{"vulnerability": "CVE-2024-54021", "sightings": [{"uuid": "d9e72fc0-4594-4f9e-8ef9-c3e2306651d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54021", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113827709499404650", "content": "", "creation_timestamp": "2025-01-14T16:43:29.081807Z"}, {"uuid": "5a3b0f56-5a6c-4bda-9b38-7c2802cb5a96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54021", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfpgxkhsyx2n", "content": "", "creation_timestamp": "2025-01-14T14:18:10.865098Z"}, {"uuid": "004237e2-3056-436e-8fd4-126321d0eeda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54021", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113827355879730690", "content": "", "creation_timestamp": "2025-01-14T15:13:34.062659Z"}, {"uuid": "fb18152c-fe8b-4de5-a7fb-a4fdf4ef902a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54021", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-06", "content": "", "creation_timestamp": "2025-02-13T11:00:00.000000Z"}, {"uuid": "f79e8788-5202-4738-bec4-dee6f1567339", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54021", "type": "seen", "source": "https://t.me/cvedetector/15250", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54021 - Fortinet FortiOS HTTP Response Splitting Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-54021 \nPublished : Jan. 14, 2025, 2:15 p.m. | 21\u00a0minutes ago \nDescription : An improper neutralization of crlf sequences in http headers ('http response splitting') in Fortinet FortiOS 7.2.0 through 7.6.0, FortiProxy 7.2.0 through 7.4.5 allows attacker to execute unauthorized code or commands via crafted HTTP header. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-14T15:39:32.000000Z"}, {"uuid": "724d6ca4-9294-44d1-a550-75fc576a66f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54021", "type": "seen", "source": "Telegram/UhJt8JoWAwxWu_iaJxH1TG8ebo3TXs_61rB9J5udnkhDbwFF", "content": "", "creation_timestamp": "2025-02-06T02:40:20.000000Z"}]}