Security Advisories

The Onapsis Research Labs delivers regular SAP® and Oracle® vulnerability research to our ecosystem of customers, partners and the information security industry.

Onapsis security advisories enable customers to better understand the security and business implications of discovered SAP and Oracle security issues. This enables organizations to prioritize patches, updates and their remediation strategies to ensure continuity of the business. Onapsis security advisories, together with vendor patches and security notes, are available for download to provide vendors and end-users with the necessary information to mitigate advanced threats to mission-critical applications running on SAP and Oracle.

High
SAP
07/20/2016
By exploiting this vulnerability, an attacker could tamper the audit logs, hiding evidence of an attack to a HANA system.
Medium
SAP
07/20/2016
By exploiting this vulnerability, an attacker could discover information relating to servers. This information could be used to allow the attacker to specialize their attacks.
07/20/2016
By exploiting this vulnerability, a remote unauthenticated attacker could access arbitrary business information from the SAP system.
High
SAP
07/20/2016
By exploiting this vulnerability, a remote unauthenticated attacker could access arbitrary business information from the SAP system.
Critical
SAP
07/20/2016
By exploiting this vulnerability, an unauthenticated attacker could access and modify any information indexed by the SAP system.
Critical
SAP
07/20/2016
By exploiting this vulnerability, an unauthenticated attacker could access and modify any information indexed by the SAP system.
High
SAP
07/20/2016
By exploiting this vulnerability an unauthenticated attacker could modify any information indexed by the SAP system.
Medium
SAP
07/20/2016
By exploiting this vulnerability, a remote unauthenticated attacker could obtain valid usernames that could be used to support more complex attacks.
07/20/2016
By exploiting this vulnerability, a remote unauthenticated attacker could receive high privilleges on the HANA system with unrestricted access to any business information.
Critical
SAP
11/09/2015
By exploiting this vulnerability, a remote unauthenticated attacker could completely compromise the system, and would be able to access and manage any business-relevant information or processes.
Critical
SAP
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could completely compromise the system, and would be able to access and manage any business-relevant information or processes. This could…
High
SAP
11/09/2015
By exploiting this vulnerability, a remote authenticated attacker could render the SAP HANA Platform unavailable to other users until the next process restart.

Request a
Business Risk Illustration

Examine the security posture and risk exposure of your business-critical applications to determine the potential impact of a cyberattack on your organization.

Engage