cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-22281,https://securityvulnerability.io/vulnerability/CVE-2022-22281,Buffer Overflow Vulnerability in SonicWall SSL-VPN NetExtender Windows Client,"A buffer overflow vulnerability exists in the SonicWall SSL-VPN NetExtender Windows Client, impacting both 32-bit and 64-bit versions up to 10.2.322. This flaw can allow an attacker to exploit the vulnerability, potentially leading to arbitrary code execution in the host Windows operating system. Organizations using affected versions should upgrade to secure their systems against potential exploitation.",Sonicwall,Sonicwall Netextender Windows (32 And 64 Bit) Client,7.8,HIGH,0.0006000000284984708,false,,false,false,false,,,false,false,,2022-05-13T19:40:17.000Z,0 CVE-2020-5147,https://securityvulnerability.io/vulnerability/CVE-2020-5147,,"SonicWall NetExtender Windows client vulnerable to unquoted service path vulnerability, this allows a local attacker to gain elevated privileges in the host operating system. This vulnerability impact SonicWall NetExtender Windows client version 10.2.300 and earlier.",Sonicwall,Sonicwall Netextender,5.3,MEDIUM,0.0005799999926239252,false,,false,false,false,,,false,false,,2021-01-09T00:15:15.000Z,0 CVE-2020-5131,https://securityvulnerability.io/vulnerability/CVE-2020-5131,,"SonicWall NetExtender Windows client vulnerable to arbitrary file write vulnerability, this allows attacker to overwrite a DLL and execute code with the same privilege in the host operating system. This vulnerability impact SonicWall NetExtender Windows client version 9.0.815 and earlier.",Sonicwall,Sonicwall Netextender,7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2020-07-17T17:15:15.000Z,0