Splunk Enterprise Vulnerabilities
Splunk Splunk Enterprise vulnerabilities.
Vulnerability Published:
ποΈ Published
- Anytime
Sort By:
ποΈ Published Date
- Descending
Access Control Flaw in Splunk Enterprise and Secure Gateway App
CVE-2025-20230SplunkSplunk Enterprise4.3MEDIUMPrivilege Escalation Vulnerability in Splunk Enterprise and Cloud Platform
CVE-2025-20232SplunkSplunk Enterprise5.7MEDIUMRemote Code Execution Vulnerability in Splunk Enterprise and Splunk Cloud Platform
CVE-2025-20229SplunkSplunk Enterprise8HIGHCross-Site Request Forgery Vulnerability in Splunk Enterprise and Cloud
CVE-2025-20228SplunkSplunk Enterprise6.5MEDIUMInformation Disclosure in Splunk Enterprise and Cloud Platform
CVE-2025-20227SplunkSplunk Enterprise4.3MEDIUMPrivilege Escalation in Splunk Enterprise Due to Inadequate Permission Handling
CVE-2025-20226SplunkSplunk Enterprise5.7MEDIUMUnauthorized Information Disclosure in Splunk Enterprise by Low-Privileged Users
CVE-2025-20231SplunkSplunk Enterprise7.1HIGHPrivilege Escalation in Splunk Enterprise and Cloud Platforms
CVE-2024-53244SplunkSplunk Enterprise5.7MEDIUMSensitive Information Disclosure in Splunk Enterprise and Cloud Platform
CVE-2024-53246SplunkSplunk Enterprise7.5HIGHLow-Privileged User RCE Vulnerability in Splunk Enterprise and Secure Gateway
CVE-2024-53247SplunkSplunk Enterprise8.8HIGHInsufficient Access Control in Splunk Enterprise and Splunk Cloud Platform
CVE-2024-53245SplunkSplunk Enterprise4.3MEDIUMImproper Access Control in Splunk Enterprise and Secure Gateway App
CVE-2024-53243SplunkSplunk Enterprise4.3MEDIUMLow-Privileged User Vulnerability in Splunk Enterprise
CVE-2024-45732SplunkSplunk Enterprise7.1HIGHPotential Remote Command Execution (RCE) through arbitrary file write to Windows system root directory when Splunk Enterprise for Windows is installed on a separate disk
CVE-2024-45731SplunkSplunk Enterprise8HIGHRemote Code Execution (RCE) due to insecure session storage configuration in Splunk Enterprise on Windows
CVE-2024-45733SplunkSplunk Enterprise8.8HIGHImproper Access Control for low-privileged user in Splunk Secure Gateway App
CVE-2024-45735SplunkSplunk Enterprise4.3MEDIUMLow-Privileged User Vulnerability in Splunk Enterprise
CVE-2024-45737SplunkSplunk Enterprise4.3MEDIUMLow-Privileged User Could Execute Unauthorized JavaScript Code Through Scheduled Views
CVE-2024-45740SplunkSplunk Enterprise5.4MEDIUMSplunk Enterprise Version Vulnerability Could Lead to Browser JavaScript Execution
CVE-2024-45741SplunkSplunk Enterprise5.4MEDIUMPotential Exposure of Plaintext Passwords in Splunk Enterprise
CVE-2024-45739SplunkSplunk Enterprise4.9MEDIUMLow Privilege User can View Images on the Host Machine by using the PDF Export feature in Splunk Classic Dashboard
CVE-2024-45734SplunkSplunk Enterprise4.3MEDIUMSplunk Enterprise Versions below 9.3.1, 9.2.3, and 9.1.6 Have a Vulnerability in Field Transformation That Can Crash the Splunk Daemon
CVE-2024-45736SplunkSplunk Enterprise6.5MEDIUMSplunk Enterprise Exposes Sensitive HTTP Parameters
CVE-2024-45738SplunkSplunk Enterprise4.9MEDIUMSplunk Enterprise Vulnerability: Arbitrary JavaScript Code Execution in Browser Context
CVE-2024-36997SplunkSplunk Enterprise8.1HIGHLow-Privileged User Could Execute Unauthorized JavaScript Code Through Splunk Web Bulletin Messages
CVE-2024-36993SplunkSplunk Enterprise5.4MEDIUM