High
SAP
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could read arbitrary business-relevant information from the SAP HANA System.
Critical
SAP
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could relocate the information stored in the SAP HANA System to make it easily accessible. This could potentially render the system…
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could delete any business-relevant information from the SAP HANA System, affecting the integrity of the data, as well as potentially…
Medium
SAP
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could potentially render the system unavailable.
High
SAP
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could copy business-relevant information from the SAP HANA System, allowing it to be easily accessed and render the system unavailable.
Medium
SAP
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could obtain technical information that could be used by an attacker to facilitate a targeted attack.
Critical
SAP
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could delete business-relevant information from the SAP HANA System and could also render the system unavailable.
Medium
SAP
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could render the system unavailable and potentially overwrite information.
High
SAP
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could copy business-relevant information from the SAP HANA System and render the system unavailable.
High
SAP
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could render the SAP HANA system completely unavailable due to a system shutdown. Any business process or information hosted in the…
Critical
SAP
11/09/2015
By exploiting this vulnerability, an unauthenticated attacker could completely compromise the system and would be able to access and manage any business-relevant information or process.
Medium
SAP
11/08/2015
By exploiting this vulnerability, a remote unauthenticated attacker could remotely read technical information that could potentially grant him access to the system.