SAP® and Oracle® Security Advisories

Onapsis Research Labs is the world’s leading team of security experts who combine their deep knowledge of critical ERP applications and decades of threat research experience to deliver impactful security insights and threat intelligence focused on the business-critical applications from SAP, Oracle, and SaaS providers. Onapsis Research Labs is, far and away, the most prolific and most celebrated contributor of vulnerability research by the SAP Product Security Response Team. No other research team comes close.
06/14/2018
SAP SCI Information Disclosure HTTP
By exploiting this vulnerability, a remote unauthenticated attacker may discover security vulnerabilities affecting the system, potentially being able to leverage them in a second step. Please fill out the form to download the security advisory.
06/14/2018
SAP SCI Missing Authorization Check
By exploiting this vulnerability, a remote unauthenticated attacker may discover security vulnerabilities affecting the system, potentially being able to leverage them in a second step. Please fill out the form to download the security advisory.
06/14/2018
SAP SDLREG Fixed Key for Encryption
By exploiting this vulnerability an unauthenticated attacker could access and modify any information indexed by the SAP system. Please fill out the form to download the security advisory.
06/14/2018
SAP Two-Factor Authentication Soft-Token Cloning
By exploiting this vulnerability, an attacker who previously accessed a mobile phone connected to an SAP system could potentially access all the business information stored and processed in the SAP system. Please fill out the form to download the security advisory.
06/14/2018
SAP BusinessObjects Information Disclosure via CORBA
By exploiting this vulnerability an attacker could discover information relating to servers. This information could be used to allow the attacker to specialize their attacks. Please fill out the form to download the security advisory.
06/14/2018
SAP Header Injection
By exploiting this vulnerability, a remote unauthenticated attacker could get business information. Please fill out the form to download the security advisory.
06/14/2018
SAP BusinessObjects Remote Denial of Service via CORBA
By exploiting this vulnerability an attacker could shut down all SAP systems. Please fill out the form to download the security advisory.
06/14/2018
SAP Information Disclosure
By exploiting this vulnerability, a remote unauthenticated attacker could get information about the system architecture. Please fill out the form to download the security advisory.
02/09/2018
SAP Mobile Defense and Security Weak Encryption
By exploiting this vulnerability, a remote attacker may obtain clear-text passwords of SAP Mobile Defense and Security users and get critical information. Please fill out the form to download the security advisory.
