Filtered by vendor Splunk
Subscriptions
Filtered by product Cloud
Subscriptions
Total
5 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-46213 | 1 Splunk | 2 Cloud, Splunk | 2024-06-04 | 4.8 Medium |
In Splunk Enterprise versions below 9.0.7 and 9.1.2, ineffective escaping in the “Show syntax Highlighted” feature can result in the execution of unauthorized code in a user’s web browser. | ||||
CVE-2024-23677 | 1 Splunk | 2 Cloud, Splunk | 2024-04-10 | 5.3 Medium |
In Splunk Enterprise versions below 9.0.8, the Splunk RapidDiag utility discloses server responses from external applications in a log file. | ||||
CVE-2024-23676 | 1 Splunk | 2 Cloud, Splunk | 2024-04-10 | 3.5 Low |
In Splunk versions below 9.0.8 and 9.1.3, the “mrollup” SPL command lets a low-privileged user view metrics on an index that they do not have permission to view. This vulnerability requires user interaction from a high-privileged user to exploit. | ||||
CVE-2024-23675 | 1 Splunk | 2 Cloud, Splunk | 2024-04-10 | 6.5 Medium |
In Splunk Enterprise versions below 9.0.8 and 9.1.3, Splunk app key value store (KV Store) improperly handles permissions for users that use the REST application programming interface (API). This can potentially result in the deletion of KV Store collections. | ||||
CVE-2023-46214 | 1 Splunk | 2 Cloud, Splunk | 2024-04-10 | 8.8 High |
In Splunk Enterprise versions below 9.0.7 and 9.1.2, Splunk Enterprise does not safely sanitize extensible stylesheet language transformations (XSLT) that users supply. This means that an attacker can upload malicious XSLT which can result in remote code execution on the Splunk Enterprise instance. |
Page 1 of 1.