The Onapsis Research Lab delivers regular SAP and Oracle vulnerability research to our eco-system of customers, partners and the information security industry

Onapsis security advisories enable customers to better understand the security and business implications of discovered SAP and Oracle security issues. This enables organizations to prioritize patches, updates and their remediation strategies to ensure continuity of the business. Onapsis security advisories, together with vendor patches and security notes, are available for download to provide vendors and end-users with the necessary information to mitigate advanced threats to mission-critical applications running on SAP and Oracle.

07/20/2016

By exploiting this vulnerability, an unauthenticated attacker could access and modify any information indexed by the SAP system.

07/20/2016

By exploiting this vulnerability, a remote attacker may obtain clear-text passwords of SAP HANA users and get critical information.

SAP
Medium
11/09/2015

By exploiting this vulnerability, an unauthenticated attacker could obtain technical information that could be used by an attacker to facilitate a targeted attack.

SAP
Critical
11/09/2015

By exploiting this vulnerability, an unauthenticated attacker could completely compromise the system, and would be able to access and manage any business-relevant information or processes.

SAP
Critical
11/09/2015

By exploiting this vulnerability, an unauthenticated attacker could override business-relevant information in the SAP HANA System and could also render the system unavailable due to corrupted data.

SAP
Critical
11/09/2015

By exploiting this vulnerability, an unauthenticated attacker could relocate the information stored in the SAP HANA System to make it easily accessible. This could potentially render the system unavailable due to a non-integral file system.

SAP
Critical
11/09/2015

By exploiting this vulnerability, a remote unauthenticated attacker could completely compromise the system, and would be able to access and manage any business-relevant information or processes.

SAP
High
11/09/2015

By exploiting this vulnerability, an unauthenticated attacker could copy business-relevant information from the SAP HANA System and render the system unavailable.

SAP
Critical
11/09/2015

By exploiting this vulnerability, an unauthenticated attacker could completely compromise the system and would be able to access and manage any business-relevant information or process.

SAP
High
11/09/2015

By exploiting this vulnerability, an unauthenticated attacker could copy business-relevant information from the SAP HANA System, allowing it to be easily accessed and render the system unavailable.

Pages