SAP® and Oracle® Security Advisories

Onapsis Research Labs is the world’s leading team of security experts who combine their deep knowledge of critical ERP applications and decades of threat research experience to deliver impactful security insights and threat intelligence focused on the business-critical applications from SAP, Oracle, and SaaS providers. Onapsis Research Labs is, far and away, the most prolific and most celebrated contributor of vulnerability research by the SAP Product Security Response Team. No other research team comes close.
06/14/2018
SAP SCI Information Disclosure HTTP
By exploiting this vulnerability, a remote unauthenticated attacker may discover security vulnerabilities affecting the system, potentially being able to leverage them in a second step. Please fill out the form to download the security advisory.
06/14/2018
SAP SCI Missing Authorization Check
By exploiting this vulnerability, a remote unauthenticated attacker may discover security vulnerabilities affecting the system, potentially being able to leverage them in a second step. Please fill out the form to download the security advisory.
06/13/2018
Oracle E-Business Suite SQL Injection in DataManagerServer
By exploiting this vulnerability, an unauthenticated attacker could execute arbitrary SQL statements. Please fill out the form to download the security advisory.
02/09/2018
Oracle E-Business Suite Information Disclosure
By exploiting this vulnerability, a remote unauthenticated attacker could get access to sensitive information. Please fill out the form to download the security advisory.
02/09/2018
Oracle E-Business Suite Missing Authorization
By exploiting this vulnerability, a remote authenticated attacker could modify calendar events. Please fill out the form to download the security advisory.
02/09/2018
Oracle E-Business Suite Multiple XSS
By exploiting this vulnerability, a remote attacker could steal sensitive business information by targeting other users connected to the system. Please fill out the form to download the security advisory.
02/09/2018
Oracle E-Business Suite SQL Injections
By exploiting this vulnerability, unauthenticated attacker could execute arbitrary SQL statements. Please fill out the form to download the security advisory.
02/09/2018
SAP Information Disclosure
By exploiting this vulnerability, a remote unauthenticated attacker could get information about the system architecture. Please fill out the form to download the security advisory.
02/09/2018
SAP Java CSV Injection
By exploiting this vulnerability, an unauthenticated attacker could inject malicious code in the back-office application to get or modify information systems. Please fill out the form to download the security advisory.
