8

CVSS3.1

CVE-2024-36983 - Command Injection using External Lookups

In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.109 and 9.1.2308.207, an authenticated user could create an external lookup that calls a legacy internal function. The authenticated user could use this internal function to insert code in…

πŸ“… Published: July 1, 2024, 4:30 p.m. πŸ”„ Last Modified: March 7, 2025, 4:48 p.m.

5.3

CVSS3.1

CVE-2024-36996 - Information Disclosure of user names

In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.109, an attacker could determine whether or not another user exists on the instance by deciphering the error response that they would likely receive from the instance when they attempt to …

πŸ“… Published: July 1, 2024, 4:30 p.m. πŸ”„ Last Modified: Feb. 28, 2025, 11:03 a.m.

5.4

CVSS3.1

CVE-2024-36994 - Persistent Cross-site Scripting (XSS) in Dashboard Elements

In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, a low-privileged user that does not hold the admin or power Splunk roles could craft a malicious payload through a View and Splunk Web Bulletin Messages that could re…

πŸ“… Published: July 1, 2024, 4:30 p.m. πŸ”„ Last Modified: Feb. 28, 2025, 11:03 a.m.

6.5

CVSS3.1

CVE-2024-36989 - Low-privileged user could create notifications in Splunk Web Bulletin Messages

In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200, a low-privileged user that does not hold the admin or power Splunk roles could create notifications in Splunk Web Bulletin Messages that all users on the instance receive.

πŸ“… Published: July 1, 2024, 4:30 p.m. πŸ”„ Last Modified: Feb. 28, 2025, 11:03 a.m.

4.3

CVSS3.1

CVE-2024-36987 - Insecure File Upload in the indexing/preview REST endpoint

In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200, an authenticated, low-privileged user who does not hold the admin or power Splunk roles could upload a file with an arbitrary extension using the indexing/preview REST endpoint.

πŸ“… Published: July 1, 2024, 4:30 p.m. πŸ”„ Last Modified: Feb. 28, 2025, 11:03 a.m.

6

CVSS3.1

CVE-2024-20399 - Cisco NX-OS Software CLI Command Injection Vulnerability

A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated user in possession of Administrator credentials to execute arbitrary commands as root on the underlying operating system of an affected device. This vulnerability is due to insufficient validation of arguments that a…

πŸ“… Published: July 1, 2024, 4:11 p.m. πŸ”„ Last Modified: Oct. 28, 2025, 1:59 p.m.

6.1

CVSS3.1

CVE-2024-36422 - GHSL-2023-245: Flowise xss in api/v1/chatflows/id

Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, a reflected cross-site scripting vulnerability occurs in the `api/v1/chatflows/id` endpoint. If the default configuration is used (unauthenticated), an attacker may be able to craft…

πŸ“… Published: July 1, 2024, 4:02 p.m. πŸ”„ Last Modified: Nov. 21, 2024, 9:22 a.m.

7.5

CVSS3.1

CVE-2024-36421 - GHSL-2023-234: Flowise Cors Misconfiguration in packages/server/src/index.ts

Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, A CORS misconfiguration sets the Access-Control-Allow-Origin header to all, allowing arbitrary origins to connect to the website. In the default configuration (unauthenticated), arb…

πŸ“… Published: July 1, 2024, 3:58 p.m. πŸ”„ Last Modified: Nov. 21, 2024, 9:22 a.m.

7.5

CVSS3.1

CVE-2024-36420 - GHSL-2023-232: Flowise Path Injection at /api/v1/openai-assistants-file

Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, the `/api/v1/openai-assistants-file` endpoint in `index.ts` is vulnerable to arbitrary file read due to lack of sanitization of the `fileName` body parameter. No known patches for t…

πŸ“… Published: July 1, 2024, 3:53 p.m. πŸ”„ Last Modified: Nov. 21, 2024, 9:22 a.m.

9.8

CVSS3.1

CVE-2024-36401 - Remote Code Execution (RCE) vulnerability in evaluating property name expressions in Geoserver

GeoServer is an open source server that allows users to share and edit geospatial data. Prior to versions 2.22.6, 2.23.6, 2.24.4, and 2.25.2, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer instal…

πŸ“… Published: July 1, 2024, 3:25 p.m. πŸ”„ Last Modified: Oct. 24, 2025, 2 p.m.
Total resulsts: 347728
Page 9145 of 34,773
Β« previous page Β» next page
Filters