{"uuid": "6e40c001-a364-408f-b64a-60732d91d8d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45590", "type": "seen", "source": "https://t.me/KomunitiSiber/1768", "content": "Fortinet Rolls Out Critical Security Patches for FortiClientLinux Vulnerability\nhttps://thehackernews.com/2024/04/fortinet-has-released-patches-to.html\n\nFortinet has released patches to address a critical security flaw impacting FortiClientLinux that could be exploited to achieve arbitrary code execution.\nTracked as CVE-2023-45590, the vulnerability carries a CVSS score of 9.4 out of a maximum of 10.\n\"An Improper Control of Generation of Code ('Code Injection') vulnerability [CWE-94] in FortiClientLinux may allow an unauthenticated attacker to", "creation_timestamp": "2024-04-11T08:28:41.000000Z"}