CVE-2023-32710
- EPSS 0.28%
- Veröffentlicht 01.06.2023 17:15:10
- Zuletzt bearbeitet 21.11.2024 08:03:53
In Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, and in Splunk Cloud Platform versions below 9.0.2303.100, a low-privileged user can perform an unauthorized transfer of data from a search using the ‘copyresults’ command if they know the...
CVE-2023-32711
- EPSS 0.37%
- Veröffentlicht 01.06.2023 17:15:10
- Zuletzt bearbeitet 21.11.2024 08:03:53
In Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, a Splunk dashboard view lets a low-privileged user exploit a vulnerability in the Bootstrap web framework (CVE-2019-8331) and build a stored cross-site scripting (XSS) payload.
CVE-2023-32712
- EPSS 0.28%
- Veröffentlicht 01.06.2023 17:15:10
- Zuletzt bearbeitet 21.11.2024 08:03:53
In Splunk Enterprise versions below 9.1.0.2, 9.0.5.1, and 8.2.11.2, an attacker can inject American National Standards Institute (ANSI) escape codes into Splunk log files that, when a vulnerable terminal application reads them, can potentially, at wo...
CVE-2023-32714
- EPSS 32.58%
- Veröffentlicht 01.06.2023 17:15:10
- Zuletzt bearbeitet 21.11.2024 08:03:54
In the Splunk App for Lookup File Editing versions below 4.0.1, a low-privileged user can, with a specially crafted web request, trigger a path traversal exploit that can then be used to read and write to restricted areas of the Splunk installation d...
CVE-2023-32716
- EPSS 0.21%
- Veröffentlicht 01.06.2023 17:15:10
- Zuletzt bearbeitet 21.11.2024 08:03:54
In Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, and Splunk Cloud Platform versions below 9.0.2303.100, an attacker can exploit a vulnerability in the {{dump}} SPL command to cause a denial of service by crashing the Splunk daemon.
CVE-2023-32717
- EPSS 0.12%
- Veröffentlicht 01.06.2023 17:15:10
- Zuletzt bearbeitet 21.11.2024 08:03:54
On Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, and in Splunk Cloud Platform versions below 9.0.2303.100, an unauthorized user can access the {{/services/indexing/preview}} REST endpoint to overwrite search results if they know the sea...
CVE-2023-22931
- EPSS 0.11%
- Veröffentlicht 14.02.2023 18:15:12
- Zuletzt bearbeitet 21.11.2024 07:45:39
In Splunk Enterprise versions below 8.1.13 and 8.2.10, the ‘createrss’ external search command overwrites existing Resource Description Format Site Summary (RSS) feeds without verifying permissions. This feature has been deprecated and disabled by de...
CVE-2023-22932
- EPSS 0.7%
- Veröffentlicht 14.02.2023 18:15:12
- Zuletzt bearbeitet 21.11.2024 07:45:40
In Splunk Enterprise 9.0 versions before 9.0.4, a View allows for Cross-Site Scripting (XSS) through the error message in a Base64-encoded image. The vulnerability affects instances with Splunk Web enabled. It does not affect Splunk Enterprise versio...
CVE-2023-22933
- EPSS 0.84%
- Veröffentlicht 14.02.2023 18:15:12
- Zuletzt bearbeitet 21.11.2024 07:45:40
In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, a View allows for Cross-Site Scripting (XSS) in an extensible mark-up language (XML) View through the ‘layoutPanel’ attribute in the ‘module’ tag’.
- EPSS 0.11%
- Veröffentlicht 14.02.2023 18:15:12
- Zuletzt bearbeitet 21.11.2024 07:45:40
In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the ‘pivot’ search processing language (SPL) command lets a search bypass SPL safeguards for risky commands using a saved search job. The vulnerability requires an authenticated user to c...