{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-01T14:32:54.987","vulnerabilities":[{"cve":{"id":"CVE-2025-30731","sourceIdentifier":"secalert_us@oracle.com","published":"2025-04-15T21:16:02.907","lastModified":"2025-04-21T19:15:56.913","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in the Oracle Applications Technology Stack product of Oracle E-Business Suite (component: Configuration).  Supported versions that are affected are 12.2.3-12.2.14. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Applications Technology Stack executes to compromise Oracle Applications Technology Stack.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Applications Technology Stack accessible data as well as  unauthorized read access to a subset of Oracle Applications Technology Stack accessible data. CVSS 3.1 Base Score 3.6 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N)."},{"lang":"es","value":"Vulnerabilidad en el producto Oracle Applications Technology Stack de Oracle E-Business Suite (componente: Configuración). Las versiones compatibles afectadas son 12.2.3-12.2.14. Esta vulnerabilidad, difícil de explotar, permite que un atacante no autenticado con acceso a la infraestructura donde se ejecuta Oracle Applications Technology Stack lo comprometa. Los ataques exitosos requieren la interacción humana de una persona distinta al atacante. Los ataques exitosos de esta vulnerabilidad pueden resultar en acceso no autorizado para actualizaciones, inserciones o eliminaciones de algunos datos accesibles de Oracle Applications Technology Stack, así como acceso no autorizado para lecturas a un subconjunto de dichos datos. Puntuación base de CVSS 3.1: 3.6 (Afecta a la confidencialidad y la integridad). Vector CVSS: (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N)."}],"metrics":{"cvssMetricV31":[{"source":"secalert_us@oracle.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N","baseScore":3.6,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.0,"impactScore":2.5}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-284"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:applications_technology_stack:*:*:*:*:*:*:*:*","versionStartIncluding":"12.2.3","versionEndIncluding":"12.2.14","matchCriteriaId":"065E9448-D16E-4A8E-999A-DF8D0C3B516B"}]}]}],"references":[{"url":"https://www.oracle.com/security-alerts/cpuapr2025.html","source":"secalert_us@oracle.com","tags":["Patch","Vendor Advisory"]}]}}]}