An improper control of generation of code ('code injection') in Fortinet FortiClientLinux version 7.2.0, 7.0.6 through 7.0.10 and 7.0.3 through 7.0.4 allows attacker to execute unauthorized code or commands via tricking a FortiClientLinux user into visiting a malicious website
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://fortiguard.com/psirt/FG-IR-23-087 |
![]() ![]() ![]() |
History
Fri, 17 Jan 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Fortinet
Fortinet forticlient |
|
CPEs | cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:linux:*:* cpe:2.3:a:fortinet:forticlient:7.0.3:*:*:*:*:linux:*:* cpe:2.3:a:fortinet:forticlient:7.0.4:*:*:*:*:linux:*:* cpe:2.3:a:fortinet:forticlient:7.2.0:*:*:*:*:linux:*:* |
|
Vendors & Products |
Fortinet
Fortinet forticlient |

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-08-12T17:46:37.654Z
Reserved: 2023-10-09T08:01:29.297Z
Link: CVE-2023-45590

Updated: 2024-08-02T20:21:16.694Z

Status : Analyzed
Published: 2024-04-09T15:15:27.627
Modified: 2025-01-17T17:08:31.843
Link: CVE-2023-45590

No data.