Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Workaround
Apache Jena SDB has been EOL since December 2020, users should migrate to alternative options from the Apache Jena project e.g. Apache Jena TDB 2 or from 3rd party vendors.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-g2qw-6vrr-v6pq | Apache Jena vulnerable to Deserialization of Untrusted Data |
Wed, 25 Feb 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:apache:jena_sdb:-:*:*:*:*:*:*:* | |
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-03T14:09:56.492Z
Reserved: 2022-11-10T00:00:00.000Z
Link: CVE-2022-45136
Updated: 2024-08-03T14:09:56.492Z
Status : Modified
Published: 2022-11-14T16:15:12.237
Modified: 2024-11-21T07:28:49.510
Link: CVE-2022-45136
No data.
OpenCVE Enrichment
No data.
Github GHSA