Exploit for Splunk 9.0.5 - Admin Account Takeover with improved POC leveraging low-privilege user to escalate privileges
Reporter | Title | Published | Views | Family All 13 |
---|---|---|---|---|
![]() | Code injection | 1 Jun 202317:15 | β | prion |
![]() | CVE-2023-32707 | 1 Jun 202317:15 | β | nvd |
![]() | Splunk "edit_user" Capability Privilege Escalation | 13 Sep 202315:19 | β | metasploit |
![]() | CVE-2023-32707 βedit_userβ Capability Privilege Escalation | 1 Jun 202316:34 | β | cvelist |
![]() | CVE-2023-32707 | 1 Jun 202317:15 | β | cve |
![]() | Splunk Enterprise Account Takeover | 11 Sep 202300:00 | β | packetstorm |
![]() | Splunk edit_user Capability Privilege Escalation | 27 Oct 202300:00 | β | packetstorm |
![]() | Splunk Enterprise 8.1.0 < 8.1.14, 8.2.0 < 8.2.11, 9.0.0 < 9.0.5 (SVD-2023-0602) | 1 Jun 202300:00 | β | nessus |
![]() | CVE-2023-32707 βedit_userβ Capability Privilege Escalation | 1 Jun 202316:34 | β | vulnrichment |
![]() | Splunk Enterprise Account Takeover Exploit | 11 Sep 202300:00 | β | zdt |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo