CVE-2024-36983
- EPSS 1.89%
- Veröffentlicht 01.07.2024 17:15:06
- Zuletzt bearbeitet 07.03.2025 16:48:11
In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.109 and 9.1.2308.207, an authenticated user could create an external lookup that calls a legacy internal function. The authenticated user c...
CVE-2023-40598
- EPSS 0.11%
- Veröffentlicht 30.08.2023 17:15:10
- Zuletzt bearbeitet 21.11.2024 08:19:47
In Splunk Enterprise versions below 8.2.12, 9.0.6, and 9.1.1, an attacker can create an external lookup that calls a legacy internal function. The attacker can use this internal function to insert code into the Splunk platform installation directory....
CVE-2023-40597
- EPSS 0.07%
- Veröffentlicht 30.08.2023 17:15:10
- Zuletzt bearbeitet 21.11.2024 08:19:47
In Splunk Enterprise versions lower than 8.2.12, 9.0.6, and 9.1.1, an attacker can exploit an absolute path traversal to execute arbitrary code that is located on a separate disk.
CVE-2023-40595
- EPSS 0.56%
- Veröffentlicht 30.08.2023 17:15:10
- Zuletzt bearbeitet 21.11.2024 08:19:47
In Splunk Enterprise versions lower than 8.2.12, 9.0.6, and 9.1.1, an attacker can execute a specially crafted query that they can then use to serialize untrusted data. The attacker can use the query to execute arbitrary code.
CVE-2023-40594
- EPSS 0.15%
- Veröffentlicht 30.08.2023 17:15:09
- Zuletzt bearbeitet 21.11.2024 08:19:47
In Splunk Enterprise versions lower than 8.2.12, 9.0.6, and 9.1.1, an attacker can use the `printf` SPL function to perform a denial of service (DoS) against the Splunk Enterprise instance.
CVE-2023-40593
- EPSS 0.16%
- Veröffentlicht 30.08.2023 17:15:09
- Zuletzt bearbeitet 21.11.2024 08:19:47
In Splunk Enterprise versions lower than 9.0.6 and 8.2.12, a malicious actor can send a malformed security assertion markup language (SAML) request to the `/saml/acs` REST endpoint which can cause a denial of service through a crash or hang of the Sp...
CVE-2023-40592
- EPSS 0.26%
- Veröffentlicht 30.08.2023 17:15:09
- Zuletzt bearbeitet 21.11.2024 08:19:46
In Splunk Enterprise versions below 9.1.1, 9.0.6, and 8.2.12, an attacker can craft a special web request that can result in reflected cross-site scripting (XSS) on the “/app/search/table” web endpoint. Exploitation of this vulnerability can lead to ...
CVE-2023-32717
- EPSS 0.15%
- Veröffentlicht 01.06.2023 17:15:10
- Zuletzt bearbeitet 21.11.2024 08:03:54
On Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, and in Splunk Cloud Platform versions below 9.0.2303.100, an unauthorized user can access the {{/services/indexing/preview}} REST endpoint to overwrite search results if they know the sea...
CVE-2023-32706
- EPSS 0.27%
- Veröffentlicht 01.06.2023 17:15:10
- Zuletzt bearbeitet 21.11.2024 08:03:53
On Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, an unauthenticated attacker can send specially-crafted messages to the XML parser within SAML authentication to cause a denial of service in the Splunk daemon.
CVE-2023-32707
- EPSS 82.68%
- Veröffentlicht 01.06.2023 17:15:10
- Zuletzt bearbeitet 21.11.2024 08:03:53
In versions of Splunk Enterprise below 9.0.5, 8.2.11, and 8.1.14, and Splunk Cloud Platform below version 9.0.2303.100, a low-privileged user who holds a role that has the ‘edit_user’ capability assigned to it can escalate their privileges to that of...