Lucene search

K
SplunkSplunk

5 matches found

CVE
CVE
added 2022/06/15 5:15 p.m.71 views

CVE-2022-32151

The httplib and urllib Python libraries that Splunk shipped with Splunk Enterprise did not validate certificates using the certificate authority (CA) certificate stores by default in Splunk Enterprise versions before 9.0 and Splunk Cloud Platform versions before 8.2.2203. Python 3 client libraries ...

9.1CVSS8.5AI score0.00277EPSS
CVE
CVE
added 2022/08/16 9:15 p.m.70 views

CVE-2022-37437

When using Ingest Actions to configure a destination that resides on Amazon Simple Storage Service (S3) in Splunk Web, TLS certificate validation is not correctly performed and tested for the destination. The vulnerability only affects connections between Splunk Enterprise and an Ingest Actions Des...

9.8CVSS8.5AI score0.00156EPSS
CVE
CVE
added 2014/08/07 11:13 a.m.53 views

CVE-2013-6771

Directory traversal vulnerability in the collect script in Splunk before 5.0.5 allows remote attackers to execute arbitrary commands via a .. (dot dot) in the file parameter. NOTE: this issue was SPLIT per ADT2 due to different vulnerability types. CVE-2013-7394 is for the issue in the "runshellscr...

9.3CVSS7.5AI score0.04064EPSS
CVE
CVE
added 2014/08/07 11:13 a.m.40 views

CVE-2013-7394

The "runshellscript echo.sh" script in Splunk before 5.0.5 allows remote authenticated users to execute arbitrary commands via a crafted string. NOTE: this issue was SPLIT from CVE-2013-6771 per ADT2 due to different vulnerability types.

9CVSS7.1AI score0.04064EPSS
CVE
CVE
added 2012/01/03 11:55 a.m.38 views

CVE-2011-4644

Splunk 4.2.5 and earlier, when a Free license is selected, enables potentially undesirable functionality within an environment that intentionally does not support authentication, which allows remote attackers to (1) read arbitrary files via a management-console session that leverages the ability to...

9.3CVSS7.3AI score0.06656EPSS