<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 30 Apr 2026 20:50:33 +0000</lastBuildDate>
    <item>
      <title>b24b2e1a-08ea-468e-957e-af49f8167d64</title>
      <link>https://db.gcve.eu/sighting/b24b2e1a-08ea-468e-957e-af49f8167d64/export</link>
      <description>{"uuid": "b24b2e1a-08ea-468e-957e-af49f8167d64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45593", "type": "seen", "source": "https://t.me/ctinow/200228", "content": "https://ift.tt/f2phqAY\nCVE-2023-45593", "creation_timestamp": "2024-03-05T13:28:32.000000Z"}</description>
      <content:encoded>{"uuid": "b24b2e1a-08ea-468e-957e-af49f8167d64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45593", "type": "seen", "source": "https://t.me/ctinow/200228", "content": "https://ift.tt/f2phqAY\nCVE-2023-45593", "creation_timestamp": "2024-03-05T13:28:32.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b24b2e1a-08ea-468e-957e-af49f8167d64/export</guid>
      <pubDate>Tue, 05 Mar 2024 13:28:32 +0000</pubDate>
    </item>
    <item>
      <title>488486ad-b1ab-4c05-9b47-bce316b7b208</title>
      <link>https://db.gcve.eu/sighting/488486ad-b1ab-4c05-9b47-bce316b7b208/export</link>
      <description>{"uuid": "488486ad-b1ab-4c05-9b47-bce316b7b208", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45594", "type": "seen", "source": "https://t.me/ctinow/200229", "content": "https://ift.tt/umlHFb1\nCVE-2023-45594", "creation_timestamp": "2024-03-05T13:28:33.000000Z"}</description>
      <content:encoded>{"uuid": "488486ad-b1ab-4c05-9b47-bce316b7b208", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45594", "type": "seen", "source": "https://t.me/ctinow/200229", "content": "https://ift.tt/umlHFb1\nCVE-2023-45594", "creation_timestamp": "2024-03-05T13:28:33.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/488486ad-b1ab-4c05-9b47-bce316b7b208/export</guid>
      <pubDate>Tue, 05 Mar 2024 13:28:33 +0000</pubDate>
    </item>
    <item>
      <title>106edb50-9969-4292-a828-76ec5dd6f918</title>
      <link>https://db.gcve.eu/sighting/106edb50-9969-4292-a828-76ec5dd6f918/export</link>
      <description>{"uuid": "106edb50-9969-4292-a828-76ec5dd6f918", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45590", "type": "seen", "source": "https://t.me/arpsyndicate/4456", "content": "#ExploitObserverAlert\n\nCVE-2023-45590\n\nDESCRIPTION: Exploit Observer has 2 entries in 1 file formats related to CVE-2023-45590. An improper control of generation of code ('code injection') in Fortinet FortiClientLinux version 7.2.0, 7.0.6 through 7.0.10 and 7.0.3 through 7.0.4 allows attacker to execute unauthorized code or commands via tricking a FortiClientLinux user into visiting a malicious website\n\nFIRST-EPSS: 0.000430000", "creation_timestamp": "2024-04-11T06:35:38.000000Z"}</description>
      <content:encoded>{"uuid": "106edb50-9969-4292-a828-76ec5dd6f918", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45590", "type": "seen", "source": "https://t.me/arpsyndicate/4456", "content": "#ExploitObserverAlert\n\nCVE-2023-45590\n\nDESCRIPTION: Exploit Observer has 2 entries in 1 file formats related to CVE-2023-45590. An improper control of generation of code ('code injection') in Fortinet FortiClientLinux version 7.2.0, 7.0.6 through 7.0.10 and 7.0.3 through 7.0.4 allows attacker to execute unauthorized code or commands via tricking a FortiClientLinux user into visiting a malicious website\n\nFIRST-EPSS: 0.000430000", "creation_timestamp": "2024-04-11T06:35:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/106edb50-9969-4292-a828-76ec5dd6f918/export</guid>
      <pubDate>Thu, 11 Apr 2024 06:35:38 +0000</pubDate>
    </item>
    <item>
      <title>a02a4b90-204f-4a1c-862f-0463cf402ea7</title>
      <link>https://db.gcve.eu/sighting/a02a4b90-204f-4a1c-862f-0463cf402ea7/export</link>
      <description>{"uuid": "a02a4b90-204f-4a1c-862f-0463cf402ea7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45590", "type": "seen", "source": "Telegram/ma_FeVGSWh_57ttaJaWABdTyC67IHriBi4ZsvxiITB1rGQ", "content": "", "creation_timestamp": "2024-04-11T08:11:44.000000Z"}</description>
      <content:encoded>{"uuid": "a02a4b90-204f-4a1c-862f-0463cf402ea7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45590", "type": "seen", "source": "Telegram/ma_FeVGSWh_57ttaJaWABdTyC67IHriBi4ZsvxiITB1rGQ", "content": "", "creation_timestamp": "2024-04-11T08:11:44.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a02a4b90-204f-4a1c-862f-0463cf402ea7/export</guid>
      <pubDate>Thu, 11 Apr 2024 08:11:44 +0000</pubDate>
    </item>
    <item>
      <title>6e40c001-a364-408f-b64a-60732d91d8d3</title>
      <link>https://db.gcve.eu/sighting/6e40c001-a364-408f-b64a-60732d91d8d3/export</link>
      <description>{"uuid": "6e40c001-a364-408f-b64a-60732d91d8d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45590", "type": "seen", "source": "https://t.me/KomunitiSiber/1768", "content": "Fortinet Rolls Out Critical Security Patches for FortiClientLinux Vulnerability\nhttps://thehackernews.com/2024/04/fortinet-has-released-patches-to.html\n\nFortinet has released patches to address a critical security flaw impacting FortiClientLinux that could be exploited to achieve arbitrary code execution.\nTracked as CVE-2023-45590, the vulnerability carries a CVSS score of 9.4 out of a maximum of 10.\n\"An Improper Control of Generation of Code ('Code Injection') vulnerability [CWE-94] in FortiClientLinux may allow an unauthenticated attacker to", "creation_timestamp": "2024-04-11T08:28:41.000000Z"}</description>
      <content:encoded>{"uuid": "6e40c001-a364-408f-b64a-60732d91d8d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45590", "type": "seen", "source": "https://t.me/KomunitiSiber/1768", "content": "Fortinet Rolls Out Critical Security Patches for FortiClientLinux Vulnerability\nhttps://thehackernews.com/2024/04/fortinet-has-released-patches-to.html\n\nFortinet has released patches to address a critical security flaw impacting FortiClientLinux that could be exploited to achieve arbitrary code execution.\nTracked as CVE-2023-45590, the vulnerability carries a CVSS score of 9.4 out of a maximum of 10.\n\"An Improper Control of Generation of Code ('Code Injection') vulnerability [CWE-94] in FortiClientLinux may allow an unauthenticated attacker to", "creation_timestamp": "2024-04-11T08:28:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/6e40c001-a364-408f-b64a-60732d91d8d3/export</guid>
      <pubDate>Thu, 11 Apr 2024 08:28:41 +0000</pubDate>
    </item>
    <item>
      <title>95adebbc-e2b0-4830-96d0-2ee087a586c6</title>
      <link>https://db.gcve.eu/sighting/95adebbc-e2b0-4830-96d0-2ee087a586c6/export</link>
      <description>{"uuid": "95adebbc-e2b0-4830-96d0-2ee087a586c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45590", "type": "seen", "source": "Telegram/u4mw1nzcO3cpIbpoBQh0vzocSzAWYem8RL8fX_RMvf1Cevk", "content": "", "creation_timestamp": "2024-04-11T09:02:37.000000Z"}</description>
      <content:encoded>{"uuid": "95adebbc-e2b0-4830-96d0-2ee087a586c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45590", "type": "seen", "source": "Telegram/u4mw1nzcO3cpIbpoBQh0vzocSzAWYem8RL8fX_RMvf1Cevk", "content": "", "creation_timestamp": "2024-04-11T09:02:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/95adebbc-e2b0-4830-96d0-2ee087a586c6/export</guid>
      <pubDate>Thu, 11 Apr 2024 09:02:37 +0000</pubDate>
    </item>
    <item>
      <title>78aaa47a-a98b-4c88-a4f0-282270b188ae</title>
      <link>https://db.gcve.eu/sighting/78aaa47a-a98b-4c88-a4f0-282270b188ae/export</link>
      <description>{"uuid": "78aaa47a-a98b-4c88-a4f0-282270b188ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45590", "type": "seen", "source": "Telegram/sshZous3vG0kialC8n2DjdEC_gai42OCRv-hMc3RJNZhBg", "content": "", "creation_timestamp": "2024-04-11T11:33:42.000000Z"}</description>
      <content:encoded>{"uuid": "78aaa47a-a98b-4c88-a4f0-282270b188ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45590", "type": "seen", "source": "Telegram/sshZous3vG0kialC8n2DjdEC_gai42OCRv-hMc3RJNZhBg", "content": "", "creation_timestamp": "2024-04-11T11:33:42.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/78aaa47a-a98b-4c88-a4f0-282270b188ae/export</guid>
      <pubDate>Thu, 11 Apr 2024 11:33:42 +0000</pubDate>
    </item>
    <item>
      <title>ac0b8d79-d4b2-4ec6-b57d-25f473ffdcba</title>
      <link>https://db.gcve.eu/sighting/ac0b8d79-d4b2-4ec6-b57d-25f473ffdcba/export</link>
      <description>{"uuid": "ac0b8d79-d4b2-4ec6-b57d-25f473ffdcba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45590", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/5431", "content": "The Hacker News\nFortinet Rolls Out Critical Security Patches for FortiClientLinux Vulnerability\n\nFortinet has released patches to address a critical security flaw impacting FortiClientLinux that could be exploited to achieve arbitrary code execution.\nTracked as CVE-2023-45590, the vulnerability carries a CVSS score of 9.4 out of a maximum of 10.\n\"An Improper Control of Generation of Code ('Code Injection') vulnerability [CWE-94] in FortiClientLinux may allow an unauthenticated attacker to", "creation_timestamp": "2024-04-11T11:33:43.000000Z"}</description>
      <content:encoded>{"uuid": "ac0b8d79-d4b2-4ec6-b57d-25f473ffdcba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45590", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/5431", "content": "The Hacker News\nFortinet Rolls Out Critical Security Patches for FortiClientLinux Vulnerability\n\nFortinet has released patches to address a critical security flaw impacting FortiClientLinux that could be exploited to achieve arbitrary code execution.\nTracked as CVE-2023-45590, the vulnerability carries a CVSS score of 9.4 out of a maximum of 10.\n\"An Improper Control of Generation of Code ('Code Injection') vulnerability [CWE-94] in FortiClientLinux may allow an unauthenticated attacker to", "creation_timestamp": "2024-04-11T11:33:43.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ac0b8d79-d4b2-4ec6-b57d-25f473ffdcba/export</guid>
      <pubDate>Thu, 11 Apr 2024 11:33:43 +0000</pubDate>
    </item>
    <item>
      <title>d9c74142-79e5-40d7-9958-08123afc653e</title>
      <link>https://db.gcve.eu/sighting/d9c74142-79e5-40d7-9958-08123afc653e/export</link>
      <description>{"uuid": "d9c74142-79e5-40d7-9958-08123afc653e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45590", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/1018", "content": "The Hacker News\nFortinet Rolls Out Critical Security Patches for FortiClientLinux Vulnerability\n\nFortinet has released patches to address a critical security flaw impacting FortiClientLinux that could be exploited to achieve arbitrary code execution.\nTracked as CVE-2023-45590, the vulnerability carries a CVSS score of 9.4 out of a maximum of 10.\n\"An Improper Control of Generation of Code ('Code Injection') vulnerability [CWE-94] in FortiClientLinux may allow an unauthenticated attacker to", "creation_timestamp": "2024-04-11T11:33:43.000000Z"}</description>
      <content:encoded>{"uuid": "d9c74142-79e5-40d7-9958-08123afc653e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45590", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/1018", "content": "The Hacker News\nFortinet Rolls Out Critical Security Patches for FortiClientLinux Vulnerability\n\nFortinet has released patches to address a critical security flaw impacting FortiClientLinux that could be exploited to achieve arbitrary code execution.\nTracked as CVE-2023-45590, the vulnerability carries a CVSS score of 9.4 out of a maximum of 10.\n\"An Improper Control of Generation of Code ('Code Injection') vulnerability [CWE-94] in FortiClientLinux may allow an unauthenticated attacker to", "creation_timestamp": "2024-04-11T11:33:43.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d9c74142-79e5-40d7-9958-08123afc653e/export</guid>
      <pubDate>Thu, 11 Apr 2024 11:33:43 +0000</pubDate>
    </item>
    <item>
      <title>759a14bb-6773-4fe5-a36b-56080dd7edea</title>
      <link>https://db.gcve.eu/sighting/759a14bb-6773-4fe5-a36b-56080dd7edea/export</link>
      <description>{"uuid": "759a14bb-6773-4fe5-a36b-56080dd7edea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45590", "type": "seen", "source": "https://t.me/true_secator/5629", "content": "Fortinet \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0434\u044e\u0436\u0438\u043d\u044b \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 FortiOS \u0438 \u0434\u0440\u0443\u0433\u0438\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e RCE \u0432 FortiClientLinux.\n\n\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f CVE-2023-45590 \u0438\u043c\u0435\u0435\u0442 \u043e\u0446\u0435\u043d\u043a\u0443 CVSS 9,4 \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0438\u043b\u0438 \u043a\u043e\u043c\u0430\u043d\u0434\u044b, \u0443\u0431\u0435\u0434\u0438\u0432 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u043f\u043e\u0441\u0435\u0442\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u0432\u0435\u0431-\u0441\u0430\u0439\u0442.\n\n\u0421\u043e\u0433\u043b\u0430\u0441\u043d\u043e\u00a0\u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u044f\u043c\u00a0Fortinet, \u043e\u043d\u0430 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0432\u0435\u0440\u0441\u0438\u0438 FortiClientLinux 7.2.0, 7.0.6\u20137.0.10 \u0438 7.0.3\u20137.0.4 \u0438 \u0431\u044b\u043b\u0430 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430 \u0441 \u0432\u044b\u043f\u0443\u0441\u043a\u043e\u043c 7.2.1 \u0438 7.0.11.\n\nFortinet \u0442\u0430\u043a\u0436\u0435 \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u0438\u0445 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 FortiOS, FortiProxy, FortiClientMac \u0438 FortiSandbox.\n\n\u041f\u0435\u0440\u0432\u0430\u044f \u043e\u0448\u0438\u0431\u043a\u0430 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438 (CVE-2023-41677) \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 FortiOS \u0438 FortiProxy, \u043e\u0431\u0443\u0441\u043b\u043e\u0432\u043b\u0435\u043d\u0430 \u0442\u0435\u043c, \u0447\u0442\u043e \u0443\u0447\u0435\u0442\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u0437\u0430\u0449\u0438\u0449\u0435\u043d\u044b, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0444\u0430\u0439\u043b\u044b cookie \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430, \u0443\u0431\u0435\u0434\u0438\u0432 \u0435\u0433\u043e \u043f\u043e\u0441\u0435\u0442\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u0432\u0435\u0431-\u0441\u0430\u0439\u0442 \u0447\u0435\u0440\u0435\u0437 SSL-VPN.\n\n\u0423\u0441\u043f\u0435\u0448\u043d\u0430\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0438\u043b\u0438 \u043a\u043e\u043c\u0430\u043d\u0434\u044b.\n\n\u0414\u0440\u0443\u0433\u0438\u0435 \u0434\u0432\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0432 FortiClientMac, \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u043c\u044b\u0435 \u043a\u0430\u043a CVE-2023-45588 \u0438 CVE-2024-31492, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0438\u043b\u0438 \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 \u0447\u0435\u0440\u0435\u0437 \u0432\u0440\u0435\u043c\u0435\u043d\u043d\u044b\u0439 \u043a\u0430\u0442\u0430\u043b\u043e\u0433 \u043f\u0435\u0440\u0435\u0434 \u0437\u0430\u043f\u0443\u0441\u043a\u043e\u043c \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0438 FortiClientMac.\n\nFortinet \u0442\u0430\u043a\u0436\u0435 \u0430\u043d\u043e\u043d\u0441\u0438\u0440\u043e\u0432\u0430\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0442\u0440\u0435\u0445 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 FortiSandbox, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0439 \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0435 \u0444\u0430\u0439\u043b\u043e\u0432 (CVE-2024-23671) \u0438\u043b\u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0445 \u043a\u043e\u043c\u0430\u043d\u0434 (CVE-2024-21755 \u0438 CVE-2024-21756).\n\nFortinet \u043d\u0435 \u0441\u043e\u043e\u0431\u0449\u0430\u0435\u0442 \u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435. \u0422\u0435\u043c \u043d\u0435 \u043c\u0435\u043d\u0435\u0435, \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435 \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430.", "creation_timestamp": "2024-04-11T19:30:05.000000Z"}</description>
      <content:encoded>{"uuid": "759a14bb-6773-4fe5-a36b-56080dd7edea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45590", "type": "seen", "source": "https://t.me/true_secator/5629", "content": "Fortinet \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0434\u044e\u0436\u0438\u043d\u044b \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 FortiOS \u0438 \u0434\u0440\u0443\u0433\u0438\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e RCE \u0432 FortiClientLinux.\n\n\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f CVE-2023-45590 \u0438\u043c\u0435\u0435\u0442 \u043e\u0446\u0435\u043d\u043a\u0443 CVSS 9,4 \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0438\u043b\u0438 \u043a\u043e\u043c\u0430\u043d\u0434\u044b, \u0443\u0431\u0435\u0434\u0438\u0432 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u043f\u043e\u0441\u0435\u0442\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u0432\u0435\u0431-\u0441\u0430\u0439\u0442.\n\n\u0421\u043e\u0433\u043b\u0430\u0441\u043d\u043e\u00a0\u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u044f\u043c\u00a0Fortinet, \u043e\u043d\u0430 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0432\u0435\u0440\u0441\u0438\u0438 FortiClientLinux 7.2.0, 7.0.6\u20137.0.10 \u0438 7.0.3\u20137.0.4 \u0438 \u0431\u044b\u043b\u0430 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430 \u0441 \u0432\u044b\u043f\u0443\u0441\u043a\u043e\u043c 7.2.1 \u0438 7.0.11.\n\nFortinet \u0442\u0430\u043a\u0436\u0435 \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u0438\u0445 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 FortiOS, FortiProxy, FortiClientMac \u0438 FortiSandbox.\n\n\u041f\u0435\u0440\u0432\u0430\u044f \u043e\u0448\u0438\u0431\u043a\u0430 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438 (CVE-2023-41677) \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 FortiOS \u0438 FortiProxy, \u043e\u0431\u0443\u0441\u043b\u043e\u0432\u043b\u0435\u043d\u0430 \u0442\u0435\u043c, \u0447\u0442\u043e \u0443\u0447\u0435\u0442\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u0437\u0430\u0449\u0438\u0449\u0435\u043d\u044b, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0444\u0430\u0439\u043b\u044b cookie \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430, \u0443\u0431\u0435\u0434\u0438\u0432 \u0435\u0433\u043e \u043f\u043e\u0441\u0435\u0442\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u0432\u0435\u0431-\u0441\u0430\u0439\u0442 \u0447\u0435\u0440\u0435\u0437 SSL-VPN.\n\n\u0423\u0441\u043f\u0435\u0448\u043d\u0430\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0438\u043b\u0438 \u043a\u043e\u043c\u0430\u043d\u0434\u044b.\n\n\u0414\u0440\u0443\u0433\u0438\u0435 \u0434\u0432\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0432 FortiClientMac, \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u043c\u044b\u0435 \u043a\u0430\u043a CVE-2023-45588 \u0438 CVE-2024-31492, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0438\u043b\u0438 \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 \u0447\u0435\u0440\u0435\u0437 \u0432\u0440\u0435\u043c\u0435\u043d\u043d\u044b\u0439 \u043a\u0430\u0442\u0430\u043b\u043e\u0433 \u043f\u0435\u0440\u0435\u0434 \u0437\u0430\u043f\u0443\u0441\u043a\u043e\u043c \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0438 FortiClientMac.\n\nFortinet \u0442\u0430\u043a\u0436\u0435 \u0430\u043d\u043e\u043d\u0441\u0438\u0440\u043e\u0432\u0430\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0442\u0440\u0435\u0445 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 FortiSandbox, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0439 \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0435 \u0444\u0430\u0439\u043b\u043e\u0432 (CVE-2024-23671) \u0438\u043b\u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0445 \u043a\u043e\u043c\u0430\u043d\u0434 (CVE-2024-21755 \u0438 CVE-2024-21756).\n\nFortinet \u043d\u0435 \u0441\u043e\u043e\u0431\u0449\u0430\u0435\u0442 \u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435. \u0422\u0435\u043c \u043d\u0435 \u043c\u0435\u043d\u0435\u0435, \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435 \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430.", "creation_timestamp": "2024-04-11T19:30:05.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/759a14bb-6773-4fe5-a36b-56080dd7edea/export</guid>
      <pubDate>Thu, 11 Apr 2024 19:30:05 +0000</pubDate>
    </item>
  </channel>
</rss>
