{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-15T01:35:59.284","vulnerabilities":[{"cve":{"id":"CVE-2025-30733","sourceIdentifier":"secalert_us@oracle.com","published":"2025-04-15T21:16:03.133","lastModified":"2025-05-19T14:15:24.187","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in the RDBMS Listener component of Oracle Database Server.  Supported versions that are affected are 19.3-19.26, 21.3-21.17 and  23.4-23.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via Oracle Net to compromise RDBMS Listener.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all RDBMS Listener accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:R\/S:U\/C:H\/I:N\/A:N)."},{"lang":"es","value":"Vulnerabilidad en el componente RDBMS Listener de Oracle Database Server. Las versiones compatibles afectadas son 19.3-19.26, 21.3-21.17 y 23.4-23.7. Esta vulnerabilidad, fácilmente explotable, permite a un atacante no autenticado con acceso a la red a través de Oracle Net comprometer el componente RDBMS Listener. Los ataques exitosos requieren la interacción humana de una persona distinta al atacante. Los ataques exitosos de esta vulnerabilidad pueden resultar en el acceso no autorizado a datos críticos o en el acceso completo a todos los datos accesibles del componente RDBMS Listener. Puntuación base de CVSS 3.1: 6.5 (Afecta a la confidencialidad). Vector CVSS: (CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:R\/S:U\/C:H\/I:N\/A:N)."}],"metrics":{"cvssMetricV31":[{"source":"secalert_us@oracle.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:R\/S:U\/C:H\/I:N\/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-287"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:rdbms_listener:*:*:*:*:*:*:*:*","versionStartIncluding":"19.3","versionEndIncluding":"19.26","matchCriteriaId":"E362AD7D-FB82-4DE9-90B2-74399D673C38"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:rdbms_listener:*:*:*:*:*:*:*:*","versionStartIncluding":"21.3","versionEndIncluding":"21.17","matchCriteriaId":"684B945B-072A-4413-8D1B-2D8A10B2FB83"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:rdbms_listener:*:*:*:*:*:*:*:*","versionStartIncluding":"23.4","versionEndIncluding":"23.7","matchCriteriaId":"2CD6F3E1-172D-4F6C-9BD3-4FD616E629ED"}]}]}],"references":[{"url":"https:\/\/www.oracle.com\/security-alerts\/cpuapr2025.html","source":"secalert_us@oracle.com","tags":["Patch","Vendor Advisory"]},{"url":"https:\/\/driftnet.io\/blog\/oracle-tns-memory-leak","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}