Hi expect,
My leader wants to know if there is a vulnerability that can destroy the system program without logging in to the system.
(Even though I think it's impossible.)
It seems to have something to do with SAP basis. I'm just an ABAPer What I said can't make him believe.
I hope you can answer my questions from a professional perspective. Thank you in advanceļ¼