
CVE-2021-33503 2021-06-29 2024-11-21 7.5 5.0 Likely
CVE-2021-3541 2021-07-09 2024-11-21 6.5 4.0 Likely
CVE-2021-33193 2021-08-16 2025-05-01 7.5 5.0 Likely
CVE-2021-36690 2021-08-24 2025-11-03 7.5 5.0 Likely
CVE-2021-3711 2021-08-24 2024-11-21 9.8 7.5 Likely
CVE-2021-3712 2021-08-24 2024-11-21 7.4 5.8 Likely
CVE-2021-34798 2021-09-16 2024-11-21 7.5 5.0 Likely
CVE-2021-36160 2021-09-16 2025-05-01 7.5 5.0 Likely
CVE-2021-39275 2021-09-16 2025-05-01 9.8 7.5 Likely
CVE-2021-40438 2021-09-16 2025-10-27 9.0 6.8 Likely
CVE-2021-41617 2021-09-26 2024-11-21 7.0 4.4 Unknown
CVE-2021-25219 2021-10-27 2024-11-21 5.3 5.0 Likely
CVE-2021-42717 2021-12-07 2025-07-03 7.5 5.0 Likely
CVE-2021-43818 2021-12-13 2024-11-21 8.2 6.8 Likely
CVE-2021-44790 2021-12-20 2025-05-01 9.8 7.5 Likely
CVE-2021-4181 2021-12-30 2025-11-03 7.5 5.0 Likely
CVE-2021-4182 2021-12-30 2025-11-03 7.5 5.0 Likely
CVE-2021-4183 2021-12-30 2024-11-21 5.5 4.3 Likely
CVE-2021-4184 2021-12-30 2025-11-03 7.5 5.0 Likely
CVE-2021-4185 2021-12-30 2025-11-03 7.5 5.0 Likely
CVE-2022-21271 2022-01-19 2024-11-21 5.3 5.0 Likely
CVE-2022-21375 2022-01-19 2024-11-21 5.5 4.9 Unknown
CVE-2021-4034 2022-01-28 2025-11-06 7.8 7.2 Unknown
CVE-2022-0391 2022-02-09 2025-12-17 7.5 5.0 Likely
CVE-2022-25235 2022-02-16 2025-05-05 9.8 7.5 Likely
CVE-2022-25236 2022-02-16 2025-05-05 9.8 7.5 Likely
CVE-2022-25313 2022-02-18 2025-05-30 6.5 4.3 Likely
CVE-2022-25314 2022-02-18 2025-05-05 7.5 5.0 Likely
CVE-2022-25315 2022-02-18 2025-05-05 9.8 7.5 Likely
CVE-2021-4115 2022-02-21 2024-11-21 5.5 2.1 Unknown
CVE-2022-23308 2022-02-26 2025-05-05 7.5 4.3 Likely
CVE-2022-21716 2022-03-03 2024-11-25 7.5 5.0 Likely
CVE-2022-22719 2022-03-14 2024-11-21 7.5 5.0 Likely
CVE-2022-22720 2022-03-14 2024-11-21 9.8 7.5 Likely
CVE-2022-22721 2022-03-14 2024-11-21 9.1 5.8 Likely
CVE-2022-23943 2022-03-14 2025-05-01 9.8 7.5 Likely
CVE-2022-24801 2022-04-04 2024-11-25 8.1 6.8 Likely
CVE-2022-29824 2022-05-03 2024-11-21 6.5 4.3 Likely
CVE-2022-21513 2022-07-19 2024-11-21 8.2 - -
CVE-2022-21563 2022-07-19 2024-11-21 3.4 - -
CVE-2024-20914 2024-01-16 2025-06-03 2.3 - -
CVE-2024-20959 2024-01-16 2025-06-03 4.4 - -
CVE-2023-21833 2024-02-17 2025-03-27 4.3 - -
CVE-2024-21104 2024-04-16 2024-12-06 6.5 - -
CVE-2024-21155 2024-07-16 2024-12-05 4.7 - -
CVE-2025-53046 2025-10-21 2025-10-23 4.9 - -
CVE-2025-62289 2025-10-21 2025-10-23 4.9 - -
CVE-2025-62290 2025-10-21 2025-10-23 7.2 - -
CVE-2025-62475 2025-10-21 2025-10-23 4.9 - -
CVE-2025-62476 2025-10-21 2025-10-23 4.9 - -
CVE-2025-62477 2025-10-21 2025-10-23 4.9 - -
CVE-2025-62478 2025-10-21 2025-10-23 4.9 - -
CVE-2025-62479 2025-10-21 2025-10-23 2.7 - -
CVE-2025-62480 2025-10-21 2025-10-23 2.7 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for oracle zfs_storage_appliance_kit by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.