SAP Information Disclosure

February 9, 2018

By exploiting this vulnerability, a remote unauthenticated attacker could get information about the system architecture.

Please fill out the form to download the security advisory.