SAP® and Oracle® Security Advisories

Onapsis Research Labs is the world’s leading team of security experts who combine their deep knowledge of critical ERP applications and decades of threat research experience to deliver impactful security insights and threat intelligence focused on the business-critical applications from SAP, Oracle, and SaaS providers. Onapsis Research Labs is, far and away, the most prolific and most celebrated contributor of vulnerability research by the SAP Product Security Response Team. No other research team comes close.
07/20/2016
SAP TREX Remote Command Execution
By exploiting this SAP TREX vulnerability, an unauthenticated attacker could access and modify any information indexed by the SAP system. Please fill in the following form in order to download the selected Onapsis’ resource. The system will send you a download link to your email. By registering, you will obtain the following benefits:
11/09/2015
SAP HANA TrexNet Remote Python Execution
By exploiting this vulnerability, an unauthenticated attacker could completely compromise the system, and would be able to access and manage any business-relevant information or processes. Please fill in the following form in order to download the selected Onapsis’ resource. The system will send you a download link to your email. By registering, you will obtain…
11/09/2015
SAP HANA Remote Code Execution (HTTP based)
By exploiting this vulnerability, an unauthenticated attacker could completely compromise the system, and would be able to access and manage any business-relevant information or processes. This could be achieved remotely and potentially through the internet, affecting on-premise and cloud-based HANA solutions. Please fill in the following form in order to download the selected Onapsis’ resource….
11/09/2015
SAP HANA Remote Code Execution (SQL based)
By exploiting this vulnerability, a remote unauthenticated attacker could completely compromise the system, and would be able to access and manage any business-relevant information or processes. Please fill in the following form in order to download the selected Onapsis’ resource. The system will send you a download link to your email. By registering, you will…
11/09/2015
SAP HANA TrexNet Remote Command Execution
By exploiting this vulnerability, an unauthenticated attacker could completely compromise the system and would be able to access and manage any business-relevant information or process. Please fill in the following form in order to download the selected Onapsis’ resource. The system will send you a download link to your email. By registering, you will obtain…
11/09/2015
SAP HANA TrexNet Remote Directory Deletion
By exploiting this SAP HANA vulnerability, an unauthenticated attacker could delete business-relevant information from the SAP HANA System and could also render the system unavailable. Please fill in the following form in order to download the selected Onapsis’ resource. The system will send you a download link to your email. By registering, you will obtain…
11/09/2015
SAP HANA TrexNet Remote File Move
By exploiting this vulnerability, an unauthenticated attacker could relocate the information stored in the SAP HANA System to make it easily accessible. This could potentially render the system unavailable due to a non-integral file system. Please fill in the following form in order to download the selected Onapsis’ resource. The system will send you a…
11/09/2015
SAP HANA TrexNet Remote File Write
By exploiting this SAP HANA vulnerability, an unauthenticated attacker could override business-relevant information in the SAP HANA System and could also render the system unavailable due to corrupted data. Please fill in the following form in order to download the selected Onapsis’ resource. The system will send you a download link to your email. By…
