{"vulnerability": "CVE-2024-23112", "sightings": [{"uuid": "f29e0fa1-715b-4b41-aa5b-18fa39dec43e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23112", "type": "seen", "source": "https://t.me/ctinow/205812", "content": "https://ift.tt/cF9JBtz\nCVE-2024-23112", "creation_timestamp": "2024-03-12T16:26:45.000000Z"}, {"uuid": "8fbcdd16-475f-44c0-b256-96693350f9c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23112", "type": "seen", "source": "https://t.me/arpsyndicate/4197", "content": "#ExploitObserverAlert\n\nCVE-2024-23112\n\nDESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-23112. An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiOS version 7.4.0 through 7.4.1, 7.2.0 through 7.2.6, 7.0.1 through 7.0.13, 6.4.7 through 6.4.14, and FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14 SSL-VPN may allow an authenticated attacker to gain access to another user\u2019s bookmark via URL manipulation.", "creation_timestamp": "2024-03-13T22:29:40.000000Z"}, {"uuid": "ad8487b5-6d12-4606-a453-63070efa58d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23112", "type": "seen", "source": "https://t.me/ctinow/205828", "content": "https://ift.tt/cF9JBtz\nCVE-2024-23112", "creation_timestamp": "2024-03-12T16:32:14.000000Z"}]}