Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Splunk | Splunk Enterprise | 9.2 ~ 9.2.2 | - | |
| Splunk | Splunk Cloud Platform | 9.1.2312 ~ 9.1.2312.200 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2024-36984 | 8.8 HIGH | Remote Code Execution through Serialized Session Payload in Splunk Enterprise on Windows |
| CVE-2024-36985 | 8.8 HIGH | Remote Code Execution (RCE) through an external lookup due to “copybuckets.py“ script in t |
| CVE-2024-36983 | 8.0 HIGH | Command Injection using External Lookups |
| CVE-2024-36991 | 7.5 HIGH | Path Traversal on the “/modules/messaging/“ endpoint in Splunk Enterprise on Windows |
| CVE-2024-36982 | 7.5 HIGH | Denial of Service through null pointer reference in “cluster/config” REST endpoint |
| CVE-2024-36989 | 6.5 MEDIUM | Low-privileged user could create notifications in Splunk Web Bulletin Messages |
| CVE-2024-36990 | 6.5 MEDIUM | Denial of Service (DoS) on the datamodel/web REST endpoint |
| CVE-2024-36986 | 6.3 MEDIUM | Risky command safeguards bypass through Search ID query in Analytics Workspace |
| CVE-2024-36994 | 5.4 MEDIUM | Persistent Cross-site Scripting (XSS) in Dashboard Elements |
| CVE-2024-36993 | 5.4 MEDIUM | Persistent Cross-site Scripting (XSS) in Web Bulletin |
| CVE-2024-36996 | 5.3 MEDIUM | Information Disclosure of user names |
| CVE-2024-36997 | 4.6 MEDIUM | Persistent Cross-site Scripting (XSS) in conf-web/settings REST endpoint |
| CVE-2024-36987 | 4.3 MEDIUM | Insecure File Upload in the indexing/preview REST endpoint |
| CVE-2024-36995 | 4.3 MEDIUM | Low-privileged user could create experimental items |
No comments yet