Security Advisories

Die Onapsis Research Labs veröffentlichen regelmäßig Forschungsberichte zu den neuesten SAP®- und Oracle®-Schwachstellen und stellen diese unserem Öko-System aus Kunden, Partnern und IT-Sicherheitsanbietern zur Verfügung. 

Mit unseren Security Advisories können Kunden die Sicherheits- und Geschäftsrisiken besser abschätzen, die von den jüngsten Schwachstellen in SAP®- und Oracle®-Anwendungen ausgehen. Sie können damit festlegen, in welcher Reihenfolge Patches, Updates und Reparaturmaßnahmen durchzuführen sind, um die Kontinuität des Geschäftsbetriebs zu sichern. Die Security Advisories von Onapsis – einschließlich Hersteller-Patches und -Sicherheitshinweisen – stehen für Sie zum Download bereit. So werden Anbieter und Endnutzer mit den notwendigen Informationen versorgt, um die steigenden Bedrohungen für die geschäftskritischen SAP®- und Oracle®-Anwendungen zu reduzieren. 

Critical
SAP
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could delete business-relevant information from the SAP HANA System and could also render the system unavailable.
Medium
SAP
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could render the system unavailable and potentially overwrite information.
High
SAP
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could copy business-relevant information from the SAP HANA System and render the system unavailable.
High
SAP
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could render the SAP HANA system completely unavailable due to a system shutdown. Any business process or information hosted in the…
Critical
SAP
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could completely compromise the system and would be able to access and manage any business-relevant information or process.
Medium
SAP
11/08/2015
By exploiting this vulnerability, a remote unauthenticated attacker could remotely read technical information that could potentially grant him access to the system.
09/29/2015
By exploiting this vulnerability an attacker could modify information related to users of the HANA system, affecting the integrity of the data stored.
09/29/2015
By exploiting this vulnerability an attacker could modify information related to users of the HANA system, affecting the integrity of the data stored.
09/29/2015
By exploiting this vulnerability an attacker could read sensitive business information stored in the HANA system and change configuration parameters which could render the system unavailable for…
09/29/2015
By exploiting this vulnerability an attacker could abuse of management interfaces to execute commands on the HANA system and ultimately compromise all the information stored and processed by the…
09/29/2015
By exploiting this vulnerability an attacker could abuse of management interfaces to execute commands on the HANA system and ultimately compromise all the information stored and processed by the…
09/29/2015
By exploiting this vulnerability an attacker could modify system settings and delete credentials which could affect other users in the HANA system, engaging into a DoS attack.

Fordern Sie eine kostenlose
Geschäftsrisiko-Illustration an

Untersuchen Sie die Sicherheitslage und das Risiko Ihrer geschäftskritischen Anwendungen, um die möglichen Auswirkungen eines Cyberangriffs auf Ihr Unternehmen zu ermitteln.

Assessment Anfordern