Medium
SAP
09/21/2016
By exploiting this vulnerability, an attacker could bypass protections implemented in the SAP systems, potentially executing arbitrary business processes.
Low
SAP
09/21/2016
By exploiting this vulnerability, an attacker could potentially abuse technical functions to access and/or compromise business information.
High
SAP
09/21/2016
By exploiting this vulnerability, an attacker could tamper the audit logs, hiding evidence after an attack to a SAP system.
Critical
SAP
09/21/2016
By exploiting this vulnerability, an authenticated user will be able to take full control of the system.
Critical
SAP
09/21/2016
By exploiting this vulnerability, an authenticated user will be able to take full control of the system.
Critical
SAP
09/21/2016
By exploiting this vulnerability, an authenticated user will be able to take full control of the system.
Critical
SAP
09/21/2016
By exploiting this vulnerability, an authenticated user will be able to take full control of the system.
Critical
SAP
09/21/2016
By exploiting this vulnerability, an authenticated user will be able to take full control of the system.
Critical
SAP
09/21/2016
By exploiting this vulnerability, an authenticated user will be able to take full control of the system.
Medium
SAP
09/21/2016
By exploiting this vulnerability, an attacker could impersonate another person.
Critical
SAP
09/20/2016
By exploiting this vulnerability, an authenticated user will be able to take full control of the system.
Medium
Oracle
07/28/2016
By exploiting this vulnerability, a remote attacker could steal sensitive business information by targeting other users connected to the system.