Splunk Enterprise Vulnerabilities
Splunk Splunk Enterprise vulnerabilities.
Vulnerability Published:
ποΈ Published
- Anytime
Sort By:
ποΈ Published Date
- Descending
Insufficient Access Control in Splunk Enterprise and Splunk Cloud Platform
CVE-2024-53245SplunkSplunk Enterprise3.1LOWImproper Access Control in Splunk Enterprise and Secure Gateway App
CVE-2024-53243SplunkSplunk Enterprise4.3MEDIUMSensitive Information Disclosure in Splunk Enterprise and Cloud Platform
CVE-2024-53246SplunkSplunk Enterprise5.3MEDIUMLow-Privileged User RCE Vulnerability in Splunk Enterprise and Secure Gateway
CVE-2024-53247SplunkSplunk Enterprise8.8HIGHPrivilege Escalation in Splunk Enterprise and Cloud Platforms
CVE-2024-53244SplunkSplunk Enterprise5.7MEDIUMPotential Exposure of Plaintext Passwords in Splunk Enterprise
CVE-2024-45739SplunkSplunk Enterprise4.9MEDIUMLow-Privileged User Vulnerability in Splunk Enterprise
CVE-2024-45737SplunkSplunk Enterprise4.3MEDIUMPotential Remote Command Execution (RCE) through arbitrary file write to Windows system root directory when Splunk Enterprise for Windows is installed on a separate disk
CVE-2024-45731SplunkSplunk Enterprise8HIGHLow-Privileged User Vulnerability in Splunk Enterprise
CVE-2024-45732SplunkSplunk Enterprise7.1HIGHImproper Access Control for low-privileged user in Splunk Secure Gateway App
CVE-2024-45735SplunkSplunk Enterprise4.3MEDIUMSplunk Enterprise Version Vulnerability Could Lead to Browser JavaScript Execution
CVE-2024-45741SplunkSplunk Enterprise5.4MEDIUMLow Privilege User can View Images on the Host Machine by using the PDF Export feature in Splunk Classic Dashboard
CVE-2024-45734SplunkSplunk Enterprise4.3MEDIUMSplunk Enterprise Versions below 9.3.1, 9.2.3, and 9.1.6 Have a Vulnerability in Field Transformation That Can Crash the Splunk Daemon
CVE-2024-45736SplunkSplunk Enterprise6.5MEDIUMRemote Code Execution (RCE) due to insecure session storage configuration in Splunk Enterprise on Windows
CVE-2024-45733SplunkSplunk Enterprise8.8HIGHLow-Privileged User Could Execute Unauthorized JavaScript Code Through Scheduled Views
CVE-2024-45740SplunkSplunk Enterprise5.4MEDIUMSplunk Enterprise Exposes Sensitive HTTP Parameters
CVE-2024-45738SplunkSplunk Enterprise4.9MEDIUMSplunk Enterprise Vulnerability: Arbitrary JavaScript Code Execution in Browser Context
CVE-2024-36997SplunkSplunk Enterprise4.6MEDIUMLow-Privileged User Could Execute Unauthorized JavaScript Code Through Splunk Web Bulletin Messages
CVE-2024-36993SplunkSplunk Enterprise5.4MEDIUMLow-Privileged Users Can Create Experimental Items in Splunk Enterprise Versions Below 9.2.2, 9.1.5, and 9.0.10
CVE-2024-36995SplunkSplunk Enterprise4.3MEDIUMSplunk Enterprise Crash Vulnerability
CVE-2024-36982SplunkSplunk Enterprise7.5HIGHSplunk Enterprise Path Traversal Vulnerability on Windows
CVE-2024-36991SplunkSplunk Enterpriseπ₯ππ°πΎπ‘EPSS 12%π°7.5HIGHLow-Privileged User Could Cause Denial of Service in Splunk Enterprise
CVE-2024-36990SplunkSplunk Enterprise6.5MEDIUMLow-Privileged User Vulnerability in Splunk Enterprise Could Lead to Remote Code Execution
CVE-2024-36985SplunkSplunk Enterprise8.8HIGHSplunk Enterprise Vulnerable to Persistent XSS Attacks
CVE-2024-36992SplunkSplunk Enterprise5.4MEDIUMSplunk Enterprise Vulnerability Allows Arbitrary Code Execution
CVE-2024-36984SplunkSplunk Enterprise8.8HIGH