{"vulnerability": "CVE-2025-3068", "sightings": [{"uuid": "51d706fe-3457-4b57-b082-9acf5b4d77c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3068", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114274816572476867", "content": "", "creation_timestamp": "2025-04-03T15:48:42.046799Z"}, {"uuid": "1ccd41ae-a5c9-4333-9f3b-a20acfed3221", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3068", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114274816572476867", "content": "", "creation_timestamp": "2025-04-03T15:48:42.054007Z"}, {"uuid": "e11759a2-b012-4b2b-bf37-549f56677041", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30680", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-238/", "content": "", "creation_timestamp": "2025-04-09T03:00:00.000000Z"}, {"uuid": "e21a6014-9653-4aa8-b719-fe7a55650c8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3068", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llsfizcvhi2s", "content": "", "creation_timestamp": "2025-04-02T03:01:20.734577Z"}, {"uuid": "8b694a92-9a57-4289-bf56-f57f48272f4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30682", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12149", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30682\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and  9.0.0-9.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\ud83d\udccf Published: 2025-04-15T20:30:59.091Z\n\ud83d\udccf Modified: 2025-04-16T19:16:43.311Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpuapr2025.html", "creation_timestamp": "2025-04-16T19:56:37.000000Z"}, {"uuid": "042ecd1a-a516-4350-8af3-97195d233bbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3068", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10197", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3068\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Inappropriate implementation in Intents in Google Chrome on Android prior to 135.0.7049.52 allowed a remote attacker to perform privilege escalation via a crafted HTML page. (Chromium security severity: Medium)\n\ud83d\udccf Published: 2025-04-02T00:42:10.660Z\n\ud83d\udccf Modified: 2025-04-03T13:24:13.755Z\n\ud83d\udd17 References:\n1. https://chromereleases.googleblog.com/2025/04/stable-channel-update-for-desktop.html\n2. https://issues.chromium.org/issues/401823929", "creation_timestamp": "2025-04-03T13:34:40.000000Z"}, {"uuid": "8b1ba831-bc3f-40e5-8bd8-9b660732ee0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30681", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12056", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30681\n\ud83d\udd25 CVSS Score: 2.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication).  Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and  9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.7 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L).\n\ud83d\udccf Published: 2025-04-15T20:30:58.728Z\n\ud83d\udccf Modified: 2025-04-16T14:50:58.729Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpuapr2025.html", "creation_timestamp": "2025-04-16T14:56:24.000000Z"}, {"uuid": "4d60f75f-da3c-45d6-a4b9-b1f063250bc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3068", "type": "seen", "source": "https://www.thezdi.com/blog/2025/4/8/the-april-2025-security-update-review", "content": "", "creation_timestamp": "2025-04-08T16:14:25.000000Z"}, {"uuid": "6b025a80-eea2-4f9a-9611-8134d51f8432", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30683", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12152", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30683\n\ud83d\udd25 CVSS Score: 4.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication).  Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and  9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\ud83d\udccf Published: 2025-04-15T20:30:59.435Z\n\ud83d\udccf Modified: 2025-04-16T19:03:43.431Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpuapr2025.html", "creation_timestamp": "2025-04-16T19:56:41.000000Z"}, {"uuid": "69f9e509-a5e6-4d0a-af76-bad3436cd251", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3068", "type": "seen", "source": "https://t.me/cvedetector/21831", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3068 - Google Chrome Android Intents Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3068 \nPublished : April 2, 2025, 1:15 a.m. | 32\u00a0minutes ago \nDescription : Inappropriate implementation in Intents in Google Chrome on Android prior to 135.0.7049.52 allowed a remote attacker to perform privilege escalation via a crafted HTML page. (Chromium security severity: Medium) \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-02T04:06:57.000000Z"}]}