cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2020-4747,https://securityvulnerability.io/vulnerability/CVE-2020-4747,,"IBM Connect:Direct for UNIX 6.1.0, 6.0.0, 4.3.0, and 4.2.0 can allow a local or remote user to obtain an authenticated CLI session due to improper authentication methods. IBM X-Force ID: 188516.",IBM,Sterling Connect:direct For Unix,7.4,HIGH,0.005009999964386225,false,,false,false,false,,,false,false,,2020-12-15T15:15:00.000Z,0 CVE-2020-4587,https://securityvulnerability.io/vulnerability/CVE-2020-4587,,"IBM Sterling Connect:Direct for UNIX 4.2.0, 4.3.0, 6.0.0, and 6.1.0 is vulnerable to a stack based buffer ovreflow, caused by improper bounds checking. A local attacker could manipulate CD UNIX to obtain root provileges. IBM X-Force ID: 184578.",IBM,"Sterling Connect:direct For Unix,Connect:direct For Unix",8.4,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2020-08-24T16:15:00.000Z,0 CVE-2018-1903,https://securityvulnerability.io/vulnerability/CVE-2018-1903,,"IBM Sterling Connect:Direct for UNIX 4.2.0, 4.3.0, and 6.0.0 could allow a user with restricted sudo access on a system to manipulate CD UNIX to gain full sudo access. IBM X-Force ID: 152532.",IBM,Sterling Connect:direct For Unix,6.7,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2019-04-10T15:29:00.000Z,0