Show filters
218 Total Results
Displaying 171-180 of 218
Sort by:
Attacker Value
Unknown
CVE-2013-6772
Disclosure Date: January 23, 2020 (last updated February 21, 2025)
Splunk before 5.0.4 lacks X-Frame-Options which can allow Clickjacking
0
Attacker Value
Unknown
CF CLI writes the client id and secret to config file
Disclosure Date: August 05, 2019 (last updated November 27, 2024)
CF CLI version prior to v6.45.0 (bosh release version 1.16.0) writes the client id and secret to its config file when the user authenticates with --client-credentials flag. A local authenticated malicious user with access to the CF CLI config file can act as that client, who is the owner of the leaked credentials.
0
Attacker Value
Unknown
CVE-2019-5729
Disclosure Date: March 21, 2019 (last updated November 27, 2024)
Splunk-SDK-Python before 1.6.6 does not properly verify untrusted TLS server certificates, which could result in man-in-the-middle attacks.
0
Attacker Value
Unknown
CVE-2019-5727
Disclosure Date: February 21, 2019 (last updated November 27, 2024)
Splunk Web in Splunk Enterprise 6.5.x before 6.5.5, 6.4.x before 6.4.9, 6.3.x before 6.3.12, 6.2.x before 6.2.14, 6.1.x before 6.1.14, and 6.0.x before 6.0.15 and Splunk Light before 6.6.0 has Persistent XSS, aka SPL-138827.
0
Attacker Value
Unknown
CVE-2018-7429
Disclosure Date: October 23, 2018 (last updated November 27, 2024)
Splunkd in Splunk Enterprise 6.2.x before 6.2.14 6.3.x before 6.3.11, and 6.4.x before 6.4.8; and Splunk Light before 6.5.0 allow remote attackers to cause a denial of service via a malformed HTTP request.
0
Attacker Value
Unknown
CVE-2018-7431
Disclosure Date: October 23, 2018 (last updated November 27, 2024)
Directory traversal vulnerability in the Splunk Django App in Splunk Enterprise 6.0.x before 6.0.14, 6.1.x before 6.1.13, 6.2.x before 6.2.14, 6.3.x before 6.3.10, 6.4.x before 6.4.6, and 6.5.x before 6.5.3; and Splunk Light before 6.6.0 allows remote authenticated users to read arbitrary files via unspecified vectors.
0
Attacker Value
Unknown
CVE-2018-7432
Disclosure Date: October 23, 2018 (last updated November 27, 2024)
Splunk Enterprise 6.2.x before 6.2.14, 6.3.x before 6.3.10, 6.4.x before 6.4.7, and 6.5.x before 6.5.3; and Splunk Light before 6.6.0 allow remote attackers to cause a denial of service via a crafted HTTP request.
0
Attacker Value
Unknown
CVE-2018-7427
Disclosure Date: October 23, 2018 (last updated November 27, 2024)
Cross-site scripting (XSS) vulnerability in Splunk Web in Splunk Enterprise 6.0.x before 6.0.14, 6.1.x before 6.1.13, 6.2.x before 6.2.14, 6.3.x before 6.3.10, 6.4.x before 6.4.7, and 6.5.x before 6.5.3; and Splunk Light before 6.6.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
0
Attacker Value
Unknown
CVE-2017-18348
Disclosure Date: October 19, 2018 (last updated November 27, 2024)
Splunk Enterprise 6.6.x, when configured to run as root but drop privileges to a specific non-root account, allows local users to gain privileges by leveraging access to that non-root account to modify $SPLUNK_HOME/etc/splunk-launch.conf and insert Trojan horse programs into $SPLUNK_HOME/bin, because the non-root setup instructions state that chown should be run across all of $SPLUNK_HOME to give non-root access.
0
Attacker Value
Unknown
CVE-2018-11409
Disclosure Date: June 08, 2018 (last updated November 26, 2024)
Splunk through 7.0.1 allows information disclosure by appending __raw/services/server/info/server-info?output_mode=json to a query, as demonstrated by discovering a license key.
0