Логотип exploitDog
bind:CVE-2024-36996
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-36996

Количество 3

Количество 3

nvd логотип

CVE-2024-36996

больше 1 года назад

In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.109, an attacker could determine whether or not another user exists on the instance by deciphering the error response that they would likely receive from the instance when they attempt to log in. This disclosure could then lead to additional brute-force password-guessing attacks. This vulnerability would require that the Splunk platform instance uses the Security Assertion Markup Language (SAML) authentication scheme.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-jgc6-c9v8-vfqw

больше 1 года назад

In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.109, an attacker could determine whether or not another user exists on the instance by deciphering the error response that they would likely receive from the instance when they attempt to log in. This disclosure could then lead to additional brute-force password-guessing attacks. This vulnerability would require that the Splunk platform instance uses the Security Assertion Markup Language (SAML) authentication scheme.

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2024-05269

больше 1 года назад

Уязвимость реализации стандарта Security Assertion Markup Language (SAML) платформы для операционного анализа Splunk Enterprise, позволяющая нарушителю реализовать атаку методом «грубой силы» (brute force)

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-36996

In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.109, an attacker could determine whether or not another user exists on the instance by deciphering the error response that they would likely receive from the instance when they attempt to log in. This disclosure could then lead to additional brute-force password-guessing attacks. This vulnerability would require that the Splunk platform instance uses the Security Assertion Markup Language (SAML) authentication scheme.

CVSS3: 5.3
1%
Низкий
больше 1 года назад
github логотип
GHSA-jgc6-c9v8-vfqw

In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.109, an attacker could determine whether or not another user exists on the instance by deciphering the error response that they would likely receive from the instance when they attempt to log in. This disclosure could then lead to additional brute-force password-guessing attacks. This vulnerability would require that the Splunk platform instance uses the Security Assertion Markup Language (SAML) authentication scheme.

CVSS3: 5.3
1%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-05269

Уязвимость реализации стандарта Security Assertion Markup Language (SAML) платформы для операционного анализа Splunk Enterprise, позволяющая нарушителю реализовать атаку методом «грубой силы» (brute force)

CVSS3: 5.3
1%
Низкий
больше 1 года назад

Уязвимостей на страницу