
CVE-2025-21572
https://notcve.org/view.php?id=CVE-2025-21572
02 May 2025 — OpenGrok 1.13.25 has a reflected Cross-Site Scripting (XSS) issue when producing the history view page. This happens through improper handling of path segments. The application reflects unsanitized user input into the HTML output. • https://www.oracle.com/security-alerts/all-oracle-cves-outside-other-oracle-public-documents.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2025-30702
https://notcve.org/view.php?id=CVE-2025-30702
15 Apr 2025 — Vulnerability in the Fleet Patching and amp; Provisioning component of Oracle Database Server. Supported versions that are affected are 19.3-19.26. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Fleet Patching and amp; Provisioning. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Fleet Patching and amp; Provisioning accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). • https://www.oracle.com/security-alerts/cpuapr2025.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2025-30740
https://notcve.org/view.php?id=CVE-2025-30740
15 Apr 2025 — Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are 9.2.0.0-9.2.9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 6.5 (Confidentiali... • https://www.oracle.com/security-alerts/cpuapr2025.html • CWE-284: Improper Access Control •

CVE-2025-30736
https://notcve.org/view.php?id=CVE-2025-30736
15 Apr 2025 — Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 19.3-19.26, 21.3-21.17 and 23.4-23.7. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java VM. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java VM accessible data as well as unauthorized access to critical data or complete access to all Ja... • https://www.oracle.com/security-alerts/cpuapr2025.html • CWE-284: Improper Access Control •

CVE-2025-30733
https://notcve.org/view.php?id=CVE-2025-30733
15 Apr 2025 — Vulnerability in the RDBMS Listener component of Oracle Database Server. Supported versions that are affected are 19.3-19.26, 21.3-21.17 and 23.4-23.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via Oracle Net to compromise RDBMS Listener. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all RDBMS Listener accessible da... • https://www.oracle.com/security-alerts/cpuapr2025.html • CWE-287: Improper Authentication •

CVE-2025-30732
https://notcve.org/view.php?id=CVE-2025-30732
15 Apr 2025 — Vulnerability in the Oracle Application Object Library product of Oracle E-Business Suite (component: Core). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Object Library. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Object Library, attacks may significantly impact additional product... • https://www.oracle.com/security-alerts/cpuapr2025.html • CWE-284: Improper Access Control •

CVE-2025-30731
https://notcve.org/view.php?id=CVE-2025-30731
15 Apr 2025 — Vulnerability in the Oracle Applications Technology Stack product of Oracle E-Business Suite (component: Configuration). Supported versions that are affected are 12.2.3-12.2.14. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Applications Technology Stack executes to compromise Oracle Applications Technology Stack. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can r... • https://www.oracle.com/security-alerts/cpuapr2025.html • CWE-284: Improper Access Control •

CVE-2025-30730
https://notcve.org/view.php?id=CVE-2025-30730
15 Apr 2025 — Vulnerability in the Oracle Application Object Library product of Oracle E-Business Suite (component: Core). Supported versions that are affected are 12.2.5-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Object Library. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Application Object Library. CVSS 3.1 Base Score 7.5 (Av... • https://www.oracle.com/security-alerts/cpuapr2025.html • CWE-400: Uncontrolled Resource Consumption •

CVE-2025-30728
https://notcve.org/view.php?id=CVE-2025-30728
15 Apr 2025 — Vulnerability in the Oracle Configurator product of Oracle E-Business Suite (component: Core). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Configurator. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Configurator accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). • https://www.oracle.com/security-alerts/cpuapr2025.html • CWE-284: Improper Access Control •

CVE-2025-30727
https://notcve.org/view.php?id=CVE-2025-30727
15 Apr 2025 — Vulnerability in the Oracle Scripting product of Oracle E-Business Suite (component: iSurvey Module). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Scripting. Successful attacks of this vulnerability can result in takeover of Oracle Scripting. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). • https://github.com/HExploited/CVE-2025-30727-Exploit • CWE-306: Missing Authentication for Critical Function •