CVE-2020-15933

A exposure of sensitive information to an unauthorized actor in Fortinet FortiMail versions 6.0.9 and below, FortiMail versions 6.2.4 and below FortiMail versions 6.4.1 and 6.4.0 allows attacker to obtain potentially sensitive software-version information via client-side resources inspection.
References
Link Resource
https://fortiguard.com/psirt/FG-IR-20-105 Patch Vendor Advisory
https://fortiguard.com/psirt/FG-IR-20-105 Patch Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimail:6.2.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimail:6.2.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimail:6.2.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimail:6.2.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimail:6.2.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimail:6.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimail:6.4.1:*:*:*:*:*:*:*

History

21 Nov 2024, 05:06

Type Values Removed Values Added
References () https://fortiguard.com/psirt/FG-IR-20-105 - Patch, Vendor Advisory () https://fortiguard.com/psirt/FG-IR-20-105 - Patch, Vendor Advisory

Information

Published : 2022-01-05 12:15

Updated : 2024-11-21 05:06


NVD link : CVE-2020-15933

Mitre link : CVE-2020-15933

CVE.ORG link : CVE-2020-15933


JSON object : View

Products Affected

fortinet

  • fortimail
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor