Exploitation of the bug can allow an attacker to lift sensitive information, delete files, execute code, carry out sabotage and more.
- DOWNLOAD OUR FREE EBOOK: The 2019 Definitive Guide To Selecting A Competent, Reliable & Affordable IT Company In Dubai
- Client Testimonials | 8½ Things We Do Better | Contact Us
- Services: IT Support Dubai
** This post was originally published on https://threatpost.com/critical-sap-bug-enterprise-system-takeover/157392/ **