Splunk

Universal Forwarder

61 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 63.95%
  • Published 03.08.2022 06:15:07
  • Last modified 21.11.2024 07:11:34

SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.

Exploit
  • EPSS 0.3%
  • Published 07.07.2022 13:15:08
  • Last modified 05.05.2025 17:18:13

When curl < 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.

Exploit
  • EPSS 0.17%
  • Published 07.07.2022 13:15:08
  • Last modified 23.04.2025 18:15:53

When curl < 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen...

Exploit
  • EPSS 2.57%
  • Published 07.07.2022 13:15:08
  • Last modified 05.05.2025 17:18:13

curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allo...

Exploit
  • EPSS 1.4%
  • Published 07.07.2022 13:15:08
  • Last modified 05.05.2025 17:18:12

A malicious server can serve excessive amounts of `Set-Cookie:` headers in a HTTP response to curl and curl < 7.84.0 stores all of them. A sufficiently large amount of (big) cookies make subsequent HTTP requests to this, or other servers to which the...

  • EPSS 0.19%
  • Published 15.06.2022 17:15:09
  • Last modified 21.11.2024 07:05:51

In Splunk Enterprise and Universal Forwarder versions before 9.0, the Splunk command-line interface (CLI) did not validate TLS certificates while connecting to a remote Splunk platform instance by default. After updating to version 9.0, see Configur...

Exploit
  • EPSS 0.06%
  • Published 02.06.2022 14:15:51
  • Last modified 21.11.2024 07:02:11

Using its HSTS support, curl can be instructed to use HTTPS directly insteadof using an insecure clear-text HTTP step even when HTTP is provided in theURL. This mechanism could be bypassed if the host name in the given URL used atrailing dot while no...

Exploit
  • EPSS 0.19%
  • Published 02.06.2022 14:15:44
  • Last modified 21.11.2024 06:56:10

libcurl wrongly allows cookies to be set for Top Level Domains (TLDs) if thehost name is provided with a trailing dot.curl can be told to receive and send cookies. curl's "cookie engine" can bebuilt with or without [Public Suffix List](https://public...

Exploit
  • EPSS 0.27%
  • Published 02.06.2022 14:15:44
  • Last modified 21.11.2024 06:56:10

libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them...

Exploit
  • EPSS 0.05%
  • Published 02.06.2022 14:15:44
  • Last modified 21.11.2024 06:56:10

libcurl provides the `CURLOPT_CERTINFO` option to allow applications torequest details to be returned about a server's certificate chain.Due to an erroneous function, a malicious server could make libcurl built withNSS get stuck in a never-ending bus...