cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-22124,https://securityvulnerability.io/vulnerability/CVE-2024-22124,Information Disclosure vulnerability in SAP NetWeaver Internet Communication Manager,"Under certain conditions, Internet Communication Manager (ICM) or SAP Web Dispatcher - versions KERNEL 7.22, KERNEL 7.53, KERNEL 7.54, KRNL64UC 7.22, KRNL64UC 7.22EXT, KRNL64UC 7.53, KRNL64NUC 7.22, KRNL64NUC 7.22_EXT, WEBDISP 7.22_EXT, WEBDISP 7.53, WEBDISP 7.54, could allow an attacker to access information which would otherwise be restricted causing high impact on confidentiality. ",SAP,SAP NetWeaver (Internet Communication Manager),4.1,MEDIUM,0.0011099999537691474,false,false,false,false,,false,false,2024-01-09T02:15:00.000Z,0 CVE-2022-28772,https://securityvulnerability.io/vulnerability/CVE-2022-28772,,"By overlong input values an attacker may force overwrite of the internal program stack in SAP Web Dispatcher - versions 7.53, 7.77, 7.81, 7.85, 7.86, or Internet Communication Manager - versions KRNL64NUC 7.22, 7.22EXT, 7.49, KRNL64UC 7.22, 7.22EXT, 7.49, 7.53, KERNEL 7.22, 7.49, 7.53, 7.77, 7.81, 7.85, 7.86, which makes these programs unavailable, leading to denial of service.",SAP,"SAP Netweaver (internet Communication Manager),SAP Web Dispatcher",7.5,HIGH,0.0010999999940395355,false,false,false,false,,false,false,2022-04-12T16:11:32.000Z,0 CVE-2022-28773,https://securityvulnerability.io/vulnerability/CVE-2022-28773,,"Due to an uncontrolled recursion in SAP Web Dispatcher and SAP Internet Communication Manager, the application may crash, leading to denial of service, but can be restarted automatically. ",SAP,"SAP Netweaver (internet Communication Manager),SAP Web Dispatcher",7.5,HIGH,0.0011599999852478504,false,false,false,false,,false,false,2022-04-12T16:11:30.000Z,0 CVE-2021-33683,https://securityvulnerability.io/vulnerability/CVE-2021-33683,,"SAP Web Dispatcher and Internet Communication Manager (ICM), versions - KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.53, 7.73, WEBDISP 7.53, 7.73, 7.77, 7.81, 7.82, 7.83, KERNEL 7.21, 7.22, 7.49, 7.53, 7.73, 7.77, 7.81, 7.82, 7.83, process invalid HTTP header. The incorrect handling of the invalid Transfer-Encoding header in a particular manner leads to a possibility of HTTP Request Smuggling attack. An attacker could exploit this vulnerability to bypass web application firewall protection, divert sensitive data such as customer requests, session credentials, etc.",SAP,SAP Web Dispatcher And Internet Communication Manager,5.4,MEDIUM,0.000539999979082495,false,false,false,false,,false,false,2021-07-14T11:04:45.000Z,0 CVE-2020-6304,https://securityvulnerability.io/vulnerability/CVE-2020-6304,,"Improper input validation in SAP NetWeaver Internet Communication Manager (update provided in KRNL32NUC & KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT KRNL64NUC & KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49 KERNEL 7.21, 7.49, 7.53) allows an attacker to prevent users from accessing its services through a denial of service.",SAP,"SAP Netweaver Internet Communication Manager (krnl32nuc),SAP Netweaver Internet Communication Manager (krnl32uc),SAP Netweaver Internet Communication Manager (krnl64nuc),SAP Netweaver Internet Communication Manager (krnl64uc),SAP Netweaver Internet Communication Manager (kernel)",5.9,MEDIUM,0.0011599999852478504,false,false,false,false,,false,false,2020-01-14T17:52:59.000Z,0 CVE-2007-3615,https://securityvulnerability.io/vulnerability/CVE-2007-3615,,"Internet Communication Manager (aka ICMAN.exe or ICM) in SAP NetWeaver Application Server 6.x and 7.x, possibly only on Windows, allows remote attackers to cause a denial of service (process crash) via a URI of a certain length that contains a sap-isc-key parameter, related to configuration of a web cache.",SAP,"Internet Communication Manager,SAP Web Application Server",,,0.05753999948501587,false,false,false,false,,false,false,2007-07-06T19:00:00.000Z,0