Lucene search

K

7 matches found

CVE
CVE
added 2023/08/30 5:15 p.m.180 views

CVE-2023-40598

In Splunk Enterprise versions below 8.2.12, 9.0.6, and 9.1.1, an attacker can create an external lookup that calls a legacy internal function. The attacker can use this internal function to insert code into the Splunk platform installation directory. From there, a user can execute arbitrary code on...

8.8CVSS8.8AI score0.00084EPSS
CVE
CVE
added 2023/08/30 5:15 p.m.155 views

CVE-2023-40592

In Splunk Enterprise versions below 9.1.1, 9.0.6, and 8.2.12, an attacker can craft a special web request that can result in reflected cross-site scripting (XSS) on the “/app/search/table” web endpoint. Exploitation of this vulnerability can lead to the execution of arbitrary commands on the Splunk...

8.4CVSS6.9AI score0.00272EPSS
CVE
CVE
added 2023/08/30 5:15 p.m.150 views

CVE-2023-40595

In Splunk Enterprise versions lower than 8.2.12, 9.0.6, and 9.1.1, an attacker can execute a specially crafted query that they can then use to serialize untrusted data. The attacker can use the query to execute arbitrary code.

8.8CVSS8.9AI score0.00429EPSS
CVE
CVE
added 2023/08/30 5:15 p.m.145 views

CVE-2023-40597

In Splunk Enterprise versions lower than 8.2.12, 9.0.6, and 9.1.1, an attacker can exploit an absolute path traversal to execute arbitrary code that is located on a separate disk.

8.8CVSS8.6AI score0.00054EPSS
CVE
CVE
added 2023/08/30 5:15 p.m.144 views

CVE-2023-40596

In Splunk Enterprise versions earlier than 8.2.12, 9.0.6, and 9.1.1, a dynamic link library (DLL) that ships with Splunk Enterprise references an insecure path for the OPENSSLDIR build definition. An attacker can abuse this reference and subsequently install malicious code to achieve privilege esca...

8.8CVSS8.1AI score0.00066EPSS
CVE
CVE
added 2023/08/30 5:15 p.m.131 views

CVE-2023-40594

In Splunk Enterprise versions lower than 8.2.12, 9.0.6, and 9.1.1, an attacker can use the printf SPL function to perform a denial of service (DoS) against the Splunk Enterprise instance.

7.5CVSS6.8AI score0.00114EPSS
CVE
CVE
added 2023/08/30 5:15 p.m.130 views

CVE-2023-40593

In Splunk Enterprise versions lower than 9.0.6 and 8.2.12, a malicious actor can send a malformed security assertion markup language (SAML) request to the /saml/acs REST endpoint which can cause a denial of service through a crash or hang of the Splunk daemon.

7.5CVSS6.8AI score0.00126EPSS