Show filters
152 Total Results
Displaying 101-110 of 152
Sort by:
Attacker Value
Unknown
CVE-2021-42743
Disclosure Date: May 06, 2022 (last updated February 23, 2025)
A misconfiguration in the node default path allows for local privilege escalation from a lower privileged user to the Splunk user in Splunk Enterprise versions before 8.1.1 on Windows.
0
Attacker Value
Unknown
CVE-2021-33845
Disclosure Date: May 06, 2022 (last updated February 23, 2025)
The Splunk Enterprise REST API allows enumeration of usernames via the lockout error message. The potential vulnerability impacts Splunk Enterprise instances before 8.1.7 when configured to repress verbose login errors.
0
Attacker Value
Unknown
CVE-2021-31559
Disclosure Date: May 06, 2022 (last updated February 23, 2025)
A crafted request bypasses S2S TCP Token authentication writing arbitrary events to an index in Splunk Enterprise Indexer 8.1 versions before 8.1.5 and 8.2 versions before 8.2.1. The vulnerability impacts Indexers configured to use TCPTokens. It does not impact Universal Forwarders.
0
Attacker Value
Unknown
CVE-2021-26253
Disclosure Date: May 06, 2022 (last updated February 23, 2025)
A potential vulnerability in Splunk Enterprise's implementation of DUO MFA allows for bypassing the MFA verification in Splunk Enterprise versions before 8.1.6. The potential vulnerability impacts Splunk Enterprise instances configured to use DUO MFA and does not impact or affect a DUO product or service.
0
Attacker Value
Unknown
CVE-2021-3422
Disclosure Date: March 25, 2022 (last updated February 23, 2025)
The lack of validation of a key-value field in the Splunk-to-Splunk protocol results in a denial-of-service in Splunk Enterprise instances configured to index Universal Forwarder traffic. The vulnerability impacts Splunk Enterprise versions before 7.3.9, 8.0 versions before 8.0.9, and 8.1 versions before 8.1.3. It does not impact Universal Forwarders. When Splunk forwarding is secured using TLS or a Token, the attack requires compromising the certificate or token, or both. Implementation of either or both reduces the severity to Medium.
0
Attacker Value
Unknown
CVE-2013-6773
Disclosure Date: January 23, 2020 (last updated February 21, 2025)
Splunk 5.0.3 has an Unquoted Service Path in Windows for Universal Forwarder which can allow an attacker to escalate privileges
0
Attacker Value
Unknown
CVE-2013-6772
Disclosure Date: January 23, 2020 (last updated February 21, 2025)
Splunk before 5.0.4 lacks X-Frame-Options which can allow Clickjacking
0
Attacker Value
Unknown
CVE-2019-10390
Disclosure Date: August 28, 2019 (last updated October 26, 2023)
A sandbox bypass vulnerability in Jenkins Splunk Plugin 1.7.4 and earlier allowed attackers with Overall/Read permission to provide a Groovy script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.
0
Attacker Value
Unknown
CVE-2019-5727
Disclosure Date: February 21, 2019 (last updated November 27, 2024)
Splunk Web in Splunk Enterprise 6.5.x before 6.5.5, 6.4.x before 6.4.9, 6.3.x before 6.3.12, 6.2.x before 6.2.14, 6.1.x before 6.1.14, and 6.0.x before 6.0.15 and Splunk Light before 6.6.0 has Persistent XSS, aka SPL-138827.
0
Attacker Value
Unknown
CVE-2018-7429
Disclosure Date: October 23, 2018 (last updated November 27, 2024)
Splunkd in Splunk Enterprise 6.2.x before 6.2.14 6.3.x before 6.3.11, and 6.4.x before 6.4.8; and Splunk Light before 6.5.0 allow remote attackers to cause a denial of service via a malformed HTTP request.
0