High
SAP
07/20/2016
By exploiting this vulnerability an unauthenticated attacker could modify any information indexed by the SAP system.
Medium
SAP
07/20/2016
By exploiting this vulnerability, a remote unauthenticated attacker could obtain valid usernames that could be used to support more complex attacks.
07/20/2016
By exploiting this vulnerability, a remote unauthenticated attacker could receive high privilleges on the HANA system with unrestricted access to any business information.
Critical
SAP
11/09/2015
By exploiting this vulnerability, a remote unauthenticated attacker could completely compromise the system, and would be able to access and manage any business-relevant information or processes.
Critical
SAP
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could completely compromise the system, and would be able to access and manage any business-relevant information or processes. This could…
High
SAP
11/09/2015
By exploiting this vulnerability, a remote authenticated attacker could render the SAP HANA Platform unavailable to other users until the next process restart.
Medium
SAP
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could obtain technical information of the SAP HANA System which could help facilitate further attacks against the system.
Medium
SAP
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could obtain technical information of the SAP HANA System which could help to facilitate further attacks against the system.
Critical
SAP
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could completely compromise the system, and would be able to access and manage any business-relevant information or processes.
High
SAP
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could render the SAP HANA system completely unavailable due to system shutdown. Any business process or information hosted in the system…
Medium
SAP
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could obtain technical information of the SAP HANA System which could help facilitate further attacks against the system.
Critical
SAP
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could override business-relevant information in the SAP HANA System and could also render the system unavailable due to corrupted data.