{"vulnerability": "CVE-2024-46662", "sightings": [{"uuid": "79cae99f-cbe2-497f-9535-a8fdeca06324", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46662", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113827355879730690", "content": "", "creation_timestamp": "2025-01-14T15:13:33.928713Z"}, {"uuid": "be5d050e-9ee8-4f19-8525-77a5057e487f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46662", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114161569079957523", "content": "", "creation_timestamp": "2025-03-14T15:48:24.318232Z"}, {"uuid": "da58d5c9-7ee6-4152-8aef-f02b403dcb6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46662", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lke2qhkenw2n", "content": "", "creation_timestamp": "2025-03-14T16:46:17.670215Z"}, {"uuid": "c9c51cd4-5d7d-4de0-9a41-0e875a9bd8d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46662", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114162103566286961", "content": "", "creation_timestamp": "2025-03-14T18:04:18.154587Z"}, {"uuid": "4274bfde-98de-48fb-83b9-a28c1cddb87f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46662", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7668", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-46662\n\ud83d\udd25 CVSS Score: 8.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:W/RC:C)\n\ud83d\udd39 Description: A improper neutralization of special elements used in a command ('command injection') in Fortinet FortiManager versions 7.4.1 through 7.4.3, FortiManager Cloud versions 7.4.1 through 7.4.3 allows attacker to escalation of privilege via specifically crafted packets\n\ud83d\udccf Published: 2025-03-14T15:03:27.830Z\n\ud83d\udccf Modified: 2025-03-15T03:55:27.259Z\n\ud83d\udd17 References:\n1. https://fortiguard.fortinet.com/psirt/FG-IR-24-222", "creation_timestamp": "2025-03-15T04:45:21.000000Z"}, {"uuid": "40d3581f-d0bf-45dd-a6f5-5ed2122daf56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46662", "type": "seen", "source": "https://t.me/cvedetector/20291", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46662 - Fortinet FortiManager Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-46662 \nPublished : March 14, 2025, 3:15 p.m. | 15\u00a0minutes ago \nDescription : A improper neutralization of special elements used in a command ('command injection') in Fortinet FortiManager versions 7.4.1 through 7.4.3, FortiManager Cloud versions 7.4.1 through 7.4.3 allows attacker to escalation of privilege via specifically crafted packets \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-14T16:42:22.000000Z"}]}