{"vulnerability": "CVE-2025-3072", "sightings": [{"uuid": "9c60cf22-989f-4641-9074-e5b17b716398", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3072", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llsfizn7in2h", "content": "", "creation_timestamp": "2025-04-02T03:01:22.652390Z"}, {"uuid": "8de3daf1-4f2b-4f52-be22-a942f1a2ddf3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30727", "type": "seen", "source": "MISP/abd2a650-703d-4a2f-9f73-3051c1672e27", "content": "", "creation_timestamp": "2025-08-09T13:26:57.000000Z"}, {"uuid": "f1587509-4620-46f3-a137-687831cdef70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3072", "type": "seen", "source": "https://www.thezdi.com/blog/2025/4/8/the-april-2025-security-update-review", "content": "", "creation_timestamp": "2025-04-08T16:14:25.000000Z"}, {"uuid": "be15792a-1269-43cd-b41c-1b44161c251b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30727", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114344004369359958", "content": "", "creation_timestamp": "2025-04-15T21:04:03.646565Z"}, {"uuid": "2165caee-29ef-4dbb-b2a9-076242e2673f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30727", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114344414891727066", "content": "", "creation_timestamp": "2025-04-15T22:48:41.650176Z"}, {"uuid": "54c3282a-fd5f-404c-a45f-77d715d604b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30727", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmvd77mrbh2a", "content": "", "creation_timestamp": "2025-04-16T00:23:14.164309Z"}, {"uuid": "d01788b6-42ee-4b82-8273-ddb778bed6e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30722", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mcctlvwwni23", "content": "", "creation_timestamp": "2026-01-13T15:10:19.600077Z"}, {"uuid": "7e1929d1-137a-4458-b998-f1c2a9688d95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30727", "type": "seen", "source": "MISP/abd2a650-703d-4a2f-9f73-3051c1672e27", "content": "", "creation_timestamp": "2025-08-11T18:47:40.000000Z"}, {"uuid": "ed1f65cf-c3d1-428d-9eac-de29e40c067f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30722", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115888859315910636", "content": "", "creation_timestamp": "2026-01-13T17:00:59.952759Z"}, {"uuid": "01310ea0-c6ff-4e9e-b3cc-58280003d604", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30729", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11916", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30729\n\ud83d\udd25 CVSS Score: 5.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L)\n\ud83d\udd39 Description: Vulnerability in the Oracle Communications Order and Service Management product of Oracle Communications Applications (component: Security).  Supported versions that are affected are 7.4.0, 7.4.1 and  7.5.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Order and Service Management.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Communications Order and Service Management accessible data as well as  unauthorized read access to a subset of Oracle Communications Order and Service Management accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Communications Order and Service Management. CVSS 3.1 Base Score 5.5 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L).\n\ud83d\udccf Published: 2025-04-15T20:31:17.675Z\n\ud83d\udccf Modified: 2025-04-15T20:31:17.675Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpuapr2025.html", "creation_timestamp": "2025-04-15T20:55:22.000000Z"}, {"uuid": "f6dfaada-35ef-4c3a-9c6a-d3dfa49f3584", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30727", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11918", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30727\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Vulnerability in the Oracle Scripting product of Oracle E-Business Suite (component: iSurvey Module).  Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Scripting.  Successful attacks of this vulnerability can result in takeover of Oracle Scripting. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).\n\ud83d\udccf Published: 2025-04-15T20:31:16.930Z\n\ud83d\udccf Modified: 2025-04-15T20:31:16.930Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpuapr2025.html", "creation_timestamp": "2025-04-15T20:55:23.000000Z"}, {"uuid": "ffcd6a1d-3812-4c05-8dda-b3ecfce79f39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30728", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11917", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30728\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: Vulnerability in the Oracle Configurator product of Oracle E-Business Suite (component: Core).  Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Configurator.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Configurator accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).\n\ud83d\udccf Published: 2025-04-15T20:31:17.279Z\n\ud83d\udccf Modified: 2025-04-15T20:31:17.279Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpuapr2025.html", "creation_timestamp": "2025-04-15T20:55:22.000000Z"}, {"uuid": "ab8f183c-2870-45da-ba94-7b94c9446183", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3072", "type": "seen", "source": "https://t.me/cvedetector/21834", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3072 - Google Chrome Custom Tabs UI Spoofing Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3072 \nPublished : April 2, 2025, 1:15 a.m. | 32\u00a0minutes ago \nDescription : Inappropriate implementation in Custom Tabs in Google Chrome prior to 135.0.7049.52 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low) \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-02T04:07:02.000000Z"}]}