Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
splunk splunk 6.5.0 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2018-7429
Splunkd in Splunk Enterprise 6.2.x prior to 6.2.14 6.3.x prior to 6.3.11, and 6.4.x prior to 6.4.8; and Splunk Light prior to 6.5.0 allow remote malicious users to cause a denial of service via a malformed HTTP request.
Splunk Splunk
6.5
CVSSv3
CVE-2017-5880
Splunk Web in Splunk Enterprise versions 6.5.x prior to 6.5.2, 6.4.x prior to 6.4.5, 6.3.x prior to 6.3.9, 6.2.x prior to 6.2.13, 6.1.x prior to 6.1.12, 6.0.x prior to 6.0.13, 5.0.x prior to 5.0.17 and Splunk Light versions prior to 6.5.2 allows remote authenticated users to caus...
Splunk Splunk 5.0.15
Splunk Splunk 6.2.9
Splunk Splunk 6.1.8
Splunk Splunk 5.0.0
Splunk Splunk 6.2.6
Splunk Splunk 5.0.14
Splunk Splunk 6.3.8
Splunk Splunk 6.0.12
Splunk Splunk 6.3.4
Splunk Splunk 6.1.2
Splunk Splunk 6.1.5
Splunk Splunk 6.1.4
Splunk Splunk 6.1.10
Splunk Splunk 6.4.4
Splunk Splunk 6.1.6
Splunk Splunk 6.2.12
Splunk Splunk 6.2.3
Splunk Splunk 6.2.1
Splunk Splunk 5.0.16
Splunk Splunk 6.3.5
Splunk Splunk 6.0.2
Splunk Splunk 6.1.7
4.8
CVSSv3
CVE-2017-12572
Persistent Cross Site Scripting (XSS) exists in Splunk Enterprise 6.5.x prior to 6.5.2, 6.4.x prior to 6.4.6, and 6.3.x prior to 6.3.9 and Splunk Light prior to 6.5.2, with exploitation requiring administrative access, aka SPL-134104.
Splunk Splunk 6.5.0
Splunk Splunk 6.3.8
Splunk Splunk 6.3.4
Splunk Splunk 6.4.4
Splunk Splunk 6.3.5
Splunk Splunk 6.4.1
Splunk Splunk 6.4.0
Splunk Splunk 6.3.0
Splunk Splunk 6.5.1
Splunk Splunk 6.3.3
Splunk Splunk 6.4.3
Splunk Splunk 6.3.7
Splunk Splunk 6.4.5
Splunk Splunk 6.4.2
Splunk Splunk 6.3.6
Splunk Splunk 6.3.1
Splunk Splunk 6.3.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started