{"vulnerability": "CVE-2023-47539", "sightings": [{"uuid": "89aa3ccc-a2e5-448a-a92d-8f2bfdfa81df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47539", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114184004069734379", "content": "", "creation_timestamp": "2025-03-18T14:53:53.027084Z"}, {"uuid": "c889d8bc-aa64-4dbd-af57-eeae7c0b791b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47539", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114184219907988138", "content": "", "creation_timestamp": "2025-03-18T15:48:47.095021Z"}, {"uuid": "c764588e-50db-4f8e-918f-aba5ced1bad7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47539", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lko6ftznmw24", "content": "", "creation_timestamp": "2025-03-18T17:18:25.694567Z"}, {"uuid": "82fb2a50-3817-4642-9fbd-4cbc2488f831", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47539", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lkpzqbqtro2z", "content": "", "creation_timestamp": "2025-03-19T11:00:07.044034Z"}, {"uuid": "92e1a1b1-bf52-4345-bf2e-e50f34b218f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47539", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lkoriu4lqs24", "content": "", "creation_timestamp": "2025-03-18T23:00:08.316117Z"}, {"uuid": "b466b9ca-a6c0-47b0-82a5-9bd79cb625ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47539", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8023", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-47539\n\ud83d\udd25 CVSS Score: 9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:X/RC:X)\n\ud83d\udd39 Description: An improper access control vulnerability in FortiMail version 7.4.0 configured with RADIUS authentication and remote_wildcard enabled may allow a remote unauthenticated attacker to bypass admin login via a crafted HTTP request.\n\ud83d\udccf Published: 2025-03-18T13:56:56.681Z\n\ud83d\udccf Modified: 2025-03-19T03:55:48.590Z\n\ud83d\udd17 References:\n1. https://fortiguard.com/psirt/FG-IR-23-439", "creation_timestamp": "2025-03-19T04:48:53.000000Z"}]}