Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 09 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 09 Dec 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sap
Sap jconnect |
|
| Vendors & Products |
Sap
Sap jconnect |
Tue, 09 Dec 2025 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Under certain conditions, a high privileged user could exploit a deserialization vulnerability in SAP jConnect to launch remote code execution. The system may be vulnerable when specially crafted input is used to exploit the vulnerability resulting in high impact on confidentiality, integrity and availability of the system. | |
| Title | Deserialization Vulnerability in SAP jConnect - SDK for ASE | |
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: sap
Published:
Updated: 2025-12-10T04:57:09.434Z
Reserved: 2025-04-16T13:25:32.384Z
Link: CVE-2025-42928
Updated: 2025-12-09T15:25:13.257Z
Status : Awaiting Analysis
Published: 2025-12-09T16:17:53.170
Modified: 2025-12-09T18:36:53.557
Link: CVE-2025-42928
No data.
OpenCVE Enrichment
Updated: 2025-12-09T10:04:35Z