{"vulnerability": "CVE-2020-29010", "sightings": [{"uuid": "31d52353-dc2e-4c98-b581-769b0042c5b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-29010", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7766", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2020-29010\n\ud83d\udd25 CVSS Score: 4.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N/E:F/RL:X/RC:X)\n\ud83d\udd39 Description: An exposure of sensitive information to an unauthorized actor vulnerability in FortiOS version 6.2.4 and below, version 6.0.10 and belowmay allow remote authenticated actors to read the SSL VPN events log entries of users in other VDOMs by  executing \"get vpn ssl monitor\" from the CLI. The sensitive data includes usernames, user groups, and IP address.\n\ud83d\udccf Published: 2025-03-17T13:06:16.993Z\n\ud83d\udccf Modified: 2025-03-17T13:32:38.996Z\n\ud83d\udd17 References:\n1. https://fortiguard.fortinet.com/psirt/FG-IR-20-103", "creation_timestamp": "2025-03-17T13:46:58.000000Z"}]}