An improper control of generation of code ('code injection') in Fortinet FortiClientLinux version 7.2.0, 7.0.6 through 7.0.10 and 7.0.3 through 7.0.4 allows attacker to execute unauthorized code or commands via tricking a FortiClientLinux user into visiting a malicious website
References
Link | Resource |
---|---|
https://fortiguard.com/psirt/FG-IR-23-087 | Vendor Advisory |
https://fortiguard.com/psirt/FG-IR-23-087 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
17 Jan 2025, 17:08
Type | Values Removed | Values Added |
---|---|---|
References | () https://fortiguard.com/psirt/FG-IR-23-087 - Vendor Advisory | |
CPE | cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:linux:*:* cpe:2.3:a:fortinet:forticlient:7.0.3:*:*:*:*:linux:*:* cpe:2.3:a:fortinet:forticlient:7.0.4:*:*:*:*:linux:*:* cpe:2.3:a:fortinet:forticlient:7.2.0:*:*:*:*:linux:*:* |
|
First Time |
Fortinet
Fortinet forticlient |
Information
Published : 2024-04-09 15:15
Updated : 2025-01-17 17:08
NVD link : CVE-2023-45590
Mitre link : CVE-2023-45590
CVE.ORG link : CVE-2023-45590
JSON object : View
Products Affected
fortinet
- forticlient
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')