The Onapsis Research Lab delivers regular SAP security advisories and vulnerability research to our eco-system of customers, partners and the information security industry

Onapsis security advisories enable customers to better understand the security and business implications of discovered SAP security issues. This enables you to prioritize patches and updates and their remediation strategies to ensure continuity of your business. Onapsis security advisories, together with vendor patches and security notes, are available for download to provide vendors and end-users with the information to mitigate advanced threats to mission-critical applications running on SAP.

07/28/2016

By exploiting this vulnerability, an unauthenticated attacker could achieve administrative rights and would be able to potentially compromise all information stored and processed on the JDE System.

07/28/2016

By exploiting this vulnerability, an unauthenticated attacker could retrieve the administration user and passwords from the Server Manager. This could lead to a potential compromise of the entire JDE landscape hence all of its information and processes.

07/28/2016

By exploiting this vulnerability, a remote attacker could steal sensitive business information by targeting other users connected to the system.

07/28/2016

By exploiting this vulnerability, an unauthenticated attacker could remotely shutdown the entire JD Edwards infrastructure.

07/28/2016

By exploiting this vulnerability, a remote attacker could steal sensitive business information by targeting other users connected to the system.

07/28/2016

By exploiting this vulnerability, an unauthenticated attacker could create users in the Server Manager, ultimately compromising the entire JDE landscape and all of its information and processes.

07/28/2016

By exploiting this vulnerability, an unauthenticated attacker could remotely shutdown the entire JD Edwards infrastructure.

07/28/2016

By exploiting this vulnerability, a remote attacker could steal sensitive business information by targeting other users connected to the system.

07/28/2016

By exploiting this vulnerability, an unauthenticated attacker could shut down the Server Manager.

07/28/2016

By exploiting this vulnerability, a remote attacker could steal sensitive business information by targeting other users connected to the system.

Pages