{"vulnerability": "CVE-2023-44220", "sightings": [{"uuid": "4d9cb526-39fc-4e4c-9f56-d4ff0a2da581", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44220", "type": "seen", "source": "Telegram/o7Rha5yueMHiX1LIfghQwQJ2hXOAurIrZ11SZQ_J7oY_qQ", "content": "", "creation_timestamp": "2023-10-27T14:30:17.000000Z"}, {"uuid": "b29e7e4e-9dfb-4e5f-beba-79b64b55d504", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44220", "type": "seen", "source": "Telegram/DXaxxkS_ypkGKlCLEBvcXLI7e_HXWMhM1RekQ2WXJiiLVQ", "content": "", "creation_timestamp": "2023-10-27T14:30:17.000000Z"}, {"uuid": "60d0d531-275a-4df6-92b5-ede487b25753", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44220", "type": "seen", "source": "Telegram/0SxH4tw6YHDiUMfTdromdLOD9exOvD8SKMRLPkFsdv2X9A", "content": "", "creation_timestamp": "2023-10-27T14:29:11.000000Z"}, {"uuid": "5212625f-a528-47df-ad53-1bf252aa4d4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44220", "type": "seen", "source": "https://t.me/cibsecurity/73043", "content": "\u203c CVE-2023-44220 \u203c\n\nSonicWall NetExtender Windows (32-bit and 64-bit) client 10.2.336 and earlier versions have a DLL Search Order Hijacking vulnerability in the start-up DLL component. Successful exploitation via a local attacker could result in command execution in the target system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-27T12:17:06.000000Z"}]}