Splunk

Universal Forwarder

61 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.1%
  • Veröffentlicht 09.02.2023 20:15:10
  • Zuletzt bearbeitet 21.11.2024 07:26:46

A use after free vulnerability exists in curl <7.87.0. Curl can be asked to *tunnel* virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific pr...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 23.12.2022 15:15:15
  • Zuletzt bearbeitet 21.11.2024 07:26:45

A vulnerability exists in curl <7.87.0 HSTS check that could be bypassed to trick it to keep using HTTP. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the U...

Exploit
  • EPSS 0.16%
  • Veröffentlicht 05.12.2022 22:15:10
  • Zuletzt bearbeitet 21.11.2024 07:10:59

curl can be told to parse a `.netrc` file for credentials. If that file endsin a line with 4095 consecutive non-white space letters and no newline, curlwould first read past the end of the stack-based buffer, and if the readworks, write a zero byte b...

Exploit
  • EPSS 1.2%
  • Veröffentlicht 05.12.2022 22:15:10
  • Zuletzt bearbeitet 21.11.2024 07:05:57

When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request wh...

  • EPSS 0.46%
  • Veröffentlicht 22.11.2022 02:15:11
  • Zuletzt bearbeitet 21.11.2024 07:12:37

In libarchive before 3.6.2, the software does not check for an error after calling calloc function that can return with a NULL pointer if the function fails, which leads to a resultant NULL pointer dereference. NOTE: the discoverer cites this CWE-476...

  • EPSS 0.42%
  • Veröffentlicht 29.10.2022 20:15:09
  • Zuletzt bearbeitet 07.05.2025 14:15:33

curl before 7.86.0 has a double free. If curl is told to use an HTTP proxy for a transfer with a non-HTTP(S) URL, it sets up the connection to the remote server by issuing a CONNECT request to the proxy, and then tunnels the rest of the protocol thro...

  • EPSS 0.05%
  • Veröffentlicht 29.10.2022 02:15:09
  • Zuletzt bearbeitet 21.11.2024 07:25:35

In curl before 7.86.0, the HSTS check could be bypassed to trick it into staying with HTTP. Using its HSTS support, curl can be instructed to use HTTPS directly (instead of using an insecure cleartext HTTP step) even when HTTP is provided in the URL....

Exploit
  • EPSS 0.08%
  • Veröffentlicht 23.09.2022 14:15:12
  • Zuletzt bearbeitet 05.05.2025 17:18:16

When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a"sister site" to deny service...

  • EPSS 0.04%
  • Veröffentlicht 23.08.2022 16:15:09
  • Zuletzt bearbeitet 21.11.2024 06:05:55

An improper link resolution flaw can occur while extracting an archive leading to changing modes, times, access control lists, and flags of a file outside of the archive. An attacker may provide a malicious archive to a victim user, who would trigger...

  • EPSS 0.12%
  • Veröffentlicht 16.08.2022 21:15:13
  • Zuletzt bearbeitet 21.11.2024 07:14:59

In Splunk Enterprise and Universal Forwarder versions in the following table, indexing a specially crafted ZIP file using the file monitoring input can result in a crash of the application. Attempts to restart the application would result in a crash ...