{"vulnerability": "CVE-2020-1593", "sightings": [{"uuid": "aeeb144a-81fc-4b7f-a565-1d5df1129a46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15934", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113679146598752848", "content": "", "creation_timestamp": "2024-12-19T11:01:59.275909Z"}, {"uuid": "1a8af44e-b2bf-40e6-827e-004001517f69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15934", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldnqmtb2gt2s", "content": "", "creation_timestamp": "2024-12-19T11:15:25.613407Z"}, {"uuid": "a66310ed-3ccd-4521-88b0-7cc96f3a2246", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15934", "type": "seen", "source": "https://t.me/cvedetector/13319", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2020-15934 - FortiClient for Linux Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2020-15934 \nPublished : Dec. 19, 2024, 11:15 a.m. | 42\u00a0minutes ago \nDescription : An execution with unnecessary privileges vulnerability in the VCM engine of FortiClient for Linux versions 6.2.7 and below, version 6.4.0. may allow local users to elevate their privileges to root by creating a malicious script or program on the target machine. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-19T13:08:48.000000Z"}, {"uuid": "d1b4704f-9c70-4a87-b818-b476aef03366", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15936", "type": "seen", "source": "https://t.me/cibsecurity/38276", "content": "\u203c CVE-2020-15936 \u203c\n\nA improper input validation in Fortinet FortiGate version 6.4.3 and below, version 6.2.5 and below, version 6.0.11 and below, version 5.6.13 and below allows attacker to disclose sensitive information via SNI Client Hello TLS packets.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-01T22:23:35.000000Z"}, {"uuid": "6fe727ea-f8f0-4de8-acf8-1cf9d8727565", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15933", "type": "seen", "source": "https://t.me/cibsecurity/34976", "content": "\u203c CVE-2020-15933 \u203c\n\nA exposure of sensitive information to an unauthorized actor in Fortinet FortiMail versions 6.0.9 and below, FortiMail versions 6.2.4 and below FortiMail versions 6.4.1 and 6.4.0 allows attacker to obtain potentially sensitive software-version information via client-side resources inspection.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-05T14:40:45.000000Z"}, {"uuid": "386a633e-6713-4443-a6f5-e6458e5db7e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15937", "type": "seen", "source": "https://t.me/cibsecurity/24392", "content": "\u203c CVE-2020-15937 \u203c\n\nAn improper neutralization of input vulnerability in FortiGate version 6.2.x below 6.2.5 and 6.4.x below 6.4.1 may allow a remote attacker to perform a stored cross site scripting attack (XSS) via the IPS and WAF logs dashboard.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-03T18:45:33.000000Z"}]}