cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2022-26100,https://securityvulnerability.io/vulnerability/CVE-2022-26100,,"SAPCAR - version 7.22, does not contain sufficient input validation on the SAPCAR archive. As a result, the SAPCAR process may crash, and the attacker may obtain privileged access to the system.",SAP,SAPcar,9.8,CRITICAL,0.0024399999529123306,false,false,false,false,,false,false,2022-03-10T17:47:00.000Z,0 CVE-2017-8852,https://securityvulnerability.io/vulnerability/CVE-2017-8852,,SAP SAPCAR 721.510 has a Heap Based Buffer Overflow Vulnerability. It could be exploited with a crafted CAR archive file received from an untrusted remote source. The problem is that the length of data written is an arbitrary number found within the file. The vendor response is SAP Security Note 2441560.,SAP,SAPcar,7.8,HIGH,0.004679999779909849,false,false,false,false,,false,false,2017-05-10T17:00:00.000Z,0 CVE-2016-5847,https://securityvulnerability.io/vulnerability/CVE-2016-5847,,"SAP SAPCAR allows local users to change the permissions of arbitrary files and consequently gain privileges via a hard link attack on files extracted from an archive, possibly related to SAP Security Note 2327384.",SAP,SAPcar Archive Tool,5.8,MEDIUM,0.0004600000102072954,false,false,false,false,,false,false,2016-08-13T01:59:00.000Z,0 CVE-2016-5845,https://securityvulnerability.io/vulnerability/CVE-2016-5845,,"SAP SAPCAR does not check the return value of file operations when extracting files, which allows remote attackers to cause a denial of service (program crash) via an invalid file name in an archive file, aka SAP Security Note 2312905.",SAP,SAPcar,5.5,MEDIUM,0.003819999983534217,false,false,false,false,,false,false,2016-08-13T01:59:00.000Z,0