cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2018-2437,https://securityvulnerability.io/vulnerability/CVE-2018-2437,,"The SAP Internet Graphics Service (IGS), 7.20, 7.20EXT, 7.45, 7.49, 7.53, allows an attacker to externally trigger IGS command executions which can lead to: disclosure of information and malicious file insertion or modification.",SAP,SAP Internet Graphics Server (igs),9.1,CRITICAL,0.005539999809116125,false,false,false,false,,false,false,2018-07-10T18:00:00.000Z,0 CVE-2018-2438,https://securityvulnerability.io/vulnerability/CVE-2018-2438,,"The SAP Internet Graphics Server (IGS), 7.20, 7.20EXT, 7.45, 7.49, 7.53, has several denial-of-service vulnerabilities that allow an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service.",SAP,SAP Internet Graphics Server (igs),7.5,HIGH,0.0022799998987466097,false,false,false,false,,false,false,2018-07-10T18:00:00.000Z,0 CVE-2018-2439,https://securityvulnerability.io/vulnerability/CVE-2018-2439,,"The SAP Internet Graphics Server (IGS), 7.20, 7.20EXT, 7.45, 7.49, 7.53, has insufficient request validation (for example, where the request is validated for authenticity and validity) and under certain conditions, will process invalid requests. Several areas of the SAP Internet Graphics Server (IGS) did not require sufficient input validation. Namely, the SAP Internet Graphics Server (IGS) HTTP and RFC listener, SAP Internet Graphics Server (IGS) portwatcher when registering a portwatcher to the multiplexer and the SAP Internet Graphics Server (IGS) multiplexer had insufficient input validation and thus allowing a malformed data packet to cause a crash.",SAP,SAP Internet Graphics Server (igs),5.9,MEDIUM,0.0035200000274926424,false,false,false,false,,false,false,2018-07-10T18:00:00.000Z,0 CVE-2018-2420,https://securityvulnerability.io/vulnerability/CVE-2018-2420,,"SAP Internet Graphics Server (IGS), 7.20, 7.20EXT, 7.45, 7.49, 7.53, allows an attacker to upload any file (including script files) without proper file format validation.",SAP,SAP Internet Graphics Server (igs),6.5,MEDIUM,0.00419999985024333,false,false,false,false,,false,false,2018-05-09T20:00:00.000Z,0 CVE-2018-2423,https://securityvulnerability.io/vulnerability/CVE-2018-2423,,"SAP Internet Graphics Server (IGS), 7.20, 7.20EXT, 7.45, 7.49, 7.53, HTTP and RFC listener allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service.",SAP,SAP Internet Graphics Server (igs),5.3,MEDIUM,0.0022799998987466097,false,false,false,false,,false,false,2018-05-09T20:00:00.000Z,0 CVE-2018-2421,https://securityvulnerability.io/vulnerability/CVE-2018-2421,,"SAP Internet Graphics Server (IGS) Portwatcher, 7.20, 7.20EXT, 7.45, 7.49, 7.53, allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service.",SAP,SAP Internet Graphics Server (igs),5.3,MEDIUM,0.0022799998987466097,false,false,false,false,,false,false,2018-05-09T20:00:00.000Z,0 CVE-2018-2422,https://securityvulnerability.io/vulnerability/CVE-2018-2422,,"SAP Internet Graphics Server (IGS) Portwatcher, 7.20, 7.20EXT, 7.45, 7.49, 7.53, allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service.",SAP,SAP Internet Graphics Server (igs),5.3,MEDIUM,0.0022799998987466097,false,false,false,false,,false,false,2018-05-09T20:00:00.000Z,0