Security Advisories

Die Onapsis Research Labs veröffentlichen regelmäßig Forschungsberichte zu den neuesten SAP®- und Oracle®-Schwachstellen und stellen diese unserem Öko-System aus Kunden, Partnern und IT-Sicherheitsanbietern zur Verfügung. 

Mit unseren Security Advisories können Kunden die Sicherheits- und Geschäftsrisiken besser abschätzen, die von den jüngsten Schwachstellen in SAP®- und Oracle®-Anwendungen ausgehen. Sie können damit festlegen, in welcher Reihenfolge Patches, Updates und Reparaturmaßnahmen durchzuführen sind, um die Kontinuität des Geschäftsbetriebs zu sichern. Die Security Advisories von Onapsis – einschließlich Hersteller-Patches und -Sicherheitshinweisen – stehen für Sie zum Download bereit. So werden Anbieter und Endnutzer mit den notwendigen Informationen versorgt, um die steigenden Bedrohungen für die geschäftskritischen SAP®- und Oracle®-Anwendungen zu reduzieren. 

High
SAP
07/20/2016
By exploiting this vulnerability, an attacker could tamper the audit logs, hiding evidence of an attack to a HANA system.
Medium
SAP
07/20/2016
By exploiting this vulnerability, an attacker could discover information relating to servers. This information could be used to allow the attacker to specialize their attacks.
07/20/2016
By exploiting this vulnerability, a remote unauthenticated attacker could access arbitrary business information from the SAP system.
High
SAP
07/20/2016
By exploiting this vulnerability, a remote unauthenticated attacker could access arbitrary business information from the SAP system.
Critical
SAP
07/20/2016
By exploiting this vulnerability, an unauthenticated attacker could access and modify any information indexed by the SAP system.
Critical
SAP
07/20/2016
By exploiting this vulnerability, an unauthenticated attacker could access and modify any information indexed by the SAP system.
High
SAP
07/20/2016
By exploiting this vulnerability an unauthenticated attacker could modify any information indexed by the SAP system.
Medium
SAP
07/20/2016
By exploiting this vulnerability, a remote unauthenticated attacker could obtain valid usernames that could be used to support more complex attacks.
07/20/2016
By exploiting this vulnerability, a remote unauthenticated attacker could receive high privilleges on the HANA system with unrestricted access to any business information.
Critical
SAP
11/09/2015
By exploiting this vulnerability, a remote unauthenticated attacker could completely compromise the system, and would be able to access and manage any business-relevant information or processes.
Critical
SAP
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could completely compromise the system, and would be able to access and manage any business-relevant information or processes. This could…
High
SAP
11/09/2015
By exploiting this vulnerability, a remote authenticated attacker could render the SAP HANA Platform unavailable to other users until the next process restart.

Fordern Sie eine kostenlose
Geschäftsrisiko-Illustration an

Untersuchen Sie die Sicherheitslage und das Risiko Ihrer geschäftskritischen Anwendungen, um die möglichen Auswirkungen eines Cyberangriffs auf Ihr Unternehmen zu ermitteln.

Assessment Anfordern