{"uuid": "e135182c-455a-4b2b-bdce-da335117e67e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47575", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2377", "content": "CVE-2024-47575 FortiManager\n*\n\u0423\u0434\u0438\u0432\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0431\u044b\u0441\u0442\u0440\u043e \u0443\u0448\u0435\u043b push, \u0434\u0430 \u0435\u0449\u0435 \u0438 \u0437\u0430\u0430\u043f\u0440\u0443\u0432\u0438\u043b\u0438 \u0432 metasploit-framework\n\u041d\u043e \u0442\u0430\u043a \u0438\u043b\u0438 \u0438\u043d\u0430\u0447\u0435 \u043c\u043e\u0434\u0443\u043b\u044c \u0435\u0441\u0442\u044c, \u0436\u043c\u0438 msfupdate ))\n*\nPull Req\n\n#fortinet #metasploit", "creation_timestamp": "2024-11-15T19:54:45.000000Z"}