<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 14:46:40 +0000</lastBuildDate>
    <item>
      <title>3b5b556d-a755-42a9-8b19-cfa95823dd0b</title>
      <link>https://vulnerability.circl.lu/sighting/3b5b556d-a755-42a9-8b19-cfa95823dd0b/export</link>
      <description>{"uuid": "3b5b556d-a755-42a9-8b19-cfa95823dd0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36996", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1824", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-36996\n\ud83d\udd39 Description: In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.109, an attacker could determine whether or not another user exists on the instance by deciphering the error response that they would likely receive from the instance when they attempt to log in. This disclosure could then lead to additional brute-force password-guessing attacks. This vulnerability would require that the Splunk platform instance uses the Security Assertion Markup Language (SAML) authentication scheme.\n\ud83d\udccf Published: 2024-07-01T16:30:41.186Z\n\ud83d\udccf Modified: 2025-01-15T17:05:44.757Z\n\ud83d\udd17 References:\n1. https://advisory.splunk.com/advisories/SVD-2024-0716", "creation_timestamp": "2025-01-15T17:55:07.000000Z"}</description>
      <content:encoded>{"uuid": "3b5b556d-a755-42a9-8b19-cfa95823dd0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36996", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1824", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-36996\n\ud83d\udd39 Description: In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.109, an attacker could determine whether or not another user exists on the instance by deciphering the error response that they would likely receive from the instance when they attempt to log in. This disclosure could then lead to additional brute-force password-guessing attacks. This vulnerability would require that the Splunk platform instance uses the Security Assertion Markup Language (SAML) authentication scheme.\n\ud83d\udccf Published: 2024-07-01T16:30:41.186Z\n\ud83d\udccf Modified: 2025-01-15T17:05:44.757Z\n\ud83d\udd17 References:\n1. https://advisory.splunk.com/advisories/SVD-2024-0716", "creation_timestamp": "2025-01-15T17:55:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3b5b556d-a755-42a9-8b19-cfa95823dd0b/export</guid>
      <pubDate>Wed, 15 Jan 2025 17:55:07 +0000</pubDate>
    </item>
  </channel>
</rss>
