Splunk

Splunk

160 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Media report
  • EPSS 0.03%
  • Published 26.03.2025 22:06:00
  • Last modified 21.07.2025 20:45:39

In Splunk Enterprise versions below 9.3.3, 9.2.5, and 9.1.8 and Splunk Cloud Platform versions below 9.3.2408.103, 9.2.2406.108, 9.2.2403.113, 9.1.2312.208 and 9.1.2308.212, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles...

Media report
  • EPSS 0.41%
  • Published 26.03.2025 22:05:09
  • Last modified 21.07.2025 20:49:49

In Splunk Enterprise versions below 9.3.3, 9.2.5, and 9.1.8, and Splunk Cloud Platform versions below 9.3.2408.104, 9.2.2406.108, 9.2.2403.114, and 9.1.2312.208, a low-privileged user that does not hold the "admin" or "power" Splunk roles could perf...

Media report
  • EPSS 0.02%
  • Published 26.03.2025 22:04:31
  • Last modified 21.07.2025 20:50:12

In Splunk Enterprise versions below 9.3.3, 9.2.5, and 9.1.8 and Splunk Cloud Platform versions below 9.2.2403.108, and 9.1.2312.204, a low-privileged user that does not hold the "admin" or "power" Splunk roles could change the maintenance mode state ...

Media report
  • EPSS 0.06%
  • Published 26.03.2025 22:03:50
  • Last modified 21.07.2025 20:51:45

In Splunk Enterprise versions below 9.4.1, 9.3.3, 9.2.5, and 9.1.8, and Splunk Cloud Platform versions below 9.3.2408.107, 9.2.2406.112, 9.2.2403.115, 9.1.2312.208 and 9.1.2308.214, a low-privileged user that does not hold the "admin" or "power" Splu...

Media report
  • EPSS 0.03%
  • Published 26.03.2025 22:02:10
  • Last modified 21.07.2025 20:53:04

In Splunk Enterprise versions below 9.4.1, 9.3.3, 9.2.5, and 9.1.8 and Splunk Cloud Platform versions below 9.3.2408.107, 9.2.2406.111, and 9.1.2308.214, a low-privileged user that does not hold the "admin" or "power" Splunk roles could run a saved s...

Media report
  • EPSS 0.04%
  • Published 26.03.2025 21:45:41
  • Last modified 21.07.2025 20:48:56

In Splunk Enterprise versions below 9.4.1, 9.3.3, 9.2.5, and 9.1.8, and versions below 3.8.38 and 3.7.23 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles could run...

  • EPSS 0.13%
  • Published 10.12.2024 18:15:41
  • Last modified 06.03.2025 19:54:57

In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7 and Splunk Cloud Platform versions below 9.2.2406.107, 9.2.2403.109, and 9.1.2312.206, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles could run a saved search w...

  • EPSS 0.12%
  • Published 10.12.2024 18:15:41
  • Last modified 06.03.2025 19:54:57

In Splunk Enterprise versions below 9.3.0, 9.2.4, and 9.1.7 and Splunk Cloud Platform versions below 9.1.2312.206, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles, that has a username with the same name as a role with rea...

  • EPSS 0.08%
  • Published 10.12.2024 18:15:41
  • Last modified 10.03.2025 16:41:47

In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7 and Splunk Cloud Platform versions below 9.3.2408.101, 9.2.2406.106, 9.2.2403.111, and 9.1.2312.206, an SPL command can potentially disclose sensitive information. The vulnerability requires...

  • EPSS 0.1%
  • Published 14.10.2024 17:15:13
  • Last modified 17.10.2024 13:14:20

In Splunk Enterprise versions below 9.2.3 and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403, a low-privileged user that does not hold the "admin" or "power" Splunk roles could craft a malicious payload through Scheduled Views that could res...