{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T10:22:54.468","vulnerabilities":[{"cve":{"id":"CVE-2025-30736","sourceIdentifier":"secalert_us@oracle.com","published":"2025-04-15T21:16:03.360","lastModified":"2025-04-21T19:16:54.987","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in the Java VM component of Oracle Database Server.  Supported versions that are affected are 19.3-19.26, 21.3-21.17 and  23.4-23.7. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java VM.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Java VM accessible data as well as  unauthorized access to critical data or complete access to all Java VM accessible data. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)."},{"lang":"es","value":"Vulnerabilidad en el componente Java VM de Oracle Database Server. Las versiones compatibles afectadas son 19.3-19.26, 21.3-21.17 y 23.4-23.7. Esta vulnerabilidad, difícil de explotar, permite a un atacante no autenticado con acceso a la red a través de múltiples protocolos comprometer Java VM. Los ataques con éxito pueden resultar en la creación, eliminación o modificación no autorizada de datos críticos o de todos los datos accesibles de Java VM, así como en el acceso no autorizado a datos críticos o a todos los datos accesibles de Java VM. Puntuación base de CVSS 3.1: 7.4 (Afecta a la confidencialidad y la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)."}],"metrics":{"cvssMetricV31":[{"source":"secalert_us@oracle.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N","baseScore":7.4,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":5.2}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-284"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:java_virtual_machine:*:*:*:*:*:*:*:*","versionStartIncluding":"19.3","versionEndIncluding":"19.26","matchCriteriaId":"B32F5B2A-9EE1-43D9-91B4-BE968BD8FB4B"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:java_virtual_machine:*:*:*:*:*:*:*:*","versionStartIncluding":"21.3","versionEndIncluding":"21.17","matchCriteriaId":"FED127C9-9735-4EE7-897C-53306843CEA8"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:java_virtual_machine:*:*:*:*:*:*:*:*","versionStartIncluding":"23.4","versionEndIncluding":"23.7","matchCriteriaId":"28CC0119-88F7-47E8-9068-2A7DA0312EF3"}]}]}],"references":[{"url":"https://www.oracle.com/security-alerts/cpuapr2025.html","source":"secalert_us@oracle.com","tags":["Patch","Vendor Advisory"]}]}}]}