{"vulnerability": "CVE-2023-42791", "sightings": [{"uuid": "7319f838-17ef-4839-9bc4-dad14a3e3569", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42791", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3ljitwsduk423", "content": "", "creation_timestamp": "2025-03-03T21:02:35.236079Z"}, {"uuid": "cdc0bdc1-e6c6-48b4-b070-b601b72acfb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42791", "type": "seen", "source": "https://t.me/arpsyndicate/3823", "content": "#ExploitObserverAlert\n\nCVE-2023-42791\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-42791. A relative path traversal in Fortinet FortiManager version 7.4.0 and 7.2.0 through 7.2.3 and 7.0.0 through 7.0.8 and 6.4.0 through 6.4.12 and 6.2.0 through 6.2.11 allows attacker to execute unauthorized code or commands via crafted HTTP requests.", "creation_timestamp": "2024-02-21T14:55:35.000000Z"}, {"uuid": "175d4dff-1bc4-491a-8c30-3481c133d12a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42791", "type": "seen", "source": "https://bsky.app/profile/synacktiv.com/post/3lihayfalec2p", "content": "", "creation_timestamp": "2025-02-18T12:25:33.935234Z"}, {"uuid": "4fbb7d49-4005-4b34-8c50-6bec971f6358", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42791", "type": "seen", "source": "https://t.me/ctinow/188602", "content": "https://ift.tt/xXGyocU\nCVE-2023-42791", "creation_timestamp": "2024-02-20T15:26:55.000000Z"}, {"uuid": "62f97c2e-957c-4de7-86bc-c3db5606541b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42791", "type": "seen", "source": "https://t.me/ctinow/203369", "content": "https://ift.tt/K1rkRhj\nCVE-2023-42791 | Fortinet FortiManager/FortiAnalyzer up to 6.2.11/6.4.12/7.0.8/7.2.3/7.4.0 HTTP Request path traversal (FG-IR-23-189)", "creation_timestamp": "2024-03-08T15:21:57.000000Z"}, {"uuid": "22cfae15-71f3-4977-af22-a2a0898e5334", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42791", "type": "seen", "source": "https://t.me/ctinow/188595", "content": "https://ift.tt/xXGyocU\nCVE-2023-42791", "creation_timestamp": "2024-02-20T15:21:53.000000Z"}]}