Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Splunk | Splunk Enterprise | 9.4 ~ 9.4.3 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2025-20319 | 6.8 MEDIUM | Remote Command Execution through Scripted Input Files in Splunk Enterprise |
| CVE-2025-20321 | 6.5 MEDIUM | Membership State Change in Splunk Search Head Cluster through a Cross-Site Request Forgery |
| CVE-2025-20320 | 6.3 MEDIUM | Denial of Service (DoS) through “User Interface - Views“ configuration page in Splunk Ente |
| CVE-2025-20324 | 5.4 MEDIUM | Improper Access Control in System Source Types Configuration in Splunk Enterprise |
| CVE-2025-20322 | 4.3 MEDIUM | Denial of Service (DoS) in Search Head Cluster through Cross-Site Request Forgery (CSRF) i |
| CVE-2025-20300 | 4.3 MEDIUM | Improper Access Control Lets Low-Privilege Users Suppress Read-Only Alerts in Splunk Enter |
| CVE-2025-20325 | 3.1 LOW | Sensitive Information Disclosure in the SHCConfig logging channel in Clustered Deployments |
No comments yet