{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T17:55:18.417","vulnerabilities":[{"cve":{"id":"CVE-2025-30750","sourceIdentifier":"secalert_us@oracle.com","published":"2025-07-15T20:15:29.473","lastModified":"2025-07-29T17:33:34.737","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in the Unified Audit component of Oracle Database Server.  Supported versions that are affected are 19.3-19.27, 21.3-21.18 and  23.4-23.8. Easily exploitable vulnerability allows high privileged attacker having Create User privilege with network access via Oracle Net to compromise Unified Audit.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Unified Audit accessible data. CVSS 3.1 Base Score 2.4 (Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N)."},{"lang":"es","value":"Vulnerabilidad en el componente Unified Audit de Oracle Database Server. Las versiones compatibles afectadas son 19.3-19.27, 21.3-21.18 y 23.4-23.8. Esta vulnerabilidad, fácilmente explotable, permite a un atacante con privilegios elevados, con el privilegio \"Crear usuario\" y acceso a la red a través de Oracle Net, comprometer Unified Audit. Los ataques exitosos requieren la interacción humana de una persona distinta al atacante. Los ataques exitosos de esta vulnerabilidad pueden resultar en actualizaciones, inserciones o eliminaciones no autorizadas de algunos datos accesibles de Unified Audit. Puntuación base de CVSS 3.1: 2.4 (Afecta a la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N)."}],"metrics":{"cvssMetricV31":[{"source":"secalert_us@oracle.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N","baseScore":2.4,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":0.9,"impactScore":1.4}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-863"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:database_server:*:*:*:*:*:*:*:*","versionStartIncluding":"19.3","versionEndIncluding":"19.27","matchCriteriaId":"FDE2FEF9-4DCC-4D7B-AA30-B1C04ACB8037"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:database_server:*:*:*:*:*:*:*:*","versionStartIncluding":"21.3","versionEndIncluding":"21.18","matchCriteriaId":"ACBCFE9B-C215-4661-8084-991BBBC7878D"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:database_server:*:*:*:*:*:*:*:*","versionStartIncluding":"23.4","versionEndIncluding":"23.8","matchCriteriaId":"07D62D47-27ED-4623-80B8-7FC48162AB63"}]}]}],"references":[{"url":"https://www.oracle.com/security-alerts/cpujul2025.html","source":"secalert_us@oracle.com","tags":["Patch","Vendor Advisory"]}]}}]}