<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>SAST BLOG</provider_name><provider_url>https://sast-solutions.com/blog-en</provider_url><author_name>securityblog</author_name><author_url>https://sast-solutions.com/blog-en/author/secruityblog/</author_url><title>10KBLAZE and SAP Security I: All Quiet on the Western Front</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="JB0GlnSUsF"&gt;&lt;a href="https://sast-solutions.com/blog-en/2019/05/10/10kblaze-sap-security/"&gt;10KBLAZE and SAP Security I: All Quiet on the Western Front&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://sast-solutions.com/blog-en/2019/05/10/10kblaze-sap-security/embed/#?secret=JB0GlnSUsF" width="600" height="338" title="&#x201C;10KBLAZE and SAP Security I: All Quiet on the Western Front&#x201D; &#x2014; SAST BLOG" data-secret="JB0GlnSUsF" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://sast-solutions.com/blog-en/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><description>The relevance of SAP security is not new. Nor does it mean that hackers are looking for new ways to hack into SAP systems, e.g. with the 10KBLAZE Exploit construction kit.</description><thumbnail_url>https://sast-blog.akquinet.com/wp-content/uploads/2019/05/Hacker-300x200.jpg</thumbnail_url></oembed>
