Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Splunk | Splunk Enterprise | 9.3 ~ 9.3.1 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2024-45733 | 8.8 HIGH | Remote Code Execution (RCE) due to insecure session storage configuration in Splunk Enterp |
| CVE-2024-45731 | 8.0 HIGH | Potential Remote Command Execution (RCE) through arbitrary file write to Windows system ro |
| CVE-2024-45732 | 7.1 HIGH | Low-privileged user could run search as nobody in SplunkDeploymentServerConfig app |
| CVE-2024-45736 | 6.5 MEDIUM | Improperly Formatted ‘INGEST_EVAL’ Parameter Crashes Splunk Daemon |
| CVE-2024-45741 | 5.4 MEDIUM | Persistent Cross-Site Scripting (XSS) via props.conf on Splunk Enterprise |
| CVE-2024-45740 | 5.4 MEDIUM | Persistent Cross-Site Scripting (XSS) through Scheduled Views on Splunk Enterprise |
| CVE-2024-45738 | 4.9 MEDIUM | Sensitive information disclosure in REST_Calls logging channel |
| CVE-2024-45737 | 4.3 MEDIUM | Maintenance mode state change of App Key Value Store (KVStore) through Cross-Site Request |
| CVE-2024-45734 | 4.3 MEDIUM | Low Privilege User can View Images on the Host Machine by using the PDF Export feature in |
| CVE-2024-45735 | 4.3 MEDIUM | Improper Access Control for low-privileged user in Splunk Secure Gateway App |
No comments yet