{"vulnerability": "CVE-2024-40584", "sightings": [{"uuid": "9e68640d-f843-44f6-96a9-fc7407fa1e9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40584", "type": "seen", "source": "https://t.me/cvedetector/17729", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40584 - Fortinet FortiAnalyzer/FortiManager/FortiAnalyzer BigData/FortiAnalyzer Cloud/FortiManager Cloud OS Command Injection\", \n  \"Content\": \"CVE ID : CVE-2024-40584 \nPublished : Feb. 11, 2025, 5:15 p.m. | 58\u00a0minutes ago \nDescription : An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiAnalyzer version 7.4.0 through 7.4.3, 7.2.0 through 7.2.5, 7.0.0 through 7.0.13, 6.4.0 through 6.4.15 and 6.2.2 through 6.2.13, Fortinet FortiManager version 7.4.0 through 7.4.3, 7.2.0 through 7.2.5, 7.0.0 through 7.0.13, 6.4.0 through 6.4.15 and 6.2.2 through 6.2.13, Fortinet FortiAnalyzer BigData version 7.4.0, 7.2.0 through 7.2.7, 7.0.1 through 7.0.6, 6.4.5 through 6.4.7 and 6.2.5, Fortinet FortiAnalyzer Cloud version 7.4.1 through 7.4.3, 7.2.1 through 7.2.5, 7.0.1 through 7.0.13 and 6.4.1 through 6.4.7 and Fortinet FortiManager Cloud version 7.4.1 through 7.4.3, 7.2.1 through 7.2.5, 7.0.1 through 7.0.13 and 6.4.1 through 6.4.7 GUI allows an authenticated privileged attacker to execute unauthorized code or commands via crafted HTTPS or HTTP requests. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T19:53:02.000000Z"}, {"uuid": "6e826774-0495-4938-8ff6-1d752263e7d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40584", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113986226684431983", "content": "", "creation_timestamp": "2025-02-11T16:36:29.734935Z"}, {"uuid": "c2972ea8-4e7f-45c6-babc-a310369b3c5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40584", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhw5y63pwd2s", "content": "", "creation_timestamp": "2025-02-11T17:16:28.985454Z"}, {"uuid": "116b9c04-daaa-4c98-9352-b89486a850bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40584", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113986497919466758", "content": "", "creation_timestamp": "2025-02-11T17:45:29.216683Z"}, {"uuid": "478776b2-013d-482a-b16d-9cdc96978dcf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40584", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhwbkap75422", "content": "", "creation_timestamp": "2025-02-11T18:20:17.581600Z"}]}