Security Advisories

The Onapsis Research Labs deliver regular SAP® and Oracle® vulnerability research to our eco-system of customers, partners and the information security industry

Onapsis security advisories enable customers to better understand the security and business implications of discovered SAP and Oracle security issues. This enables organizations to prioritize patches, updates and their remediation strategies to ensure continuity of the business. Onapsis security advisories, together with vendor patches and security notes, are available for download to provide vendors and end-users with the necessary information to mitigate advanced threats to mission-critical applications running on SAP and Oracle.

Low
SAP
07/29/2019
Please fill in the following form in order to download the selected Onapsis' resource. The system will send you a download link to your email.
High
Oracle
07/18/2018
By exploiting this vulnerability, a remote attacker could steal sensitive business information by redirecting users to a malicious site.
High
Oracle
07/18/2018
By exploiting this vulnerability, a remote attacker could steal sensitive business information by targeting other users connected to the system.
High
SAP
06/14/2018
By exploiting this vulnerability, a remote attacker could access and modify any business information.
Medium
SAP
06/14/2018
By exploiting this vulnerability an attacker could shut down all SAP systems.
Medium
SAP
06/14/2018
By exploiting this vulnerability an attacker could discover information relating to servers. This information could be used to allow the attacker to specialize their attacks.
High
Oracle
06/14/2018
By exploiting this vulnerability, a remote attacker could steal sensitive business information by targeting other users connected to the system.
Critical
Oracle
06/14/2018
By exploiting this vulnerability, an unauthenticated attacker could execute arbitrary SQL statements.
Critical
Oracle
06/14/2018
By exploiting this vulnerability, unauthenticated attacker could execute arbitrary SQL statements.
Critical
Oracle
06/14/2018
By exploiting this vulnerability, an unauthenticated attacker could execute arbitrary SQL statements.
High
Oracle
06/14/2018
By exploiting this vulnerability, a remote unauthenticated attacker could get sensitive information.
High
Oracle
06/14/2018
By exploiting this vulnerability, a remote unauthenticated attacker could get sensitive information.

Request a
Business Risk Illustration

Examine the security posture and risk exposure of your business-critical applications to determine the potential impact of a cyberattack on your organization.

Engage