{"uuid": "6f672f12-5d44-4277-860e-1e31acd959e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-6207", "type": "published-proof-of-concept", "source": "https://t.me/cKure/3781", "content": "\u25a0\u25a0\u25a0\u25a1\u25a1 #Zeroday: A publicly available fully-functional exploit that could be used to target SAP enterprise software.\n\nThe exploit leverages a vulnerability, tracked as\u00a0CVE-2020-6207, that stems from a missing authentication check in SAP Solution Manager (SolMan) version 7.2.\n\nhttps://thehackernews.com/2021/01/beware-fully-functional-released-online.html", "creation_timestamp": "2021-01-23T09:55:55.000000Z"}