{"vulnerability": "CVE-2024-36508", "sightings": [{"uuid": "1041f66d-7dc1-44f3-9772-6e74be4d3d11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36508", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhwbkawrp22w", "content": "", "creation_timestamp": "2025-02-11T18:20:19.076934Z"}, {"uuid": "70591059-9b34-40b3-85c0-1a300f1b86a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36508", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113986226670304919", "content": "", "creation_timestamp": "2025-02-11T16:36:29.319103Z"}, {"uuid": "b90e66fc-deb3-4aae-9435-7513070b3b40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36508", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhw5y2uyry2d", "content": "", "creation_timestamp": "2025-02-11T17:16:25.791004Z"}, {"uuid": "649b7f42-d157-4f9f-9411-81657175902e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36508", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113986497919466758", "content": "", "creation_timestamp": "2025-02-11T17:45:29.052655Z"}, {"uuid": "e3660525-0c64-4fb0-b779-0123cf005da5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36508", "type": "seen", "source": "https://t.me/cvedetector/17728", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-36508 - Fortinet FortiManager FortiAnalyzer Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-36508 \nPublished : Feb. 11, 2025, 5:15 p.m. | 58\u00a0minutes ago \nDescription : An improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability [CWE-22] in Fortinet FortiManager version 7.4.0 through 7.4.2 and before 7.2.5 and Fortinet FortiAnalyzer version 7.4.0 through 7.4.2 and before 7.2.5 CLI allows an authenticated admin user with diagnose privileges to delete files on the system. \nSeverity: 6.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T19:53:01.000000Z"}]}