{"vulnerability": "CVE-2023-4559", "sightings": [{"uuid": "6e40c001-a364-408f-b64a-60732d91d8d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45590", "type": "seen", "source": "https://t.me/KomunitiSiber/1768", "content": "Fortinet Rolls Out Critical Security Patches for FortiClientLinux Vulnerability\nhttps://thehackernews.com/2024/04/fortinet-has-released-patches-to.html\n\nFortinet has released patches to address a critical security flaw impacting FortiClientLinux that could be exploited to achieve arbitrary code execution.\nTracked as CVE-2023-45590, the vulnerability carries a CVSS score of 9.4 out of a maximum of 10.\n\"An Improper Control of Generation of Code ('Code Injection') vulnerability [CWE-94] in FortiClientLinux may allow an unauthenticated attacker to", "creation_timestamp": "2024-04-11T08:28:41.000000Z"}, {"uuid": "95adebbc-e2b0-4830-96d0-2ee087a586c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45590", "type": "seen", "source": "Telegram/u4mw1nzcO3cpIbpoBQh0vzocSzAWYem8RL8fX_RMvf1Cevk", "content": "", "creation_timestamp": "2024-04-11T09:02:37.000000Z"}, {"uuid": "ac0b8d79-d4b2-4ec6-b57d-25f473ffdcba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45590", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/5431", "content": "The Hacker News\nFortinet Rolls Out Critical Security Patches for FortiClientLinux Vulnerability\n\nFortinet has released patches to address a critical security flaw impacting FortiClientLinux that could be exploited to achieve arbitrary code execution.\nTracked as CVE-2023-45590, the vulnerability carries a CVSS score of 9.4 out of a maximum of 10.\n\"An Improper Control of Generation of Code ('Code Injection') vulnerability [CWE-94] in FortiClientLinux may allow an unauthenticated attacker to", "creation_timestamp": "2024-04-11T11:33:43.000000Z"}, {"uuid": "a02a4b90-204f-4a1c-862f-0463cf402ea7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45590", "type": "seen", "source": "Telegram/ma_FeVGSWh_57ttaJaWABdTyC67IHriBi4ZsvxiITB1rGQ", "content": "", "creation_timestamp": "2024-04-11T08:11:44.000000Z"}, {"uuid": "106edb50-9969-4292-a828-76ec5dd6f918", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45590", "type": "seen", "source": "https://t.me/arpsyndicate/4456", "content": "#ExploitObserverAlert\n\nCVE-2023-45590\n\nDESCRIPTION: Exploit Observer has 2 entries in 1 file formats related to CVE-2023-45590. An improper control of generation of code ('code injection') in Fortinet FortiClientLinux version 7.2.0, 7.0.6 through 7.0.10 and 7.0.3 through 7.0.4 allows attacker to execute unauthorized code or commands via tricking a FortiClientLinux user into visiting a malicious website\n\nFIRST-EPSS: 0.000430000", "creation_timestamp": "2024-04-11T06:35:38.000000Z"}, {"uuid": "d9c74142-79e5-40d7-9958-08123afc653e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45590", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/1018", "content": "The Hacker News\nFortinet Rolls Out Critical Security Patches for FortiClientLinux Vulnerability\n\nFortinet has released patches to address a critical security flaw impacting FortiClientLinux that could be exploited to achieve arbitrary code execution.\nTracked as CVE-2023-45590, the vulnerability carries a CVSS score of 9.4 out of a maximum of 10.\n\"An Improper Control of Generation of Code ('Code Injection') vulnerability [CWE-94] in FortiClientLinux may allow an unauthenticated attacker to", "creation_timestamp": "2024-04-11T11:33:43.000000Z"}, {"uuid": "759a14bb-6773-4fe5-a36b-56080dd7edea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45590", "type": "seen", "source": "https://t.me/true_secator/5629", "content": "Fortinet \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0434\u044e\u0436\u0438\u043d\u044b \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 FortiOS \u0438 \u0434\u0440\u0443\u0433\u0438\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e RCE \u0432 FortiClientLinux.\n\n\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f CVE-2023-45590 \u0438\u043c\u0435\u0435\u0442 \u043e\u0446\u0435\u043d\u043a\u0443 CVSS 9,4 \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0438\u043b\u0438 \u043a\u043e\u043c\u0430\u043d\u0434\u044b, \u0443\u0431\u0435\u0434\u0438\u0432 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u043f\u043e\u0441\u0435\u0442\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u0432\u0435\u0431-\u0441\u0430\u0439\u0442.\n\n\u0421\u043e\u0433\u043b\u0430\u0441\u043d\u043e\u00a0\u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u044f\u043c\u00a0Fortinet, \u043e\u043d\u0430 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0432\u0435\u0440\u0441\u0438\u0438 FortiClientLinux 7.2.0, 7.0.6\u20137.0.10 \u0438 7.0.3\u20137.0.4 \u0438 \u0431\u044b\u043b\u0430 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430 \u0441 \u0432\u044b\u043f\u0443\u0441\u043a\u043e\u043c 7.2.1 \u0438 7.0.11.\n\nFortinet \u0442\u0430\u043a\u0436\u0435 \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u0438\u0445 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 FortiOS, FortiProxy, FortiClientMac \u0438 FortiSandbox.\n\n\u041f\u0435\u0440\u0432\u0430\u044f \u043e\u0448\u0438\u0431\u043a\u0430 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438 (CVE-2023-41677) \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 FortiOS \u0438 FortiProxy, \u043e\u0431\u0443\u0441\u043b\u043e\u0432\u043b\u0435\u043d\u0430 \u0442\u0435\u043c, \u0447\u0442\u043e \u0443\u0447\u0435\u0442\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u0437\u0430\u0449\u0438\u0449\u0435\u043d\u044b, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0444\u0430\u0439\u043b\u044b cookie \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430, \u0443\u0431\u0435\u0434\u0438\u0432 \u0435\u0433\u043e \u043f\u043e\u0441\u0435\u0442\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u0432\u0435\u0431-\u0441\u0430\u0439\u0442 \u0447\u0435\u0440\u0435\u0437 SSL-VPN.\n\n\u0423\u0441\u043f\u0435\u0448\u043d\u0430\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0438\u043b\u0438 \u043a\u043e\u043c\u0430\u043d\u0434\u044b.\n\n\u0414\u0440\u0443\u0433\u0438\u0435 \u0434\u0432\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0432 FortiClientMac, \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u043c\u044b\u0435 \u043a\u0430\u043a CVE-2023-45588 \u0438 CVE-2024-31492, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0438\u043b\u0438 \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 \u0447\u0435\u0440\u0435\u0437 \u0432\u0440\u0435\u043c\u0435\u043d\u043d\u044b\u0439 \u043a\u0430\u0442\u0430\u043b\u043e\u0433 \u043f\u0435\u0440\u0435\u0434 \u0437\u0430\u043f\u0443\u0441\u043a\u043e\u043c \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0438 FortiClientMac.\n\nFortinet \u0442\u0430\u043a\u0436\u0435 \u0430\u043d\u043e\u043d\u0441\u0438\u0440\u043e\u0432\u0430\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0442\u0440\u0435\u0445 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 FortiSandbox, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0439 \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0435 \u0444\u0430\u0439\u043b\u043e\u0432 (CVE-2024-23671) \u0438\u043b\u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0445 \u043a\u043e\u043c\u0430\u043d\u0434 (CVE-2024-21755 \u0438 CVE-2024-21756).\n\nFortinet \u043d\u0435 \u0441\u043e\u043e\u0431\u0449\u0430\u0435\u0442 \u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435. \u0422\u0435\u043c \u043d\u0435 \u043c\u0435\u043d\u0435\u0435, \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435 \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430.", "creation_timestamp": "2024-04-11T19:30:05.000000Z"}, {"uuid": "5e36647f-11a9-496b-8bfe-4c5bc87a9356", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45593", "type": "seen", "source": "https://t.me/ctinow/200214", "content": "https://ift.tt/f2phqAY\nCVE-2023-45593", "creation_timestamp": "2024-03-05T13:28:13.000000Z"}, {"uuid": "4037a88c-2cac-4538-8c4d-824e62828977", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45591", "type": "seen", "source": "https://t.me/ctinow/200212", "content": "https://ift.tt/6KrqvIh\nCVE-2023-45591", "creation_timestamp": "2024-03-05T13:28:10.000000Z"}, {"uuid": "b5f99245-3721-4a9b-8e26-f335aa3568b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45592", "type": "seen", "source": "https://t.me/ctinow/200213", "content": "https://ift.tt/vYcsXw6\nCVE-2023-45592", "creation_timestamp": "2024-03-05T13:28:12.000000Z"}, {"uuid": "488486ad-b1ab-4c05-9b47-bce316b7b208", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45594", "type": "seen", "source": "https://t.me/ctinow/200229", "content": "https://ift.tt/umlHFb1\nCVE-2023-45594", "creation_timestamp": "2024-03-05T13:28:33.000000Z"}, {"uuid": "b24b2e1a-08ea-468e-957e-af49f8167d64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45593", "type": "seen", "source": "https://t.me/ctinow/200228", "content": "https://ift.tt/f2phqAY\nCVE-2023-45593", "creation_timestamp": "2024-03-05T13:28:32.000000Z"}, {"uuid": "a0f5efd0-4e51-41d5-b960-6d95ced70d5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45592", "type": "seen", "source": "https://t.me/ctinow/200227", "content": "https://ift.tt/vYcsXw6\nCVE-2023-45592", "creation_timestamp": "2024-03-05T13:28:31.000000Z"}, {"uuid": "16f99013-2309-4f04-8ef4-a8bd3a3573f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45591", "type": "seen", "source": "https://t.me/ctinow/200226", "content": "https://ift.tt/6KrqvIh\nCVE-2023-45591", "creation_timestamp": "2024-03-05T13:28:30.000000Z"}, {"uuid": "e114583c-d62e-4208-bf00-0b9e2fcbb84c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45599", "type": "seen", "source": "https://t.me/ctinow/200220", "content": "https://ift.tt/7FJrf23\nCVE-2023-45599", "creation_timestamp": "2024-03-05T13:28:21.000000Z"}, {"uuid": "348b6a0d-12d4-4340-992c-dca5d5d26b7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45598", "type": "seen", "source": "https://t.me/ctinow/200219", "content": "https://ift.tt/NtnSvuJ\nCVE-2023-45598", "creation_timestamp": "2024-03-05T13:28:17.000000Z"}, {"uuid": "71596af9-74c7-46bd-98bd-a390c0c92c3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45597", "type": "seen", "source": "https://t.me/ctinow/200218", "content": "https://ift.tt/hAk0u2a\nCVE-2023-45597", "creation_timestamp": "2024-03-05T13:28:16.000000Z"}, {"uuid": "887f624b-a6f7-445f-b2ec-3f5f699cb80d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45595", "type": "seen", "source": "https://t.me/ctinow/200216", "content": "https://ift.tt/avDR6ob\nCVE-2023-45595", "creation_timestamp": "2024-03-05T13:28:15.000000Z"}, {"uuid": "96e885b8-facd-4d84-965f-4ead68845fa8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45596", "type": "seen", "source": "https://t.me/ctinow/200217", "content": "https://ift.tt/jfOWYU1\nCVE-2023-45596", "creation_timestamp": "2024-03-05T13:28:15.000000Z"}, {"uuid": "1c45f694-8e68-4664-b1e0-adf96e9745b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45594", "type": "seen", "source": "https://t.me/ctinow/200215", "content": "https://ift.tt/umlHFb1\nCVE-2023-45594", "creation_timestamp": "2024-03-05T13:28:14.000000Z"}, {"uuid": "78aaa47a-a98b-4c88-a4f0-282270b188ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45590", "type": "seen", "source": "Telegram/sshZous3vG0kialC8n2DjdEC_gai42OCRv-hMc3RJNZhBg", "content": "", "creation_timestamp": "2024-04-11T11:33:42.000000Z"}, {"uuid": "67d5b8f0-8bc1-4b73-87e2-9a77c3d56731", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-4559", "type": "seen", "source": "https://t.me/cibsecurity/69253", "content": "\u203c CVE-2023-4559 \u203c\n\nA vulnerability, which was classified as critical, has been found in Bettershop LaikeTui. Affected by this issue is some unknown functionality of the file index.php?module=api&amp;action=user&amp;m=upload of the component POST Request Handler. The manipulation leads to unrestricted upload. The attack may be launched remotely. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The identifier of this vulnerability is VDB-238160.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-28T02:21:19.000000Z"}]}