Low
SAP
07/29/2019
Please fill in the following form in order to download the selected Onapsis' resource. The system will send you a download link to your email.
High
Oracle
07/18/2018
By exploiting this vulnerability, a remote attacker could steal sensitive business information by redirecting users to a malicious site.
High
Oracle
07/18/2018
By exploiting this vulnerability, a remote attacker could steal sensitive business information by targeting other users connected to the system.
High
SAP
06/14/2018
By exploiting this vulnerability, a remote attacker could access and modify any business information.
Medium
SAP
06/14/2018
By exploiting this vulnerability an attacker could shut down all SAP systems.
Medium
SAP
06/14/2018
By exploiting this vulnerability an attacker could discover information relating to servers. This information could be used to allow the attacker to specialize their attacks.
High
Oracle
06/14/2018
By exploiting this vulnerability, a remote attacker could steal sensitive business information by targeting other users connected to the system.
Critical
Oracle
06/14/2018
By exploiting this vulnerability, an unauthenticated attacker could execute arbitrary SQL statements.
Critical
Oracle
06/14/2018
By exploiting this vulnerability, unauthenticated attacker could execute arbitrary SQL statements.
Critical
Oracle
06/14/2018
By exploiting this vulnerability, an unauthenticated attacker could execute arbitrary SQL statements.
High
Oracle
06/14/2018
By exploiting this vulnerability, a remote unauthenticated attacker could get sensitive information.
High
Oracle
06/14/2018
By exploiting this vulnerability, a remote unauthenticated attacker could get sensitive information.