The Onapsis Research Lab delivers regular SAP and Oracle vulnerability research to our eco-system of customers, partners and the information security industry

Onapsis security advisories enable customers to better understand the security and business implications of discovered SAP and Oracle security issues. This enables organizations to prioritize patches, updates and their remediation strategies to ensure continuity of the business. Onapsis security advisories, together with vendor patches and security notes, are available for download to provide vendors and end-users with the necessary information to mitigate advanced threats to mission-critical applications running on SAP and Oracle.

SAP
Critical
07/20/2016

By exploiting this vulnerability, an unauthenticated attacker could access and modify any information indexed by the SAP system.

SAP
High
07/20/2016

By exploiting this vulnerability, an attacker could tamper the audit logs, hiding his evidence of an attack to a HANA system.

SAP
Medium
07/20/2016

By exploiting this vulnerability, an attacker could discover information relating to servers. This information could be used to allow the attacker to specialize their attacks.

SAP
Medium
07/20/2016

By exploiting this vulnerability, a remote unauthenticated attacker could obtain technical information about the SAP HANA Platform that can be used to perform more complex attacks.

SAP
High
07/20/2016

By exploiting this vulnerability, an attacker could tamper the audit logs, hiding evidence of an attack to a HANA system.

SAP
High
07/20/2016

By exploiting this vulnerability, a remote unauthenticated attacker could access arbitrary business information from the SAP system.

SAP
Low
07/20/2016

By exploiting this vulnerability, an attacker could access business information indexed by the SAP system.

07/20/2016

By exploiting this vulnerability, a remote unauthenticated attacker could access arbitrary business information from the SAP system.

07/20/2016

By exploiting this vulnerability, a remote unauthenticated attacker could receive high privilleges on the HANA system with unrestricted access to any business information.

07/20/2016

By exploiting this vulnerability, a remote unauthenticated attacker could access arbitrary business information from the SAP system.

Pages