Splunk

Splunk Cloud Platform

77 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 01.10.2025 17:15:40
  • Zuletzt bearbeitet 02.10.2025 19:11:46

In Splunk Enterprise versions below 10.0.1, 9.4.4, 9.3.6 and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.109, 9.3.2408.119 and 9.2.2406.122, an unauthenticated attacker could trigger a blind server-side request forgery (SSRF) potentially...

  • EPSS 0.07%
  • Veröffentlicht 01.10.2025 17:15:40
  • Zuletzt bearbeitet 02.10.2025 19:11:46

In Splunk Enterprise versions below 10.0.1, 9.4.4, 9.3.6, and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.108, 9.3.2408.118 and 9.2.2406.123, a user who holds a role that contains the high-privilege capability `change_authentication`, co...

  • EPSS 0.03%
  • Veröffentlicht 01.10.2025 17:15:40
  • Zuletzt bearbeitet 02.10.2025 19:11:46

In Splunk Enterprise versions below 9.4.4, 9.3.6, and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.108, 9.3.2408.118 and 9.2.2406.123, a low privilege user that does not hold the "admin" or "power" Splunk roles could perform an extensible...

  • EPSS 0.04%
  • Veröffentlicht 01.10.2025 17:15:39
  • Zuletzt bearbeitet 02.10.2025 19:11:46

In Splunk Enterprise versions below 9.4.4, 9.3.6, and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.108, 9.3.2408.118 and 9.2.2406.123, a low privileged user that does not hold the admin or power Splunk roles could craft a malicious payloa...

  • EPSS 0.04%
  • Veröffentlicht 01.10.2025 17:15:39
  • Zuletzt bearbeitet 02.10.2025 19:11:46

In Splunk Enterprise versions below 9.4.4, 9.3.6 and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.109, 9.3.2408.119 and 9.2.2406.122, a low-privileged user that does not hold the 'admin' or 'power' Splunk roles could craft a malicious pay...

  • EPSS 0.03%
  • Veröffentlicht 01.10.2025 17:15:39
  • Zuletzt bearbeitet 02.10.2025 19:11:46

In Splunk Enterprise versions below 9.4.4, 9.3.6, and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.111, 9.3.2408.119, and 9.2.2406.122, a low-privileged user that does not hold the admin or power Splunk roles could access sensitive search...

  • EPSS 0.03%
  • Veröffentlicht 07.07.2025 17:48:05
  • Zuletzt bearbeitet 21.07.2025 20:54:57

In Splunk Enterprise versions below 9.4.3, 9.3.5, 9.2.7, and 9.1.10, and Splunk Cloud Platform versions below 9.3.2411.104, 9.3.2408.113, and 9.2.2406.119, an unauthenticated attacker could send a specially-crafted SPL search command that could trigg...

  • EPSS 0.03%
  • Veröffentlicht 07.07.2025 17:48:03
  • Zuletzt bearbeitet 21.07.2025 20:57:33

In Splunk Enterprise versions below 9.4.3, 9.3.5, 9.2.7 and 9.1.10, and Splunk Cloud Platform versions below 9.3.2411.104, 9.3.2408.114, and 9.2.2406.119, an unauthenticated attacker can send a specially-crafted SPL search that could change the membe...

  • EPSS 0.05%
  • Veröffentlicht 07.07.2025 17:48:02
  • Zuletzt bearbeitet 01.08.2025 18:36:57

In Splunk Enterprise versions below 9.4.3, 9.3.5, 9.2.7, and 9.1.10, and Splunk Cloud Platform versions below 9.3.2411.103, 9.3.2408.113, and 9.2.2406.119, the software potentially exposes the search head cluster [splunk.secret](https://help.splunk.c...

  • EPSS 0.04%
  • Veröffentlicht 07.07.2025 17:48:00
  • Zuletzt bearbeitet 21.07.2025 20:43:59

In Splunk Enterprise versions below 9.4.2, 9.3.5, 9.2.7, and 9.1.10 and Splunk Cloud Platform versions below 9.3.2411.104, 9.3.2408.113, and 9.2.2406.119, a low-privileged user that does not hold the "admin" or "power" Splunk roles could create or ov...