Show filters
218 Total Results
Displaying 41-50 of 218
Sort by:
Attacker Value
Unknown
CVE-2023-46230
Disclosure Date: January 30, 2024 (last updated February 06, 2024)
In Splunk Add-on Builder versions below 4.1.4, the app writes sensitive information to internal log files.
0
Attacker Value
Unknown
CVE-2024-23678
Disclosure Date: January 22, 2024 (last updated January 30, 2024)
In Splunk Enterprise for Windows versions below 9.0.8 and 9.1.3, Splunk Enterprise does not correctly sanitize path input data. This results in the unsafe deserialization of untrusted data from a separate disk partition on the machine. This vulnerability only affects Splunk Enterprise for Windows.
0
Attacker Value
Unknown
CVE-2024-23677
Disclosure Date: January 22, 2024 (last updated January 30, 2024)
In Splunk Enterprise versions below 9.0.8, the Splunk RapidDiag utility discloses server responses from external applications in a log file.
0
Attacker Value
Unknown
CVE-2024-23676
Disclosure Date: January 22, 2024 (last updated January 30, 2024)
In Splunk versions below 9.0.8 and 9.1.3, the “mrollup” SPL command lets a low-privileged user view metrics on an index that they do not have permission to view. This vulnerability requires user interaction from a high-privileged user to exploit.
0
Attacker Value
Unknown
CVE-2024-23675
Disclosure Date: January 22, 2024 (last updated January 30, 2024)
In Splunk Enterprise versions below 9.0.8 and 9.1.3, Splunk app key value store (KV Store) improperly handles permissions for users that use the REST application programming interface (API). This can potentially result in the deletion of KV Store collections.
0
Attacker Value
Unknown
CVE-2024-22165
Disclosure Date: January 09, 2024 (last updated January 17, 2024)
In Splunk Enterprise Security (ES) versions lower than 7.1.2, an attacker can create a malformed Investigation to perform a denial of service (DoS). The malformed investigation prevents the generation and rendering of the Investigations manager until it is deleted.<br>The vulnerability requires an authenticated session and access to create an Investigation. It only affects the availability of the Investigations manager, but without the manager, the Investigations functionality becomes unusable for most users.
0
Attacker Value
Unknown
CVE-2024-22164
Disclosure Date: January 09, 2024 (last updated January 17, 2024)
In Splunk Enterprise Security (ES) versions below 7.1.2, an attacker can use investigation attachments to perform a denial of service (DoS) to the Investigation. The attachment endpoint does not properly limit the size of the request which lets an attacker cause the Investigation to become inaccessible.
0
Attacker Value
Unknown
CVE-2023-46214
Disclosure Date: November 16, 2023 (last updated November 25, 2023)
In Splunk Enterprise versions below 9.0.7 and 9.1.2, Splunk Enterprise does not safely sanitize extensible stylesheet language transformations (XSLT) that users supply. This means that an attacker can upload malicious XSLT which can result in remote code execution on the Splunk Enterprise instance.
0
Attacker Value
Unknown
CVE-2023-46213
Disclosure Date: November 16, 2023 (last updated November 25, 2023)
In Splunk Enterprise versions below 9.0.7 and 9.1.2, ineffective escaping in the “Show syntax Highlighted” feature can result in the execution of unauthorized code in a user’s web browser.
0
Attacker Value
Unknown
CVE-2023-4571
Disclosure Date: August 30, 2023 (last updated December 10, 2024)
In Splunk IT Service Intelligence (ITSI) versions below below 4.13.3, 4.15.3, or 4.17.1, a malicious actor can inject American National Standards Institute (ANSI) escape codes into Splunk ITSI log files that, when a vulnerable terminal application reads them, can run malicious code in the vulnerable application. This attack requires a user to use a terminal application that translates ANSI escape codes to read the malicious log file locally in the vulnerable terminal. The vulnerability also requires additional user interaction to succeed.
The vulnerability does not directly affect Splunk ITSI. The indirect impact on Splunk ITSI can vary significantly depending on the permissions in the vulnerable terminal application, as well as where and how the user reads the malicious log file. For example, users can copy the malicious file from Splunk ITSI and read it on their local machine.
0