{"vulnerability": "CVE-2024-54026", "sightings": [{"uuid": "beb55237-b8f0-48cf-b7b5-d1841b11ec93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54026", "type": "seen", "source": "https://t.me/cvedetector/20090", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54026 - Fortinet FortiSandbox SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-54026 \nPublished : March 11, 2025, 3:15 p.m. | 1\u00a0hour ago \nDescription : An improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiSandbox Cloud version 23.4, FortiSandbox at least 4.4.0 through 4.4.6 and 4.2.0 through 4.2.7 and 4.0.0 through 4.0.5 and 3.2.0 through 3.2.4 and 3.1.0 through 3.1.5 and 3.0.0 through 3.0.7 allows attacker to execute unauthorized code or commands via specifically crafted HTTP requests. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-11T17:37:33.000000Z"}, {"uuid": "c42f56c7-e2c2-4eea-884a-1ac9e14f57e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54026", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2025-0083", "content": "", "creation_timestamp": "2025-03-12T09:51:18.000000Z"}, {"uuid": "7d101822-bfaa-4316-abe2-98560a7d8f1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54026", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lk4nsruchi2n", "content": "", "creation_timestamp": "2025-03-11T18:06:11.573218Z"}]}