Splunk

Splunk Cloud Platform

93 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Medienbericht
  • EPSS 0.75%
  • Veröffentlicht 26.03.2025 22:05:09
  • Zuletzt bearbeitet 21.07.2025 20:49:49

In Splunk Enterprise versions below 9.3.3, 9.2.5, and 9.1.8, and Splunk Cloud Platform versions below 9.3.2408.104, 9.2.2406.108, 9.2.2403.114, and 9.1.2312.208, a low-privileged user that does not hold the "admin" or "power" Splunk roles could perf...

Medienbericht
  • EPSS 0.09%
  • Veröffentlicht 26.03.2025 22:04:31
  • Zuletzt bearbeitet 21.07.2025 20:50:12

In Splunk Enterprise versions below 9.3.3, 9.2.5, and 9.1.8 and Splunk Cloud Platform versions below 9.2.2403.108, and 9.1.2312.204, a low-privileged user that does not hold the "admin" or "power" Splunk roles could change the maintenance mode state ...

Medienbericht
  • EPSS 0.22%
  • Veröffentlicht 26.03.2025 22:03:50
  • Zuletzt bearbeitet 21.07.2025 20:51:45

In Splunk Enterprise versions below 9.4.1, 9.3.3, 9.2.5, and 9.1.8, and Splunk Cloud Platform versions below 9.3.2408.107, 9.2.2406.112, 9.2.2403.115, 9.1.2312.208 and 9.1.2308.214, a low-privileged user that does not hold the "admin" or "power" Splu...

Medienbericht
  • EPSS 0.07%
  • Veröffentlicht 26.03.2025 22:02:10
  • Zuletzt bearbeitet 21.07.2025 20:53:04

In Splunk Enterprise versions below 9.4.1, 9.3.3, 9.2.5, and 9.1.8 and Splunk Cloud Platform versions below 9.3.2408.107, 9.2.2406.111, and 9.1.2308.214, a low-privileged user that does not hold the "admin" or "power" Splunk roles could run a saved s...

  • EPSS 0.05%
  • Veröffentlicht 10.12.2024 18:15:41
  • Zuletzt bearbeitet 10.03.2025 16:41:47

In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7 and Splunk Cloud Platform versions below 9.3.2408.101, 9.2.2406.106, 9.2.2403.111, and 9.1.2312.206, an SPL command can potentially disclose sensitive information. The vulnerability requires...

  • EPSS 0.13%
  • Veröffentlicht 10.12.2024 18:15:41
  • Zuletzt bearbeitet 06.03.2025 19:54:57

In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7 and Splunk Cloud Platform versions below 9.2.2406.107, 9.2.2403.109, and 9.1.2312.206, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles could run a saved search w...

  • EPSS 0.29%
  • Veröffentlicht 10.12.2024 18:15:41
  • Zuletzt bearbeitet 06.03.2025 19:54:57

In Splunk Enterprise versions below 9.3.0, 9.2.4, and 9.1.7 and Splunk Cloud Platform versions below 9.1.2312.206, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles, that has a username with the same name as a role with rea...

  • EPSS 3.44%
  • Veröffentlicht 14.10.2024 17:15:13
  • Zuletzt bearbeitet 17.10.2024 13:12:54

In Splunk Enterprise versions below 9.2.3 and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.108 and 9.1.2312.205, a low-privileged user that does not hold the "admin" or "power" Splunk roles could create a malicious payload through a custom...

  • EPSS 0.79%
  • Veröffentlicht 14.10.2024 17:15:13
  • Zuletzt bearbeitet 17.10.2024 13:14:20

In Splunk Enterprise versions below 9.2.3 and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403, a low-privileged user that does not hold the "admin" or "power" Splunk roles could craft a malicious payload through Scheduled Views that could res...

  • EPSS 0.03%
  • Veröffentlicht 14.10.2024 17:15:12
  • Zuletzt bearbeitet 16.10.2024 22:18:17

In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.108, and 9.1.2312.204, a low-privileged user that does not hold the "admin" or "power" Splunk roles could change the maintenance mode state ...