{"uuid": "81339bb7-47eb-4b72-bac9-0a282cce8b8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37930", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10924", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-37930\n\ud83d\udd25 CVSS Score: 6.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)\n\ud83d\udd39 Description: Multiple issues including the use of uninitialized ressources [CWE-908] and excessive iteration [CWE-834] vulnerabilities in Fortinet FortiOS SSL VPN webmode version 7.4.0, version 7.2.0 through 7.2.5, version 7.0.1 through 7.0.11 and version 6.4.7 through 6.4.14 and Fortinet FortiProxy SSL VPN webmode version 7.2.0 through 7.2.6 and version 7.0.0 through 7.0.12 allows a VPN user to corrupt memory potentially leading to code or commands execution via specifically crafted requests.\n\ud83d\udccf Published: 2025-04-08T14:03:38.016Z\n\ud83d\udccf Modified: 2025-04-08T14:27:09.944Z\n\ud83d\udd17 References:\n1. https://fortiguard.com/psirt/FG-IR-23-165", "creation_timestamp": "2025-04-08T14:47:17.000000Z"}