First published: Tue Sep 10 2024(Updated: )
An authenticated attacker with high privilege can use functions of SLCM transactions to which access should be restricted. This may result in an escalation of privileges causing low impact on integrity of the application.
Credit: cna@sap.com
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.