Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Splunk | Splunk Enterprise | 10.0 ~ 10.0.2 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2025-20387 | 8.0 HIGH | Incorrect permissions assignment on Splunk Universal Forwarder for Windows during new inst |
| CVE-2025-20381 | 5.4 MEDIUM | SPL commands allowlist controls bypass in Splunk MCP Server app through "run_splunk_query" |
| CVE-2025-20384 | 5.3 MEDIUM | Unauthenticated Log Injection in Splunk Enterprise |
| CVE-2025-20389 | 4.3 MEDIUM | Improper Input Validation in "label" column field in Splunk Secure Gateway App |
| CVE-2025-20383 | 4.3 MEDIUM | Improper access control through push notifications for reports and alerts in Splunk Secure |
| CVE-2025-20382 | 3.5 LOW | URL validation bypass through Views Dashboard in Splunk Enterprise |
| CVE-2025-20388 | 2.7 LOW | Blind Server Side Request Forgery (SSRF) through Distributed Search Peers in Splunk Enterp |
| CVE-2025-20385 | 2.4 LOW | Stored Cross-Site scripting (XSS) through Anchor Tag "href" in Navigation Bar Collections |
No comments yet