SAP® and Oracle® Security Advisories

Onapsis Research Labs is the world’s leading team of security experts who combine their deep knowledge of critical ERP applications and decades of threat research experience to deliver impactful security insights and threat intelligence focused on the business-critical applications from SAP, Oracle, and SaaS providers. Onapsis Research Labs is, far and away, the most prolific and most celebrated contributor of vulnerability research by the SAP Product Security Response Team. No other research team comes close.
11/09/2015
SAP HANA TrexNet TNS Information Disclosure
By exploiting this vulnerability, an unauthenticated attacker could obtain technical information of the SAP HANA System which could help facilitate further attacks against the system. Please fill in the following form in order to download the selected Onapsis’ resource. The system will send you a download link to your email. By registering, you will obtain…
11/09/2015
SAP HANA TrexNet Remote Denial of Service
By exploiting this vulnerability, an unauthenticated attacker could render the SAP HANA system completely unavailable due to a system shutdown. Any business process or information hosted in the system will became automatically unavailable. Please fill in the following form in order to download the selected Onapsis’ resource. The system will send you a download link…
11/09/2015
SAP HANA TrexNet Remote Directory Copy
By exploiting this SAP HANA vulnerability, an unauthenticated attacker could copy business-relevant information from the SAP HANA System and render the system unavailable. Please fill in the following form in order to download the selected Onapsis’ resource. The system will send you a download link to your email. By registering, you will obtain the following…
11/09/2015
SAP HANA TrexNet Remote Directory Creation
By exploiting this SAP HANA vulnerability, an unauthenticated attacker could render the system unavailable and potentially overwrite information. Please fill in the following form in order to download the selected Onapsis’ resource. The system will send you a download link to your email. By registering, you will obtain the following benefits:
11/09/2015
SAP HANA TrexNet Remote Directory Deletion
By exploiting this SAP HANA vulnerability, an unauthenticated attacker could delete business-relevant information from the SAP HANA System and could also render the system unavailable. Please fill in the following form in order to download the selected Onapsis’ resource. The system will send you a download link to your email. By registering, you will obtain…
11/09/2015
SAP HANA TrexNet Remote Environment Disclosure
By exploiting this vulnerability, an unauthenticated attacker could obtain technical information that could be used by an attacker to facilitate a targeted attack. Please fill in the following form in order to download the selected Onapsis’ resource. The system will send you a download link to your email. By registering, you will obtain the following…
11/09/2015
SAP HANA TrexNet Remote File Copy
By exploiting this vulnerability, an unauthenticated attacker could copy business-relevant information from the SAP HANA System, allowing it to be easily accessed and render the system unavailable. Please fill in the following form in order to download the selected Onapsis’ resource. The system will send you a download link to your email. By registering, you…
11/09/2015
SAP HANA TrexNet Remote File Creation
By exploiting this vulnerability, an unauthenticated attacker could potentially render the system unavailable. Please fill in the following form in order to download the selected Onapsis’ resource. The system will send you a download link to your email. By registering, you will obtain the following benefits:
11/09/2015
SAP HANA TrexNet Remote File Deletion
Please fill in the following form in order to download the selected Onapsis’ resource. The system will send you a download link to your email. By registering, you will obtain the following benefits:
