{"uuid": "ac0b8d79-d4b2-4ec6-b57d-25f473ffdcba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45590", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/5431", "content": "The Hacker News\nFortinet Rolls Out Critical Security Patches for FortiClientLinux Vulnerability\n\nFortinet has released patches to address a critical security flaw impacting FortiClientLinux that could be exploited to achieve arbitrary code execution.\nTracked as CVE-2023-45590, the vulnerability carries a CVSS score of 9.4 out of a maximum of 10.\n\"An Improper Control of Generation of Code ('Code Injection') vulnerability [CWE-94] in FortiClientLinux may allow an unauthenticated attacker to", "creation_timestamp": "2024-04-11T11:33:43.000000Z"}