{"vulnerability": "CVE-2024-47571", "sightings": [{"uuid": "095bdf4f-ef71-43f6-bc14-85824071763a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47571", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113827257100178968", "content": "", "creation_timestamp": "2025-01-14T14:48:26.354532Z"}, {"uuid": "8a693b09-3fff-4504-9921-d0a6f13eaec0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47571", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113827355879730690", "content": "", "creation_timestamp": "2025-01-14T15:13:33.686972Z"}, {"uuid": "35fd2207-01c0-48c3-935b-e8aae79483b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47571", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfpgwnq6iw2t", "content": "", "creation_timestamp": "2025-01-14T14:17:40.482797Z"}, {"uuid": "7cabfa94-06e0-4dae-a493-fc4d09152769", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47571", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113827591355003271", "content": "", "creation_timestamp": "2025-01-14T16:13:26.534813Z"}, {"uuid": "5a3f4801-af8d-4d72-81e1-c3b569967785", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47571", "type": "seen", "source": "https://t.me/cvedetector/15265", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47571 - Fortinet FortiManager Resource Expiration Improper Access\", \n  \"Content\": \"CVE ID : CVE-2024-47571 \nPublished : Jan. 14, 2025, 2:15 p.m. | 21\u00a0minutes ago \nDescription : An operation on a resource after expiration or release in Fortinet FortiManager 6.4.12 through 7.4.0 allows an attacker to gain improper access to FortiGate via valid credentials. \nSeverity: 8.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-14T15:39:53.000000Z"}]}