7.5

CVSS3.1

CVE-2025-30724 -

Vulnerability in the Oracle BI Publisher product of Oracle Analytics (component: XML Services). Supported versions that are affected are 7.6.0.0.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle BI Publisher. Succโ€ฆ

๐Ÿ“… Published: April 15, 2025, 8:31 p.m. ๐Ÿ”„ Last Modified: April 21, 2025, 7:55 p.m.

5.4

CVSS3.1

CVE-2025-30723 -

Vulnerability in the Oracle BI Publisher product of Oracle Analytics (component: XML Services). Supported versions that are affected are 7.6.0.0.0 and 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle BI Publisher. Succeโ€ฆ

๐Ÿ“… Published: April 15, 2025, 8:31 p.m. ๐Ÿ”„ Last Modified: May 21, 2025, 7:45 p.m.

5.3

CVSS3.1

CVE-2025-30722 - mysql: mysqldump unspecified vulnerability (CPU Apr 2025)

Vulnerability in the MySQL Client product of Oracle MySQL (component: Client: mysqldump). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise โ€ฆ

๐Ÿ“… Published: April 15, 2025, 8:31 p.m. ๐Ÿ”„ Last Modified: Nov. 3, 2025, 8:18 p.m.

6.1

CVSS3.1

CVE-2025-30720 -

Vulnerability in the Oracle Configurator product of Oracle E-Business Suite (component: Orders). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Configurator. Successful attโ€ฆ

๐Ÿ“… Published: April 15, 2025, 8:31 p.m. ๐Ÿ”„ Last Modified: June 27, 2025, 4:04 p.m.

4

CVSS3.1

CVE-2025-30721 - mysql: UDF unspecified vulnerability (CPU Apr 2025)

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: UDF). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes tโ€ฆ

๐Ÿ“… Published: April 15, 2025, 8:31 p.m. ๐Ÿ”„ Last Modified: Nov. 3, 2025, 8:18 p.m.

6.1

CVSS3.1

CVE-2025-30719 -

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.1.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle โ€ฆ

๐Ÿ“… Published: April 15, 2025, 8:31 p.m. ๐Ÿ”„ Last Modified: July 2, 2025, 4:34 p.m.

5.4

CVSS3.1

CVE-2025-30718 -

Vulnerability in the Oracle Applications Framework product of Oracle E-Business Suite (component: Attachments, File Upload). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Apโ€ฆ

๐Ÿ“… Published: April 15, 2025, 8:31 p.m. ๐Ÿ”„ Last Modified: July 2, 2025, 4:31 p.m.

6.5

CVSS3.1

CVE-2025-30717 -

Vulnerability in the Oracle Teleservice product of Oracle E-Business Suite (component: Service Diagnostics Scripts). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Teleservicโ€ฆ

๐Ÿ“… Published: April 15, 2025, 8:31 p.m. ๐Ÿ”„ Last Modified: July 2, 2025, 4:31 p.m.

7.5

CVSS3.1

CVE-2025-30716 -

Vulnerability in the Oracle Common Applications product of Oracle E-Business Suite (component: CRM User Management Framework). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracleโ€ฆ

๐Ÿ“… Published: April 15, 2025, 8:31 p.m. ๐Ÿ”„ Last Modified: April 21, 2025, 7:55 p.m.

4.8

CVSS3.1

CVE-2025-30714 -

Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/Python). Supported versions that are affected are 9.0.0-9.2.0. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successfuโ€ฆ

๐Ÿ“… Published: April 15, 2025, 8:31 p.m. ๐Ÿ”„ Last Modified: April 21, 2025, 8:17 p.m.
Total resulsts: 344111
Page 5303 of 34,412
ยซ previous page ยป next page
Filters