Splunk

Splunk

184 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.11%
  • Veröffentlicht 30.08.2023 17:15:10
  • Zuletzt bearbeitet 21.11.2024 08:19:47

In Splunk Enterprise versions below 8.2.12, 9.0.6, and 9.1.1, an attacker can create an external lookup that calls a legacy internal function. The attacker can use this internal function to insert code into the Splunk platform installation directory....

  • EPSS 0.26%
  • Veröffentlicht 30.08.2023 17:15:09
  • Zuletzt bearbeitet 21.11.2024 08:19:46

In Splunk Enterprise versions below 9.1.1, 9.0.6, and 8.2.12, an attacker can craft a special web request that can result in reflected cross-site scripting (XSS) on the “/app/search/table” web endpoint. Exploitation of this vulnerability can lead to ...

  • EPSS 0.16%
  • Veröffentlicht 30.08.2023 17:15:09
  • Zuletzt bearbeitet 21.11.2024 08:19:47

In Splunk Enterprise versions lower than 9.0.6 and 8.2.12, a malicious actor can send a malformed security assertion markup language (SAML) request to the `/saml/acs` REST endpoint which can cause a denial of service through a crash or hang of the Sp...

  • EPSS 0.15%
  • Veröffentlicht 30.08.2023 17:15:09
  • Zuletzt bearbeitet 21.11.2024 08:19:47

In Splunk Enterprise versions lower than 8.2.12, 9.0.6, and 9.1.1, an attacker can use the `printf` SPL function to perform a denial of service (DoS) against the Splunk Enterprise instance.

  • EPSS 0.27%
  • Veröffentlicht 01.06.2023 17:15:10
  • Zuletzt bearbeitet 21.11.2024 08:03:53

On Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, an unauthenticated attacker can send specially-crafted messages to the XML parser within SAML authentication to cause a denial of service in the Splunk daemon.

  • EPSS 82.68%
  • Veröffentlicht 01.06.2023 17:15:10
  • Zuletzt bearbeitet 21.11.2024 08:03:53

In versions of Splunk Enterprise below 9.0.5, 8.2.11, and 8.1.14, and Splunk Cloud Platform below version 9.0.2303.100, a low-privileged user who holds a role that has the ‘edit_user’ capability assigned to it can escalate their privileges to that of...

  • EPSS 0.19%
  • Veröffentlicht 01.06.2023 17:15:10
  • Zuletzt bearbeitet 21.11.2024 08:03:53

In Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, and Splunk Cloud Platform versions below 9.0.2303.100, a low-privileged user can trigger an HTTP response splitting vulnerability with the ‘rest’ SPL command that lets them potentially ac...

  • EPSS 0.21%
  • Veröffentlicht 01.06.2023 17:15:10
  • Zuletzt bearbeitet 21.11.2024 08:03:53

In Splunk Enterprise versions below 9.0.5, 8.2.11. and 8.1.14, and Splunk Cloud Platform versions below 9.0.2303.100, a low-privileged user who holds the ‘user’ role can see the hashed version of the initial user name and password for the Splunk inst...

  • EPSS 0.35%
  • Veröffentlicht 01.06.2023 17:15:10
  • Zuletzt bearbeitet 21.11.2024 08:03:53

In Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, and in Splunk Cloud Platform versions below 9.0.2303.100, a low-privileged user can perform an unauthorized transfer of data from a search using the ‘copyresults’ command if they know the...

  • EPSS 0.46%
  • Veröffentlicht 01.06.2023 17:15:10
  • Zuletzt bearbeitet 21.11.2024 08:03:53

In Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, a Splunk dashboard view lets a low-privileged user exploit a vulnerability in the Bootstrap web framework (CVE-2019-8331) and build a stored cross-site scripting (XSS) payload.