{"uuid": "85b0082d-b33d-4428-b18e-d9e092c5ec93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55591", "type": "published-proof-of-concept", "source": "https://t.me/BugCod3/967", "content": "CVE-2024-55591\n\nA Fortinet FortiOS Authentication Bypass Vulnerable Behaviour Detection\n\nDescription:\nThis script attempts to create a WebSocket connection at a random URI from a pre-authenticated perspective to the FortiOS management interface, and reviews the response to determine if the instance is vulnerable\n\nAffected Versions:\n\u26aa\ufe0f FortiOS 7.0.0 through 7.0.16\n\u26aa\ufe0f FortiProxy 7.0.0 through 7.0.19\n\u26aa\ufe0f FortiProxy 7.2.0 through 7.2.12\n\nGithub\n\n\u2b07\ufe0f Download\n\ud83d\udd12 BugCod3\n\n#Python #CVE #Vulnerable #Detection\n\u2796\u2796\u2796\u2796\u2796\u2796\u2796\u2796\u2796\u2796\n\ud83d\udc64 T.me/BugCod3BOT \n\ud83d\udce3 T.me/BugCod3", "creation_timestamp": "2025-01-17T13:03:55.000000Z"}