{"vulnerability": "CVE-2025-3069", "sightings": [{"uuid": "0f617a0d-0961-40c1-b504-d572c567c44a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30693", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mcctlvwwni23", "content": "", "creation_timestamp": "2026-01-13T15:10:19.507391Z"}, {"uuid": "6e66407f-7453-4a62-bda4-33dbe8d8c39c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3069", "type": "seen", "source": "https://www.thezdi.com/blog/2025/4/8/the-april-2025-security-update-review", "content": "", "creation_timestamp": "2025-04-08T16:14:25.000000Z"}, {"uuid": "3d078b22-7b32-4381-bcb1-ea9da21d7c70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3069", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llsfiz3qxk2e", "content": "", "creation_timestamp": "2025-04-02T03:01:19.427104Z"}, {"uuid": "605d7991-6db4-46d6-b7a8-6bf4cbc7f649", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3069", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114274816609774796", "content": "", "creation_timestamp": "2025-04-03T15:48:42.593321Z"}, {"uuid": "868194a1-4c9e-4961-9695-e8cfe6f94b00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3069", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114274816609774796", "content": "", "creation_timestamp": "2025-04-03T15:48:42.590592Z"}, {"uuid": "4f92b6be-65b3-44dc-a82b-eba58e3958f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30698", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lrquo53mdc2e", "content": "", "creation_timestamp": "2025-06-16T20:58:27.446418Z"}, {"uuid": "919629cf-fb1c-484b-9b62-32c84b2d3a2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30691", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lotiff2hm22y", "content": "", "creation_timestamp": "2025-05-10T17:41:14.161926Z"}, {"uuid": "39a1ca36-e810-4274-911c-3581786bf8b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30698", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lotiff2hm22y", "content": "", "creation_timestamp": "2025-05-10T17:41:14.247402Z"}, {"uuid": "a59e538e-e18e-4b58-b8a9-d49c3adfe514", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30691", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3loufha4sjx23", "content": "", "creation_timestamp": "2025-05-11T02:21:13.018827Z"}, {"uuid": "3b2268a7-ec9c-4788-8d54-fe34b7e5d7a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30698", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3loufha4sjx23", "content": "", "creation_timestamp": "2025-05-11T02:21:13.120521Z"}, {"uuid": "086e37f6-daeb-4d55-91d2-82628b651314", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30693", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115888859315910636", "content": "", "creation_timestamp": "2026-01-13T17:00:59.854502Z"}, {"uuid": "d53b6e74-95cd-409d-ad17-78feadf836f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3069", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10198", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3069\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Inappropriate implementation in Extensions in Google Chrome prior to 135.0.7049.52 allowed a remote attacker to perform privilege escalation via a crafted HTML page. (Chromium security severity: Medium)\n\ud83d\udccf Published: 2025-04-02T00:42:10.880Z\n\ud83d\udccf Modified: 2025-04-03T13:23:55.391Z\n\ud83d\udd17 References:\n1. https://chromereleases.googleblog.com/2025/04/stable-channel-update-for-desktop.html\n2. https://issues.chromium.org/issues/40060076", "creation_timestamp": "2025-04-03T13:34:41.000000Z"}, {"uuid": "0d104729-50d6-47ed-a258-e004b71b0e0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30690", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12188", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30690\n\ud83d\udd25 CVSS Score: 7.2 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: Vulnerability in the Oracle Solaris product of Oracle Systems (component: Filesystem).   The supported version that is affected is 11. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Solaris, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle Solaris. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H).\n\ud83d\udccf Published: 2025-04-15T20:31:02.695Z\n\ud83d\udccf Modified: 2025-04-17T03:55:21.461Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpuapr2025.html", "creation_timestamp": "2025-04-17T04:57:29.000000Z"}, {"uuid": "99af04fa-34d2-4654-9e49-7a3f62c92ed0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30691", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12552", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30691\n\ud83d\udd25 CVSS Score: 4.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)\n\ud83d\udd39 Description: Vulnerability in Oracle Java SE (component: Compiler).  Supported versions that are affected are Oracle Java SE: 21.0.6, 24; Oracle GraalVM for JDK: 21.0.6 and  24. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Java SE accessible data as well as  unauthorized read access to a subset of Oracle Java SE accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).\n\ud83d\udccf Published: 2025-04-15T20:31:03.084Z\n\ud83d\udccf Modified: 2025-04-19T00:11:10.891Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpuapr2025.html", "creation_timestamp": "2025-04-19T00:59:43.000000Z"}, {"uuid": "6a1d252e-3f98-4015-af79-1f696814d047", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3069", "type": "seen", "source": "https://t.me/cvedetector/21830", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3069 - Google Chrome Extension Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3069 \nPublished : April 2, 2025, 1:15 a.m. | 32\u00a0minutes ago \nDescription : Inappropriate implementation in Extensions in Google Chrome prior to 135.0.7049.52 allowed a remote attacker to perform privilege escalation via a crafted HTML page. (Chromium security severity: Medium) \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-02T04:06:56.000000Z"}]}