{"uuid": "84ce9896-b048-44ea-9dc1-e0152dfa800b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-42982", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18146", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-42982\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: SAP GRC allows a non-administrative user to access and initiate transaction which could allow them to modify or control the transmitted system credentials. This causes high impact on confidentiality, integrity and availability of the application.\n\ud83d\udccf Published: 2025-06-10T00:10:58.266Z\n\ud83d\udccf Modified: 2025-06-12T03:55:17.762Z\n\ud83d\udd17 References:\n1. https://me.sap.com/notes/3609271\n2. https://url.sap/sapsecuritypatchday", "creation_timestamp": "2025-06-12T04:34:37.000000Z"}