SAP & Onapsis Webinar: Log4j Threat Intelligence and Mitigation Strategies to Protect Your SAP Applications

Security Advisories

Die Onapsis Research Labs veröffentlichen regelmäßig Forschungsberichte zu den neuesten SAP®- und Oracle®-Schwachstellen und stellen diese unserem Öko-System aus Kunden, Partnern und IT-Sicherheitsanbietern zur Verfügung. 

Mit unseren Security Advisories können Kunden die Sicherheits- und Geschäftsrisiken besser abschätzen, die von den jüngsten Schwachstellen in SAP®- und Oracle®-Anwendungen ausgehen. Sie können damit festlegen, in welcher Reihenfolge Patches, Updates und Reparaturmaßnahmen durchzuführen sind, um die Kontinuität des Geschäftsbetriebs zu sichern. Die Security Advisories von Onapsis – einschließlich Hersteller-Patches und -Sicherheitshinweisen – stehen für Sie zum Download bereit. So werden Anbieter und Endnutzer mit den notwendigen Informationen versorgt, um die steigenden Bedrohungen für die geschäftskritischen SAP®- und Oracle®-Anwendungen zu reduzieren. 

High
SAP
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could read arbitrary business-relevant information from the SAP HANA System.
Critical
SAP
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could relocate the information stored in the SAP HANA System to make it easily accessible. This could potentially render the system…
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could delete any business-relevant information from the SAP HANA System, affecting the integrity of the data, as well as potentially…
Medium
SAP
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could potentially render the system unavailable.
High
SAP
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could copy business-relevant information from the SAP HANA System, allowing it to be easily accessed and render the system unavailable.
Medium
SAP
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could obtain technical information that could be used by an attacker to facilitate a targeted attack.
Critical
SAP
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could delete business-relevant information from the SAP HANA System and could also render the system unavailable.
Medium
SAP
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could render the system unavailable and potentially overwrite information.
High
SAP
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could copy business-relevant information from the SAP HANA System and render the system unavailable.
High
SAP
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could render the SAP HANA system completely unavailable due to a system shutdown. Any business process or information hosted in the…
Critical
SAP
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could completely compromise the system and would be able to access and manage any business-relevant information or process.
Medium
SAP
11/08/2015
By exploiting this vulnerability, a remote unauthenticated attacker could remotely read technical information that could potentially grant him access to the system.

Sichern Sie Ihre
geschäftskritischen SAP-, Oracle-, SalesForce
und SaaS-Anwendungen

Verschaffen Sie sich aus erster Hand einen Überblick über die Transparenz, das Reporting und die Automatisierungsmöglichkeiten der Onapsis-Plattform, indem Sie eine persönliche Demo mit unseren Experten für Anwendungssicherheit vereinbaren.

Demo anfordern