Technology ❯ Information Security ❯ Threat Intelligence ❯ Active Exploitation
A low-privilege ABAP code injection enables full takeover, making immediate patching critical.