{"vulnerability": "CVE-2023-37930", "sightings": [{"uuid": "5501e8bd-7e90-46da-8fe8-f0838d02831a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37930", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmcygegpo62u", "content": "", "creation_timestamp": "2025-04-08T17:22:27.037182Z"}, {"uuid": "81339bb7-47eb-4b72-bac9-0a282cce8b8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37930", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10924", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-37930\n\ud83d\udd25 CVSS Score: 6.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)\n\ud83d\udd39 Description: Multiple issues including the use of uninitialized ressources [CWE-908] and excessive iteration [CWE-834] vulnerabilities in Fortinet FortiOS SSL VPN webmode version 7.4.0, version 7.2.0 through 7.2.5, version 7.0.1 through 7.0.11 and version 6.4.7 through 6.4.14 and Fortinet FortiProxy SSL VPN webmode version 7.2.0 through 7.2.6 and version 7.0.0 through 7.0.12 allows a VPN user to corrupt memory potentially leading to code or commands execution via specifically crafted requests.\n\ud83d\udccf Published: 2025-04-08T14:03:38.016Z\n\ud83d\udccf Modified: 2025-04-08T14:27:09.944Z\n\ud83d\udd17 References:\n1. https://fortiguard.com/psirt/FG-IR-23-165", "creation_timestamp": "2025-04-08T14:47:17.000000Z"}, {"uuid": "4cd77137-65a3-4047-8a47-4c452f0b5816", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37930", "type": "seen", "source": "https://t.me/cvedetector/22471", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-37930 - Fortinet FortiOS and FortiProxy Uninitialized Resource and Excessive Iteration Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-37930 \nPublished : April 8, 2025, 2:15 p.m. | 1\u00a0hour, 12\u00a0minutes ago \nDescription : Multiple issues including the use of uninitialized ressources [CWE-908] and excessive iteration [CWE-834] vulnerabilities in Fortinet FortiOS SSL VPN webmode version 7.4.0, version 7.2.0 through 7.2.5, version 7.0.1 through 7.0.11 and version 6.4.7 through 6.4.14 and Fortinet FortiProxy SSL VPN webmode version 7.2.0 through 7.2.6 and version 7.0.0 through 7.0.12 allows a VPN user to corrupt memory potentially leading to code or commands execution via specifically crafted requests. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T18:11:08.000000Z"}]}