Medium
SAP
07/20/2016
By exploiting this vulnerability, an attacker could discover information relating to servers. This information could be used to allow the attacker to specialize their attacks.
07/20/2016
By exploiting this vulnerability, a remote unauthenticated attacker could access arbitrary business information from the SAP system.
High
SAP
07/20/2016
By exploiting this vulnerability, a remote unauthenticated attacker could access arbitrary business information from the SAP system.
Critical
SAP
07/20/2016
By exploiting this vulnerability, an unauthenticated attacker could access and modify any information indexed by the SAP system.
High
SAP
07/20/2016
By exploiting this vulnerability an unauthenticated attacker could modify any information indexed by the SAP system.
Medium
SAP
07/20/2016
By exploiting this vulnerability, a remote unauthenticated attacker could obtain valid usernames that could be used to support more complex attacks.
07/20/2016
By exploiting this vulnerability, a remote unauthenticated attacker could receive high privilleges on the HANA system with unrestricted access to any business information.
Critical
SAP
11/09/2015
By exploiting this vulnerability, a remote unauthenticated attacker could completely compromise the system, and would be able to access and manage any business-relevant information or processes.
Critical
SAP
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could completely compromise the system, and would be able to access and manage any business-relevant information or processes. This could…
High
SAP
11/09/2015
By exploiting this vulnerability, a remote authenticated attacker could render the SAP HANA Platform unavailable to other users until the next process restart.
Medium
SAP
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could obtain technical information of the SAP HANA System which could help facilitate further attacks against the system.
Medium
SAP
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could obtain technical information of the SAP HANA System which could help to facilitate further attacks against the system.