An improper control of generation of code ('code injection') in Fortinet FortiClientLinux version 7.2.0, 7.0.6 through 7.0.10 and 7.0.3 through 7.0.4 allows attacker to execute unauthorized code or commands via tricking a FortiClientLinux user into visiting a malicious website
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://fortiguard.com/psirt/FG-IR-23-087 |
|
History
Fri, 17 Jan 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fortinet
Fortinet forticlient |
|
| CPEs | cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:linux:*:* cpe:2.3:a:fortinet:forticlient:7.0.3:*:*:*:*:linux:*:* cpe:2.3:a:fortinet:forticlient:7.0.4:*:*:*:*:linux:*:* cpe:2.3:a:fortinet:forticlient:7.2.0:*:*:*:*:linux:*:* |
|
| Vendors & Products |
Fortinet
Fortinet forticlient |
Status: PUBLISHED
Assigner: fortinet
Published: 2024-04-09T14:24:19.922Z
Updated: 2024-08-12T17:46:37.654Z
Reserved: 2023-10-09T08:01:29.297Z
Link: CVE-2023-45590
Updated: 2024-08-02T20:21:16.694Z
Status : Analyzed
Published: 2024-04-09T15:15:27.627
Modified: 2025-01-17T17:08:31.843
Link: CVE-2023-45590
No data.