{"vulnerability": "CVE-2025-3073", "sightings": [{"uuid": "b378e0fb-f795-4b8a-bb57-2798b6514bc1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3073", "type": "seen", "source": "https://bsky.app/profile/cti-news.bsky.social/post/3llx54zf7et2v", "content": "", "creation_timestamp": "2025-04-04T00:14:44.636460Z"}, {"uuid": "9e1bb85a-d58a-412e-88f2-7b9c493a6fa3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3073", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llsfiz7bup2k", "content": "", "creation_timestamp": "2025-04-02T03:01:20.112529Z"}, {"uuid": "9b7182cd-08ac-49f6-b0be-67e9d70cb9db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3073", "type": "seen", "source": "https://www.thezdi.com/blog/2025/4/8/the-april-2025-security-update-review", "content": "", "creation_timestamp": "2025-04-08T16:14:25.000000Z"}, {"uuid": "9a4cccbd-a534-4986-98d2-71b673b128eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30735", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114344414924199047", "content": "", "creation_timestamp": "2025-04-15T22:48:41.968741Z"}, {"uuid": "9a750d45-6a95-4d5f-887d-0c53656baaa9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30735", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmvd77gaiq2q", "content": "", "creation_timestamp": "2025-04-16T00:23:12.859261Z"}, {"uuid": "c12051d6-4629-4491-adf8-6e935680006e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30733", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11912", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30733\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: Vulnerability in the RDBMS Listener component of Oracle Database Server.  Supported versions that are affected are 19.3-19.26, 21.3-21.17 and  23.4-23.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via Oracle Net to compromise RDBMS Listener.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all RDBMS Listener accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N).\n\ud83d\udccf Published: 2025-04-15T20:31:19.398Z\n\ud83d\udccf Modified: 2025-04-15T20:31:19.398Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpuapr2025.html", "creation_timestamp": "2025-04-15T20:55:15.000000Z"}, {"uuid": "3a62ca83-0d0f-4e89-adad-3da6fe4c856c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30735", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11911", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30735\n\ud83d\udd25 CVSS Score: 8.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: Vulnerability in the PeopleSoft Enterprise CC Common Application Objects product of Oracle PeopleSoft (component: Page and Field Configuration).   The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise CC Common Application Objects.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all PeopleSoft Enterprise CC Common Application Objects accessible data as well as  unauthorized access to critical data or complete access to all PeopleSoft Enterprise CC Common Application Objects accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).\n\ud83d\udccf Published: 2025-04-15T20:31:19.752Z\n\ud83d\udccf Modified: 2025-04-15T20:31:19.752Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpuapr2025.html", "creation_timestamp": "2025-04-15T20:55:14.000000Z"}, {"uuid": "9e045ab8-1e7f-4b01-90d9-e31aa1c6f269", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30736", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11910", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30736\n\ud83d\udd25 CVSS Score: 7.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: Vulnerability in the Java VM component of Oracle Database Server.  Supported versions that are affected are 19.3-19.26, 21.3-21.17 and  23.4-23.7. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java VM.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Java VM accessible data as well as  unauthorized access to critical data or complete access to all Java VM accessible data. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).\n\ud83d\udccf Published: 2025-04-15T20:31:20.114Z\n\ud83d\udccf Modified: 2025-04-15T20:31:20.114Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpuapr2025.html", "creation_timestamp": "2025-04-15T20:55:13.000000Z"}, {"uuid": "e1bfd180-b9e7-4c5d-bf1f-59c835566ba8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30732", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11913", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30732\n\ud83d\udd25 CVSS Score: 6.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: Vulnerability in the Oracle Application Object Library product of Oracle E-Business Suite (component: Core).  Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Object Library.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Object Library, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Application Object Library accessible data as well as  unauthorized read access to a subset of Oracle Application Object Library accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).\n\ud83d\udccf Published: 2025-04-15T20:31:19.003Z\n\ud83d\udccf Modified: 2025-04-15T20:31:19.003Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpuapr2025.html", "creation_timestamp": "2025-04-15T20:55:16.000000Z"}, {"uuid": "2c3c1cdd-b161-4fe6-bfde-1aac1bcc134f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30730", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11915", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30730\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: Vulnerability in the Oracle Application Object Library product of Oracle E-Business Suite (component: Core).  Supported versions that are affected are 12.2.5-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Object Library.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Application Object Library. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).\n\ud83d\udccf Published: 2025-04-15T20:31:18.149Z\n\ud83d\udccf Modified: 2025-04-15T20:31:18.149Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpuapr2025.html", "creation_timestamp": "2025-04-15T20:55:21.000000Z"}, {"uuid": "23172918-8845-453b-a395-11c2ab11042f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30731", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11914", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30731\n\ud83d\udd25 CVSS Score: 3.6 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N)\n\ud83d\udd39 Description: Vulnerability in the Oracle Applications Technology Stack product of Oracle E-Business Suite (component: Configuration).  Supported versions that are affected are 12.2.3-12.2.14. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Applications Technology Stack executes to compromise Oracle Applications Technology Stack.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Applications Technology Stack accessible data as well as  unauthorized read access to a subset of Oracle Applications Technology Stack accessible data. CVSS 3.1 Base Score 3.6 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).\n\ud83d\udccf Published: 2025-04-15T20:31:18.582Z\n\ud83d\udccf Modified: 2025-04-15T20:31:18.582Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpuapr2025.html", "creation_timestamp": "2025-04-15T20:55:20.000000Z"}, {"uuid": "720a68d9-369f-43be-8411-858dc05c84da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30737", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11909", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30737\n\ud83d\udd25 CVSS Score: 5.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: Vulnerability in the Oracle Smart View for Office product of Oracle Hyperion (component: Core Smart View).   The supported version that is affected is 24.200. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Smart View for Office.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Smart View for Office accessible data as well as  unauthorized access to critical data or complete access to all Oracle Smart View for Office accessible data. CVSS 3.1 Base Score 5.7 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N).\n\ud83d\udccf Published: 2025-04-15T20:31:20.542Z\n\ud83d\udccf Modified: 2025-04-15T20:31:20.542Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpuapr2025.html", "creation_timestamp": "2025-04-15T20:55:13.000000Z"}, {"uuid": "9b254976-043f-4a05-9d97-c9d4337e483f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3073", "type": "seen", "source": "https://t.me/cvedetector/21829", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3073 - Google Chrome Autofill UI Spoofing Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3073 \nPublished : April 2, 2025, 1:15 a.m. | 32\u00a0minutes ago \nDescription : Inappropriate implementation in Autofill in Google Chrome prior to 135.0.7049.52 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low) \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-02T04:06:56.000000Z"}]}