- EPSS 0.16%
- Veröffentlicht 04.11.2022 23:15:10
- Zuletzt bearbeitet 21.11.2024 07:26:47
In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can run risky commands using a more privileged user’s permissions to bypass SPL safeguards for risky commands https://docs.splunk.com/Documentation/SplunkCloud/lates...
CVE-2022-43568
- EPSS 8.65%
- Veröffentlicht 04.11.2022 23:15:10
- Zuletzt bearbeitet 21.11.2024 07:26:48
In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, a View allows for a Reflected Cross Site Scripting via JavaScript Object Notation (JSON) in a query parameter when output_mode=radio.
CVE-2022-43569
- EPSS 0.79%
- Veröffentlicht 04.11.2022 23:15:10
- Zuletzt bearbeitet 21.11.2024 07:26:48
In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, an authenticated user can inject and store arbitrary scripts that can lead to persistent cross-site scripting (XSS) in the object name of a Data Model.
CVE-2022-43570
- EPSS 0.31%
- Veröffentlicht 04.11.2022 23:15:10
- Zuletzt bearbeitet 21.11.2024 07:26:48
In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, an authenticated user can perform an extensible markup language (XML) external entity (XXE) injection via a custom View. The XXE injection causes Splunk Web to embed incorrect documents in...
CVE-2022-43572
- EPSS 0.82%
- Veröffentlicht 04.11.2022 23:15:10
- Zuletzt bearbeitet 21.11.2024 07:26:48
In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, sending a malformed file through the Splunk-to-Splunk (S2S) or HTTP Event Collector (HEC) protocols to an indexer results in a blockage or denial-of-service preventing further indexing.
CVE-2022-43564
- EPSS 0.4%
- Veröffentlicht 04.11.2022 23:15:09
- Zuletzt bearbeitet 21.11.2024 07:26:47
In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, a remote user who can create search macros and schedule search reports can cause a denial of service through the use of specially crafted search macros.
CVE-2022-43563
- EPSS 0.2%
- Veröffentlicht 04.11.2022 23:15:09
- Zuletzt bearbeitet 21.11.2024 07:26:47
In Splunk Enterprise versions below 8.2.9 and 8.1.12, the way that the rex search command handles field names lets an attacker bypass SPL safeguards for risky commands https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards ....
CVE-2022-43562
- EPSS 0.3%
- Veröffentlicht 04.11.2022 23:15:09
- Zuletzt bearbeitet 21.11.2024 07:26:47
In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, Splunk Enterprise fails to properly validate and escape the Host header, which could let a remote authenticated user conduct various attacks against the system, including cross-site script...
CVE-2022-43571
- EPSS 75.91%
- Veröffentlicht 03.11.2022 23:15:21
- Zuletzt bearbeitet 21.11.2024 07:26:48
In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can execute arbitrary code through the dashboard PDF generation component.
CVE-2022-43561
- EPSS 0.2%
- Veröffentlicht 03.11.2022 23:15:15
- Zuletzt bearbeitet 21.11.2024 07:26:47
In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, a remote user that holds the “power” Splunk role can store arbitrary scripts that can lead to persistent cross-site scripting (XSS). The vulnerability affects instances with Splunk Web ena...