Lucene search

K
SplunkSplunk

23 matches found

CVE
CVE
added 2014/04/07 10:55 p.m.3955 views

CVE-2014-0160

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys,...

7.5CVSS7.5AI score0.94436EPSS
In wild
CVE
CVE
added 2023/02/14 6:15 p.m.154 views

CVE-2023-22941

In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, an improperly-formatted ‘INGEST_EVAL’ parameter in a Field Transformation crashes the Splunk daemon (splunkd).

7.5CVSS6.9AI score0.00583EPSS
CVE
CVE
added 2023/06/01 5:15 p.m.153 views

CVE-2023-32706

On Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, an unauthenticated attacker can send specially-crafted messages to the XML parser within SAML authentication to cause a denial of service in the Splunk daemon.

7.7CVSS6.7AI score0.00215EPSS
CVE
CVE
added 2023/08/30 5:15 p.m.132 views

CVE-2023-40593

In Splunk Enterprise versions lower than 9.0.6 and 8.2.12, a malicious actor can send a malformed security assertion markup language (SAML) request to the /saml/acs REST endpoint which can cause a denial of service through a crash or hang of the Splunk daemon.

7.5CVSS6.8AI score0.00164EPSS
CVE
CVE
added 2023/08/30 5:15 p.m.132 views

CVE-2023-40594

In Splunk Enterprise versions lower than 8.2.12, 9.0.6, and 9.1.1, an attacker can use the printf SPL function to perform a denial of service (DoS) against the Splunk Enterprise instance.

7.5CVSS6.8AI score0.00149EPSS
CVE
CVE
added 2024/07/01 5:15 p.m.128 views

CVE-2024-36991

In Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10, an attacker could perform a path traversal on the /modules/messaging/ endpoint in Splunk Enterprise on Windows. This vulnerability should only affect Splunk Enterprise on Windows.

7.5CVSS7.4AI score0.93274EPSS
In wild
CVE
CVE
added 2024/03/27 5:15 p.m.110 views

CVE-2024-29945

In Splunk Enterprise versions below 9.2.1, 9.1.4, and 9.0.9, the software potentially exposes authentication tokens during the token validation process. This exposure happens when either Splunk Enterprise runs in debug mode or the JsonWebToken component has been configured to log its activity at th...

7.2CVSS7.1AI score0.00152EPSS
CVE
CVE
added 2022/03/25 7:15 p.m.97 views

CVE-2021-3422

The lack of validation of a key-value field in the Splunk-to-Splunk protocol results in a denial-of-service in Splunk Enterprise instances configured to index Universal Forwarder traffic. The vulnerability impacts Splunk Enterprise versions before 7.3.9, 8.0 versions before 8.0.9, and 8.1 versions ...

7.5CVSS7.5AI score0.00396EPSS
CVE
CVE
added 2024/12/10 6:15 p.m.95 views

CVE-2024-53246

In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7 and Splunk Cloud Platform versions below 9.3.2408.101, 9.2.2406.106, 9.2.2403.111, and 9.1.2312.206, an SPL command can potentially disclose sensitive information. The vulnerability requires the exploitation of another vulnerability, such ...

7.5CVSS5.4AI score0.00062EPSS
CVE
CVE
added 2022/05/06 5:15 p.m.88 views

CVE-2021-31559

A crafted request bypasses S2S TCP Token authentication writing arbitrary events to an index in Splunk Enterprise Indexer 8.1 versions before 8.1.5 and 8.2 versions before 8.2.1. The vulnerability impacts Indexers configured to use TCPTokens. It does not impact Universal Forwarders.

7.5CVSS7.7AI score0.00145EPSS
CVE
CVE
added 2024/07/01 5:15 p.m.84 views

CVE-2024-36982

In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.109 and 9.1.2308.207, an attacker could trigger a null pointer reference on the cluster/config REST endpoint, which could result in a crash of the Splunk daemon.

7.5CVSS7.5AI score0.00324EPSS
CVE
CVE
added 2025/03/26 10:15 p.m.73 views

CVE-2025-20231

In Splunk Enterprise versions below 9.4.1, 9.3.3, 9.2.5, and 9.1.8, and versions below 3.8.38 and 3.7.23 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles could run a search using the permissions of a higher-privi...

7.1CVSS6.6AI score0.00035EPSS
CVE
CVE
added 2022/06/15 5:15 p.m.72 views

CVE-2022-32157

Splunk Enterprise deployment servers in versions before 9.0 allow unauthenticated downloading of forwarder bundles. Remediation requires you to update the deployment server to version 9.0 and Configure authentication for deployment servers and clients (https://docs.splunk.com/Documentation/Splunk/9...

7.5CVSS7.7AI score0.00503EPSS
CVE
CVE
added 2022/11/04 11:15 p.m.72 views

CVE-2022-43572

In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, sending a malformed file through the Splunk-to-Splunk (S2S) or HTTP Event Collector (HEC) protocols to an indexer results in a blockage or denial-of-service preventing further indexing.

7.5CVSS6.5AI score0.00459EPSS
CVE
CVE
added 2024/07/01 5:15 p.m.71 views

CVE-2024-36989

In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200, a low-privileged user that does not hold the admin or power Splunk roles could create notifications in Splunk Web Bulletin Messages that all users on the instance receive.

7.1CVSS5.5AI score0.00291EPSS
CVE
CVE
added 2024/10/14 5:15 p.m.68 views

CVE-2024-45732

In Splunk Enterprise versions below 9.3.1, and 9.2.0 versions below 9.2.3, and Splunk Cloud Platform versions below 9.2.2403.103, 9.1.2312.200, 9.1.2312.110 and 9.1.2308.208, a low-privileged user that does not hold the "admin" or "power" Splunk roles could run a search as the "nobody" Splunk user ...

7.1CVSS6.6AI score0.00037EPSS
CVE
CVE
added 2022/06/15 5:15 p.m.65 views

CVE-2022-32155

In universal forwarder versions before 9.0, management services are available remotely by default. When not required, it introduces a potential exposure, but it is not a vulnerability. If exposed, we recommend each customer assess the potential severity specific to your environment. In 9.0, the uni...

7.5CVSS7.4AI score0.00432EPSS
CVE
CVE
added 2018/10/23 9:31 p.m.61 views

CVE-2018-7429

Splunkd in Splunk Enterprise 6.2.x before 6.2.14 6.3.x before 6.3.11, and 6.4.x before 6.4.8; and Splunk Light before 6.5.0 allow remote attackers to cause a denial of service via a malformed HTTP request.

7.5CVSS7.3AI score0.00598EPSS
CVE
CVE
added 2018/10/23 9:31 p.m.59 views

CVE-2018-7432

Splunk Enterprise 6.2.x before 6.2.14, 6.3.x before 6.3.10, 6.4.x before 6.4.7, and 6.5.x before 6.5.3; and Splunk Light before 6.6.0 allow remote attackers to cause a denial of service via a crafted HTTP request.

7.5CVSS7.3AI score0.00577EPSS
CVE
CVE
added 2018/10/19 8:29 a.m.42 views

CVE-2017-18348

Splunk Enterprise 6.6.x, when configured to run as root but drop privileges to a specific non-root account, allows local users to gain privileges by leveraging access to that non-root account to modify $SPLUNK_HOME/etc/splunk-launch.conf and insert Trojan horse programs into $SPLUNK_HOME/bin, becau...

7CVSS6.9AI score0.00052EPSS
Web
CVE
CVE
added 2010/06/28 6:30 p.m.41 views

CVE-2010-2502

Multiple directory traversal vulnerabilities in Splunk 4.0 through 4.0.10 and 4.1 through 4.1.1 allow (1) remote attackers to read arbitrary files, aka SPL-31194; (2) remote authenticated users to modify arbitrary files, aka SPL-31063; or (3) have an unknown impact via redirects, aka SPL-31067.

7.5CVSS6.8AI score0.00255EPSS
CVE
CVE
added 2020/01/23 3:15 p.m.35 views

CVE-2013-6773

Splunk 5.0.3 has an Unquoted Service Path in Windows for Universal Forwarder which can allow an attacker to escalate privileges

7.8CVSS8.3AI score0.00049EPSS
CVE
CVE
added 2025/07/07 6:15 p.m.16 views

CVE-2025-20320

In Splunk Enterprise versions below 9.4.3, 9.3.5, 9.2.7 and 9.1.10, and Splunk Cloud Platform versions below 9.3.2411.107, 9.3.2408.117, and 9.2.2406.121, a low-privileged user that does not hold the "admin" or "power" Splunk roles could craft a malicious payload through the User Interface - Views ...

7.3CVSS6.6AI score0.00052EPSS