<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 22:01:48 +0000</lastBuildDate>
    <item>
      <title>99931324-dd59-429c-a48b-ff3752586c7f</title>
      <link>https://vulnerability.circl.lu/sighting/99931324-dd59-429c-a48b-ff3752586c7f/export</link>
      <description>{"uuid": "99931324-dd59-429c-a48b-ff3752586c7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45734", "type": "seen", "source": "https://t.me/cvedetector/7843", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45734 - Splunk Enterprise File Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-45734 \nPublished : Oct. 14, 2024, 5:15 p.m. | 38\u00a0minutes ago \nDescription : In Splunk Enterprise versions 9.3.0, 9.2.3, and 9.1.6, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could view images on the machine that runs Splunk Enterprise by using the PDF export feature in Splunk classic dashboards. The images on the  machine could be exposed by exporting the dashboard as a PDF, using the local image path in the img tag in the source extensible markup language (XML) code for the Splunk classic dashboard. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-14T20:01:34.000000Z"}</description>
      <content:encoded>{"uuid": "99931324-dd59-429c-a48b-ff3752586c7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45734", "type": "seen", "source": "https://t.me/cvedetector/7843", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45734 - Splunk Enterprise File Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-45734 \nPublished : Oct. 14, 2024, 5:15 p.m. | 38\u00a0minutes ago \nDescription : In Splunk Enterprise versions 9.3.0, 9.2.3, and 9.1.6, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could view images on the machine that runs Splunk Enterprise by using the PDF export feature in Splunk classic dashboards. The images on the  machine could be exposed by exporting the dashboard as a PDF, using the local image path in the img tag in the source extensible markup language (XML) code for the Splunk classic dashboard. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-14T20:01:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/99931324-dd59-429c-a48b-ff3752586c7f/export</guid>
      <pubDate>Mon, 14 Oct 2024 20:01:34 +0000</pubDate>
    </item>
  </channel>
</rss>
