| 1 |
http://service.sap.com/sap/support/notes/1445998
|
|
|
| 2 |
http://www.onapsis.com/research/publications/sap-security-in-depth-vol4-the-invoker-servlet-a-dangerous-detour-into-sap-java-solutions
|
|
|
| 3 |
http://www.securityfocus.com/bid/48925
|
|
|
| 4 |
http://www.securityfocus.com/bid/90533
|
|
|
| 5 |
http://www.us-cert.gov/ncas/alerts/TA16-132A
|
|
|
| 6 |
https://www.onapsis.com/threat-report-tip-iceberg-wild-exploitation-cyber-attacks-sap-business-applications
|
|
|
| 7 |
http://service.sap.com/sap/support/notes/1445998
|
|
|
| 8 |
https://www.onapsis.com/threat-report-tip-iceberg-wild-exploitation-cyber-attacks-sap-business-applications
|
|
|
| 9 |
http://www.us-cert.gov/ncas/alerts/TA16-132A
|
|
|
| 10 |
http://www.securityfocus.com/bid/90533
|
|
|
| 11 |
http://www.securityfocus.com/bid/48925
|
|
|
| 12 |
http://www.onapsis.com/research/publications/sap-security-in-depth-vol4-the-invoker-servlet-a-dangerous-detour-into-sap-java-solutions
|
|
|