cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2018-2415,https://securityvulnerability.io/vulnerability/CVE-2018-2415,,"SAP NetWeaver Application Server Java Web Container and HTTP Service (Engine API, from 7.10 to 7.11, 7.30, 7.31, 7.40, 7.50; J2EE Engine Server Core 7.11, 7.30, 7.31, 7.40, 7.50) do not sufficiently encode user controlled inputs, resulting in a content spoofing vulnerability when error pages are displayed.",SAP,"SAP Netweaver Application Server (engine Api),SAP Netweaver Application Server (j2ee Engine Server Core)",4.7,MEDIUM,0.0013899999903514981,false,false,false,false,,false,false,2018-05-09T20:00:00.000Z,0 CVE-2010-2347,https://securityvulnerability.io/vulnerability/CVE-2010-2347,,"The Telnet interface in the SAP J2EE Engine Core (SAP-JEECOR) 6.40 through 7.02, and Server Core (SERVERCORE) 7.10 through 7.30 allows remote authenticated users to bypass a security check and conduct SMB relay attacks via unspecified vectors.",SAP,J2ee Engine Core,,,0.0018700000364333391,false,false,false,false,,false,false,2010-06-21T19:00:00.000Z,0