{"uuid": "b466b9ca-a6c0-47b0-82a5-9bd79cb625ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47539", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8023", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-47539\n\ud83d\udd25 CVSS Score: 9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:X/RC:X)\n\ud83d\udd39 Description: An improper access control vulnerability in FortiMail version 7.4.0 configured with RADIUS authentication and remote_wildcard enabled may allow a remote unauthenticated attacker to bypass admin login via a crafted HTTP request.\n\ud83d\udccf Published: 2025-03-18T13:56:56.681Z\n\ud83d\udccf Modified: 2025-03-19T03:55:48.590Z\n\ud83d\udd17 References:\n1. https://fortiguard.com/psirt/FG-IR-23-439", "creation_timestamp": "2025-03-19T04:48:53.000000Z"}