Количество 3
Количество 3
CVE-2025-42928
Under certain conditions, a high privileged user could exploit a deserialization vulnerability in SAP jConnect to launch remote code execution. The system may be vulnerable when specially crafted input is used to exploit the vulnerability resulting in high impact on confidentiality, integrity and availability of the system.
GHSA-fmh5-rjfp-6qvq
Under certain conditions, a high privileged user could exploit a deserialization vulnerability in SAP jConnect to launch remote code execution. The system may be vulnerable when specially crafted input is used to exploit the vulnerability resulting in high impact on confidentiality, integrity and availability of the system.
BDU:2025-16276
Уязвимость драйвера преобразования JDBC-вызовов SAP jConnect, связанная с недостатками механизма десериализации, позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-42928 Under certain conditions, a high privileged user could exploit a deserialization vulnerability in SAP jConnect to launch remote code execution. The system may be vulnerable when specially crafted input is used to exploit the vulnerability resulting in high impact on confidentiality, integrity and availability of the system. | CVSS3: 9.1 | 1% Низкий | 2 месяца назад | |
GHSA-fmh5-rjfp-6qvq Under certain conditions, a high privileged user could exploit a deserialization vulnerability in SAP jConnect to launch remote code execution. The system may be vulnerable when specially crafted input is used to exploit the vulnerability resulting in high impact on confidentiality, integrity and availability of the system. | CVSS3: 9.1 | 1% Низкий | 2 месяца назад | |
BDU:2025-16276 Уязвимость драйвера преобразования JDBC-вызовов SAP jConnect, связанная с недостатками механизма десериализации, позволяющая нарушителю выполнить произвольный код | CVSS3: 9.1 | 1% Низкий | 2 месяца назад |
Уязвимостей на страницу