{"uuid": "ac441638-e3c1-4600-8ec3-c81fd5b40b88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55592", "type": "seen", "source": "https://t.me/cvedetector/20092", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55592 - FortiSIEM Authorization Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-55592 \nPublished : March 11, 2025, 3:15 p.m. | 1\u00a0hour ago \nDescription : An incorrect authorization vulnerability [CWE-863] in FortiSIEM 7.2 all versions, 7.1 all versions, 7.0 all versions, 6.7 all versions, 6.6 all versions, 6.5 all versions, 6.4 all versions, 6.3 all versions, 6.2 all versions, 6.1 all versions, 5.4 all versions, 5.3 all versions, may allow an authenticated attacker to perform unauthorized operations on incidents via crafted HTTP requests. \nSeverity: 3.8 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-11T17:37:38.000000Z"}