cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-27498,https://securityvulnerability.io/vulnerability/CVE-2023-27498,Memory Corruption vulnerability in SAP Host Agent (SAPOSCOL),"The SAP Host Agent (SAPOSCOL) version 7.22 is susceptible to a memory corruption issue that allows unauthenticated attackers with network access to exploit a server port assigned to the SAP Start Service. By submitting a specially crafted request, attackers can trigger a memory corruption error. This vulnerability can potentially expose technical information about the server without the ability to modify it, and it may lead to temporary service disruptions.",SAP,Host Agent (SAPOSCOL),7.2,HIGH,0.0009200000204145908,false,false,false,false,,false,false,2023-03-14T06:15:00.000Z,0 CVE-2022-35295,https://securityvulnerability.io/vulnerability/CVE-2022-35295,,"In SAP Host Agent (SAPOSCOL) - version 7.22, an attacker may use files created by saposcol to escalate privileges for themselves.",SAP,SAP Host Agent (SAPoscol),4.9,MEDIUM,0.0023900000378489494,false,false,false,false,,false,false,2022-09-13T00:00:00.000Z,0 CVE-2001-0366,https://securityvulnerability.io/vulnerability/CVE-2001-0366,,"saposcol in SAP R/3 Web Application Server Demo before 1.5 trusts the PATH environmental variable to find and execute the expand program, which allows local users to obtain root access by modifying the PATH to point to a Trojan horse expand program.",SAP,"SAPoscol,SAP R 3 Web Application Server Demo",,,0.0004199999966658652,false,false,false,false,,false,false,2001-06-27T04:00:00.000Z,0