{"vulnerability": "CVE-2024-47574", "sightings": [{"uuid": "77ccd3eb-9651-4513-a191-0c8141e3c500", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47574", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113475375268943677", "content": "", "creation_timestamp": "2024-11-13T11:20:15.557144Z"}, {"uuid": "a0d3edd6-da94-4335-8d26-b7cea5bd8a53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47574", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113471621703891497", "content": "", "creation_timestamp": "2024-11-12T19:25:41.052143Z"}, {"uuid": "c0171cee-0e36-4eb3-82d8-017bf97af1c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47574", "type": "seen", "source": "https://infosec.exchange/users/jbhall56/statuses/113487067634176092", "content": "", "creation_timestamp": "2024-11-15T12:53:46.909476Z"}, {"uuid": "536bf91b-87a7-40c5-ad04-cb7d43db8d88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47574", "type": "seen", "source": "https://t.me/cvedetector/10816", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47574 - Fortinet FortiClient Windows Authenticate Bypass via Spoofed Named Pipe Messages\", \n  \"Content\": \"CVE ID : CVE-2024-47574 \nPublished : Nov. 13, 2024, 12:15 p.m. | 32\u00a0minutes ago \nDescription : A authentication bypass using an alternate path or channel in Fortinet FortiClientWindows version 7.4.0, versions 7.2.4 through 7.2.0, versions 7.0.12 through 7.0.0, and 6.4.10 through 6.4.0 allows low privilege attacker to execute arbitrary code with high privilege via spoofed named pipe messages. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T13:51:48.000000Z"}]}