Show filters
152 Total Results
Displaying 31-40 of 152
Sort by:
Attacker Value
Unknown
CVE-2024-36985
Disclosure Date: July 01, 2024 (last updated July 02, 2024)
In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10, a low-privileged user that does not hold the admin or power Splunk roles could cause a Remote Code Execution through an external lookup that references the “splunk_archiver“ application.
0
Attacker Value
Unknown
CVE-2024-36984
Disclosure Date: July 01, 2024 (last updated July 02, 2024)
In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 on Windows, an authenticated user could execute a specially crafted query that they could then use to serialize untrusted data. The attacker could use the query to execute arbitrary code.
0
Attacker Value
Unknown
CVE-2024-36983
Disclosure Date: July 01, 2024 (last updated July 02, 2024)
In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.109 and 9.1.2308.207, an authenticated user could create an external lookup that calls a legacy internal function. The authenticated user could use this internal function to insert code into the Splunk platform installation directory. From there, the user could execute arbitrary code on the Splunk platform Instance.
0
Attacker Value
Unknown
CVE-2024-36982
Disclosure Date: July 01, 2024 (last updated August 03, 2024)
In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.109 and 9.1.2308.207, an attacker could trigger a null pointer reference on the cluster/config REST endpoint, which could result in a crash of the Splunk daemon.
0
Attacker Value
Unknown
CVE-2024-35291
Disclosure Date: May 27, 2024 (last updated May 27, 2024)
Cross-site scripting vulnerability exists in Splunk Config Explorer versions prior to 1.7.16. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is using the product.
0
Attacker Value
Unknown
CVE-2024-29946
Disclosure Date: March 27, 2024 (last updated April 11, 2024)
In Splunk Enterprise versions below 9.2.1, 9.1.4, and 9.0.9, the Dashboard Examples Hub lacks protections for risky SPL commands. This could let attackers bypass SPL safeguards for risky commands in the Hub. The vulnerability would require the attacker to phish the victim by tricking them into initiating a request within their browser.
0
Attacker Value
Unknown
CVE-2024-29945
Disclosure Date: March 27, 2024 (last updated April 11, 2024)
In Splunk Enterprise versions below 9.2.1, 9.1.4, and 9.0.9, the software potentially exposes authentication tokens during the token validation process. This exposure happens when either Splunk Enterprise runs in debug mode or the JsonWebToken component has been configured to log its activity at the DEBUG logging level.
0
Attacker Value
Unknown
CVE-2024-23678
Disclosure Date: January 22, 2024 (last updated January 30, 2024)
In Splunk Enterprise for Windows versions below 9.0.8 and 9.1.3, Splunk Enterprise does not correctly sanitize path input data. This results in the unsafe deserialization of untrusted data from a separate disk partition on the machine. This vulnerability only affects Splunk Enterprise for Windows.
0
Attacker Value
Unknown
CVE-2024-23677
Disclosure Date: January 22, 2024 (last updated January 30, 2024)
In Splunk Enterprise versions below 9.0.8, the Splunk RapidDiag utility discloses server responses from external applications in a log file.
0
Attacker Value
Unknown
CVE-2024-23676
Disclosure Date: January 22, 2024 (last updated January 30, 2024)
In Splunk versions below 9.0.8 and 9.1.3, the “mrollup” SPL command lets a low-privileged user view metrics on an index that they do not have permission to view. This vulnerability requires user interaction from a high-privileged user to exploit.
0