cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-44219,https://securityvulnerability.io/vulnerability/CVE-2023-44219,Local Privilege Escalation Vulnerability in SonicWall Directory Services Connector,"A local privilege escalation vulnerability exists in SonicWall Directory Services Connector Windows MSI client versions 4.1.21 and earlier. This flaw allows a low-privileged local user to execute the recovery feature, potentially granting them escalated system privileges. Mitigating this vulnerability is crucial to maintain the integrity and security of affected systems. Users are encouraged to review their installations and update to secure versions.",Sonicwall,Directory Services Connector,7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2023-10-27T08:15:00.000Z,0 CVE-2020-5148,https://securityvulnerability.io/vulnerability/CVE-2020-5148,,"SonicWall SSO-agent default configuration uses NetAPI to probe the associated IP's in the network, this client probing method allows a potential attacker to capture the password hash of the privileged user and potentially forces the SSO Agent to authenticate allowing an attacker to bypass firewall access controls.",Sonicwall,Directory Services Connector,8.2,HIGH,0.0008200000156648457,false,,false,false,false,,,false,false,,2021-03-05T03:45:14.000Z,0