Security Advisories

Die Onapsis Research Labs veröffentlichen regelmäßig Forschungsberichte zu den neuesten SAP®- und Oracle®-Schwachstellen und stellen diese unserem Öko-System aus Kunden, Partnern und IT-Sicherheitsanbietern zur Verfügung. 

Mit unseren Security Advisories können Kunden die Sicherheits- und Geschäftsrisiken besser abschätzen, die von den jüngsten Schwachstellen in SAP®- und Oracle®-Anwendungen ausgehen. Sie können damit festlegen, in welcher Reihenfolge Patches, Updates und Reparaturmaßnahmen durchzuführen sind, um die Kontinuität des Geschäftsbetriebs zu sichern. Die Security Advisories von Onapsis – einschließlich Hersteller-Patches und -Sicherheitshinweisen – stehen für Sie zum Download bereit. So werden Anbieter und Endnutzer mit den notwendigen Informationen versorgt, um die steigenden Bedrohungen für die geschäftskritischen SAP®- und Oracle®-Anwendungen zu reduzieren. 

High
SAP
06/13/2017
By exploiting this vulnerability, a remote unauthenticated attacker would be able to gain access to SAP systems potentially compromising its information and processes.
Medium
SAP
09/21/2016
By exploiting this vulnerability, an attacker could tamper the audit logs, hiding the evidence after an attack to a SAP system.
Medium
SAP
09/21/2016
By exploiting this vulnerability, an attacker could obtain access to additional SAP systems, therefore potentially compromising these systems, as well as the information stored and processed by them.
Medium
Oracle
09/21/2016
By exploiting this vulnerability, a remote attacker could steal sensitive business information by targeting other users connected to the system.
09/21/2016
By exploiting this vulnerability, a remote attacker could steal sensitive business information by targeting other users connected to the system.
Medium
Oracle
09/21/2016
By exploiting this vulnerability, a remote attacker could steal sensitive business information by targeting other users connected to the system.
Medium
Oracle
09/21/2016
By exploiting this vulnerability, a remote attacker could steal sensitive business information by targeting other users connected to the system.
Medium
Oracle
09/21/2016
By exploiting this vulnerability, a remote attacker could steal sensitive business information by targeting other users connected to the system.
Medium
Oracle
09/21/2016
By exploiting this vulnerability, a remote attacker could steal sensitive business information by targeting other users connected to the system.
Medium
SAP
09/21/2016
By exploiting this vulnerability, an attacker could bypass protections implemented in the SAP systems, potentially executing arbitrary business processes.
Low
SAP
09/21/2016
By exploiting this vulnerability, an attacker could potentially abuse technical functions to access and/or compromise business information.
High
SAP
09/21/2016
By exploiting this vulnerability, an attacker could tamper the audit logs, hiding evidence after an attack to a SAP system.

Fordern Sie eine kostenlose
Geschäftsrisiko-Illustration an

Untersuchen Sie die Sicherheitslage und das Risiko Ihrer geschäftskritischen Anwendungen, um die möglichen Auswirkungen eines Cyberangriffs auf Ihr Unternehmen zu ermitteln.

Assessment Anfordern