{"vulnerability": "CVE-2024-9132", "sightings": [{"uuid": "ed5d427b-bc50-4375-b06e-c88b3c52cef7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9132", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113806219465401637", "content": "", "creation_timestamp": "2025-01-10T21:38:17.379497Z"}, {"uuid": "29d1f6cf-c7b6-4ec7-a303-5d004ad4bd39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9132", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfg7snvc2x2k", "content": "", "creation_timestamp": "2025-01-10T22:16:12.689704Z"}, {"uuid": "a60993b3-a2dc-45c3-b14f-75a17c35f2d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9132", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfgbdcyber25", "content": "", "creation_timestamp": "2025-01-10T22:43:27.421175Z"}, {"uuid": "76e9123d-db2e-4964-8f76-d8dab616e795", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9132", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfgbde6opx2r", "content": "", "creation_timestamp": "2025-01-10T22:43:32.880676Z"}, {"uuid": "d92730ab-3f50-4c1c-a50b-5dfd1d222087", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9132", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113806495855617522", "content": "", "creation_timestamp": "2025-01-10T22:48:34.745641Z"}, {"uuid": "e3cbba97-9ecd-4d10-9610-7517eea168f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9132", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1255", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-9132\n\ud83d\udd39 Description: The administrator is able to configure an insecure captive portal script\n\ud83d\udccf Published: 2025-01-10T21:35:14.483Z\n\ud83d\udccf Modified: 2025-01-10T21:35:14.483Z\n\ud83d\udd17 References:\n1. https://www.arista.com/en/support/advisories-notices/security-advisory/20454-security-advisory-0105", "creation_timestamp": "2025-01-10T22:05:09.000000Z"}, {"uuid": "aa9a195f-b414-423d-aacd-4345ae2e9caa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9132", "type": "seen", "source": "https://t.me/cvedetector/15016", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-9132 - \"FortiOS Path Traversal\"\", \n  \"Content\": \"CVE ID : CVE-2024-9132 \nPublished : Jan. 10, 2025, 10:15 p.m. | 32\u00a0minutes ago \nDescription : The administrator is able to configure an insecure captive portal script \nSeverity: 8.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-10T23:52:30.000000Z"}]}