{"uuid": "a6d0717c-71bd-4826-90d7-897b41b68762", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45739", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1819", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-45739\n\ud83d\udd39 Description: In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6, the software potentially exposes plaintext passwords for local native authentication Splunk users. This exposure could happen when you configure the Splunk Enterprise AdminManager log channel at the DEBUG logging level.\n\ud83d\udccf Published: 2024-10-14T17:03:38.949Z\n\ud83d\udccf Modified: 2025-01-15T17:05:45.915Z\n\ud83d\udd17 References:\n1. https://advisory.splunk.com/advisories/SVD-2024-1009\n2. https://research.splunk.com/application/93dc7182-c5da-4085-82ec-401abf33d623/", "creation_timestamp": "2025-01-15T17:55:00.000000Z"}