Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Splunk | Splunk Enterprise | 8.2 ~ 8.2.12 | - | |
| Splunk | Splunk Cloud | - ~ 9.0.2305.200 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2023-40595 | 8.8 HIGH | Remote Code Execution via Serialized Session Payload |
| CVE-2023-4571 | 8.6 HIGH | Unauthenticated Log Injection in Splunk IT Service Intelligence (ITSI) |
| CVE-2023-40592 | 8.4 HIGH | Reflected Cross-site Scripting (XSS) on "/app/search/table" web endpoint |
| CVE-2023-40597 | 7.8 HIGH | Absolute Path Traversal in Splunk Enterprise Using runshellscript.py |
| CVE-2023-40596 | 7.0 HIGH | Splunk Enterprise on Windows Privilege Escalation due to Insecure OPENSSLDIR Build Definit |
| CVE-2023-40594 | 6.5 MEDIUM | Denial of Service (DoS) via the ‘printf’ Search Function |
| CVE-2023-40593 | 6.3 MEDIUM | Denial of Service (DoS) in Splunk Enterprise Using a Malformed SAML Request |
No comments yet