Splunk

Splunk

176 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Medienbericht
  • EPSS 0.04%
  • Veröffentlicht 26.03.2025 22:02:10
  • Zuletzt bearbeitet 21.07.2025 20:53:04

In Splunk Enterprise versions below 9.4.1, 9.3.3, 9.2.5, and 9.1.8 and Splunk Cloud Platform versions below 9.3.2408.107, 9.2.2406.111, and 9.1.2308.214, a low-privileged user that does not hold the "admin" or "power" Splunk roles could run a saved s...

Medienbericht
  • EPSS 0.04%
  • Veröffentlicht 26.03.2025 21:45:41
  • Zuletzt bearbeitet 21.07.2025 20:48:56

In Splunk Enterprise versions below 9.4.1, 9.3.3, 9.2.5, and 9.1.8, and versions below 3.8.38 and 3.7.23 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles could run...

  • EPSS 0.13%
  • Veröffentlicht 10.12.2024 18:15:41
  • Zuletzt bearbeitet 06.03.2025 19:54:57

In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7 and Splunk Cloud Platform versions below 9.2.2406.107, 9.2.2403.109, and 9.1.2312.206, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles could run a saved search w...

  • EPSS 0.12%
  • Veröffentlicht 10.12.2024 18:15:41
  • Zuletzt bearbeitet 06.03.2025 19:54:57

In Splunk Enterprise versions below 9.3.0, 9.2.4, and 9.1.7 and Splunk Cloud Platform versions below 9.1.2312.206, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles, that has a username with the same name as a role with rea...

  • EPSS 0.08%
  • Veröffentlicht 10.12.2024 18:15:41
  • Zuletzt bearbeitet 10.03.2025 16:41:47

In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7 and Splunk Cloud Platform versions below 9.3.2408.101, 9.2.2406.106, 9.2.2403.111, and 9.1.2312.206, an SPL command can potentially disclose sensitive information. The vulnerability requires...

  • EPSS 0.58%
  • Veröffentlicht 14.10.2024 17:15:13
  • Zuletzt bearbeitet 17.10.2024 13:14:20

In Splunk Enterprise versions below 9.2.3 and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403, a low-privileged user that does not hold the "admin" or "power" Splunk roles could craft a malicious payload through Scheduled Views that could res...

  • EPSS 2.97%
  • Veröffentlicht 14.10.2024 17:15:13
  • Zuletzt bearbeitet 17.10.2024 13:12:54

In Splunk Enterprise versions below 9.2.3 and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.108 and 9.1.2312.205, a low-privileged user that does not hold the "admin" or "power" Splunk roles could create a malicious payload through a custom...

  • EPSS 0.07%
  • Veröffentlicht 14.10.2024 17:15:12
  • Zuletzt bearbeitet 16.10.2024 22:20:32

In Splunk Enterprise versions below 9.2.3 and 9.1.6, and Splunk Secure Gateway versions on Splunk Cloud Platform versions below 3.4.259, 3.6.17, and 3.7.0, a low-privileged user that does not hold the "admin" or "power" Splunk roles can see App Key V...

  • EPSS 0.19%
  • Veröffentlicht 14.10.2024 17:15:12
  • Zuletzt bearbeitet 16.10.2024 22:19:44

In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.107, 9.1.2312.204, and 9.1.2312.111, a low-privileged user that does not hold the "admin" or "power" Splunk roles could craft a search query...

  • EPSS 0.03%
  • Veröffentlicht 14.10.2024 17:15:12
  • Zuletzt bearbeitet 16.10.2024 22:18:17

In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.108, and 9.1.2312.204, a low-privileged user that does not hold the "admin" or "power" Splunk roles could change the maintenance mode state ...