Security Advisories

The Onapsis Research Labs delivers regular SAP® and Oracle® vulnerability research to our ecosystem of customers, partners and the information security industry.

Onapsis security advisories enable customers to better understand the security and business implications of discovered SAP and Oracle security issues. This enables organizations to prioritize patches, updates and their remediation strategies to ensure continuity of the business. Onapsis security advisories, together with vendor patches and security notes, are available for download to provide vendors and end-users with the necessary information to mitigate advanced threats to mission-critical applications running on SAP and Oracle.

Medium
Oracle
09/21/2016
By exploiting this vulnerability, a remote attacker could steal sensitive business information by targeting other users connected to the system.
Medium
Oracle
09/21/2016
By exploiting this vulnerability, a remote attacker could steal sensitive business information by targeting other users connected to the system.
Medium
Oracle
09/21/2016
By exploiting this vulnerability, a remote attacker could steal sensitive business information by targeting other users connected to the system.
Medium
SAP
09/21/2016
By exploiting this vulnerability, an attacker could bypass protections implemented in the SAP systems, potentially executing arbitrary business processes.
Low
SAP
09/21/2016
By exploiting this vulnerability, an attacker could potentially abuse technical functions to access and/or compromise business information.
High
SAP
09/21/2016
By exploiting this vulnerability, an attacker could tamper the audit logs, hiding evidence after an attack to a SAP system.
Critical
SAP
09/21/2016
By exploiting this vulnerability, an authenticated user will be able to take full control of the system.
Critical
SAP
09/21/2016
By exploiting this vulnerability, an authenticated user will be able to take full control of the system.
Critical
SAP
09/21/2016
By exploiting this vulnerability, an authenticated user will be able to take full control of the system.
Critical
SAP
09/21/2016
By exploiting this vulnerability, an authenticated user will be able to take full control of the system.
Critical
SAP
09/21/2016
By exploiting this vulnerability, an authenticated user will be able to take full control of the system.
Critical
SAP
09/21/2016
By exploiting this vulnerability, an authenticated user will be able to take full control of the system.