Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Splunk | Splunk Enterprise | 8.1 ~ 8.1.12 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2022-43570 | 8.8 HIGH | XML External Entity Injection through a custom View in Splunk Enterprise |
| CVE-2022-43568 | 8.8 HIGH | Reflected Cross-Site Scripting via the radio template in Splunk Enterprise |
| CVE-2022-43567 | 8.8 HIGH | Remote Code Execution via the Splunk Secure Gateway application Mobile Alerts feature |
| CVE-2022-43565 | 8.1 HIGH | Risky command safeguards bypass via ‘tstats command JSON in Splunk Enterprise |
| CVE-2022-43569 | 8.0 HIGH | Persistent Cross-Site Scripting via a Data Model object name in Splunk Enterprise |
| CVE-2022-43572 | 7.5 HIGH | Indexing blockage via malformed data sent through S2S or HEC protocols in Splunk Enterpris |
| CVE-2022-43566 | 7.3 HIGH | Risky command safeguards bypass via Search ID query in Analytics Workspace in Splunk Enter |
| CVE-2022-43564 | 4.9 MEDIUM | Denial of Service in Splunk Enterprise through search macros |
| CVE-2022-43562 | 3.0 LOW | Host Header Injection in Splunk Enterprise |
No comments yet