RECON could allow an unauthenticated attacker to take control of SAP enterprise applications through the web interface.
from Dark Reading: https://ift.tt/3iVrswu
via IFTTT
RECON could allow an unauthenticated attacker to take control of SAP enterprise applications through the web interface.
from Dark Reading: https://ift.tt/3iVrswu
via IFTTT