{"vulnerability": "CVE-2025-30012", "sightings": [{"uuid": "1527de9b-b633-4f95-80b3-f79521fd700f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30012", "type": "seen", "source": "https://threatintel.cc/2025/07/08/sap-patches-critical-flaws-that.html", "content": "", "creation_timestamp": "2025-07-08T12:08:07.000000Z"}, {"uuid": "44244db1-5d33-4ee7-bb4f-ed6073f0be78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30012", "type": "seen", "source": "https://t.me/cvedetector/25158", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30012 - SAP SRM Java Applet Deserialization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30012 \nPublished : May 13, 2025, 1:15 a.m. | 1\u00a0hour, 25\u00a0minutes ago \nDescription : The Live Auction Cockpit in SAP Supplier Relationship Management (SRM) uses a deprecated java applet component within the affected SRM stack to accept binary Java objects in specific encoding format. On successful exploitation, an authenticated attacker with high privileges could send malicious payload request and receive an outbound DNS request, resulting in deserialization of data in the application. This vulnerability has low impact on confidentiality, integrity and availability of the application. \nSeverity: 3.9 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-13T05:30:33.000000Z"}, {"uuid": "224ad4dc-a1ce-4868-98e7-e611df7a1ee6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30012", "type": "seen", "source": "https://bsky.app/profile/fraustief.bsky.social/post/3lu3vx5gtfk2k", "content": "", "creation_timestamp": "2025-07-16T17:11:07.006165Z"}, {"uuid": "43783207-b3b8-4f13-8412-daa55e328fdb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30012", "type": "seen", "source": "https://bsky.app/profile/fraustief.bsky.social/post/3lu3vx5h65c2k", "content": "", "creation_timestamp": "2025-07-16T17:11:09.582588Z"}, {"uuid": "919629d5-01c8-4e2b-a43f-35ab0c8aaea9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30012", "type": "seen", "source": "https://bsky.app/profile/undercodenews.bsky.social/post/3lwrihho3rc2d", "content": "", "creation_timestamp": "2025-08-19T17:58:37.260189Z"}, {"uuid": "5468262f-8c90-47f3-9f11-1a954687930d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30012", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16125", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30012\n\ud83d\udd25 CVSS Score: 3.9 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L)\n\ud83d\udd39 Description: The Live Auction Cockpit in SAP Supplier Relationship Management (SRM) uses a deprecated java applet component within the affected SRM stack to accept binary Java objects in specific encoding format. On successful exploitation, an authenticated attacker with high privileges could send malicious payload request and receive an outbound DNS request, resulting in deserialization of data in the application. This vulnerability has low impact on confidentiality, integrity and availability of the application.\n\ud83d\udccf Published: 2025-05-13T00:14:21.258Z\n\ud83d\udccf Modified: 2025-05-13T14:12:24.560Z\n\ud83d\udd17 References:\n1. https://me.sap.com/notes/3578900\n2. https://url.sap/sapsecuritypatchday", "creation_timestamp": "2025-05-13T14:30:45.000000Z"}, {"uuid": "20b73b42-ac83-4dd4-b67e-7eb9958142f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30012", "type": "seen", "source": "https://infosec.exchange/users/edwardk/statuses/114818002384512340", "content": "", "creation_timestamp": "2025-07-08T14:07:59.344671Z"}, {"uuid": "e915d4e0-2a84-41f8-8ef6-e3a9c186414c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30012", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lozjaam66w2l", "content": "", "creation_timestamp": "2025-05-13T03:12:11.834007Z"}, {"uuid": "e54b5be5-83cb-4499-86ef-7cb67be4eb8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30012", "type": "seen", "source": "https://t.me/CyberBulletin/3606", "content": "\u26a1\ufe0fThe CVSS score for the bug, tracked as CVE-2025-30012, has been updated from 3.9 to 10/10, after it was determined that it could be abused by unauthenticated attackers to execute arbitrary OS commands with administrative privileges.\n\n#CyberBulletin", "creation_timestamp": "2025-07-08T21:38:06.000000Z"}]}