SAP® and Oracle® Security Advisories

Onapsis Research Labs is the world’s leading team of security experts who combine their deep knowledge of critical ERP applications and decades of threat research experience to deliver impactful security insights and threat intelligence focused on the business-critical applications from SAP, Oracle, and SaaS providers. Onapsis Research Labs is, far and away, the most prolific and most celebrated contributor of vulnerability research by the SAP Product Security Response Team. No other research team comes close.
11/09/2015
SAP HANA TrexNet Remote File Move
By exploiting this vulnerability, an unauthenticated attacker could relocate the information stored in the SAP HANA System to make it easily accessible. This could potentially render the system unavailable due to a non-integral file system. Please fill in the following form in order to download the selected Onapsis’ resource. The system will send you a…
11/09/2015
SAP HANA TrexNet Remote File Read
By exploiting this vulnerability, an unauthenticated attacker could read arbitrary business-relevant information from the SAP HANA System. Please fill in the following form in order to download the selected Onapsis’ resource. The system will send you a download link to your email. By registering, you will obtain the following benefits:
11/08/2015
SAP HANA Remote Trace Disclosure
By exploiting this vulnerability, a remote unauthenticated attacker could remotely read technical information that could potentially grant him access to the system. Please fill in the following form in order to download the selected Onapsis’ resource. The system will send you a download link to your email. By registering, you will obtain the following benefits:
09/29/2015
SAP HANA XSS in user creation through Web-based development
Please fill in the following form in order to download the selected Onapsis’ resource. The system will send you a download link to your email. By registering, you will obtain the following benefits:
09/29/2015
SAP HANA Drop Credentials SQL injection
Please fill in the following form in order to download the selected Onapsis’ resource. The system will send you a download link to your email. By registering, you will obtain the following benefits:
09/29/2015
SAP HANA hdbsql Multiple Memory Corruption Vulnerabilities
Please fill in the following form in order to download the selected Onapsis’ resource. The system will send you a download link to your email. By registering, you will obtain the following benefits:
09/29/2015
SAP HANA SQL injection in getSQLTraceConfiguration function
Please fill in the following form in order to download the selected Onapsis’ resource. The system will send you a download link to your email. By registering, you will obtain the following benefits:
09/29/2015
SAP HANA SQL Injection ModifyUser
Please fill in the following form in order to download the selected Onapsis’ resource. The system will send you a download link to your email. By registering, you will obtain the following benefits:
09/29/2015
SAP HANA SQL Injection newUser
Please fill in the following form in order to download the selected Onapsis’ resource. The system will send you a download link to your email. By registering, you will obtain the following benefits:
