Логотип exploitDog
bind:CVE-2023-32715
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-32715

Количество 3

Количество 3

nvd логотип

CVE-2023-32715

больше 2 лет назад

In the Splunk App for Lookup File Editing versions below 4.0.1, a user can insert potentially malicious JavaScript code into the app, which causes that code to run on the user’s machine. The app itself does not contain the potentially malicious JavaScript code. The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser, and requires additional user interaction to trigger. The attacker cannot exploit the vulnerability at will.

CVSS3: 4.7
EPSS: Низкий
github логотип

GHSA-49f3-f85j-5g57

больше 2 лет назад

In the Splunk App for Lookup File Editing versions below 4.0.1, a user can insert potentially malicious JavaScript code into the app, which causes that code to run on the user’s machine. The app itself does not contain the potentially malicious JavaScript code. The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser, and requires additional user interaction to trigger. The attacker cannot exploit the vulnerability at will.

CVSS3: 4.7
EPSS: Низкий
fstec логотип

BDU:2023-08434

больше 2 лет назад

Уязвимость приложения для редактирования файлов поиска Splunk App for Lookup File Editing, существующая из-за непринятия мер по защите структуры веб-страницы, позволяющая нарушителю провести атаку межсайтового скриптинга

CVSS3: 4.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-32715

In the Splunk App for Lookup File Editing versions below 4.0.1, a user can insert potentially malicious JavaScript code into the app, which causes that code to run on the user’s machine. The app itself does not contain the potentially malicious JavaScript code. The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser, and requires additional user interaction to trigger. The attacker cannot exploit the vulnerability at will.

CVSS3: 4.7
0%
Низкий
больше 2 лет назад
github логотип
GHSA-49f3-f85j-5g57

In the Splunk App for Lookup File Editing versions below 4.0.1, a user can insert potentially malicious JavaScript code into the app, which causes that code to run on the user’s machine. The app itself does not contain the potentially malicious JavaScript code. The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser, and requires additional user interaction to trigger. The attacker cannot exploit the vulnerability at will.

CVSS3: 4.7
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-08434

Уязвимость приложения для редактирования файлов поиска Splunk App for Lookup File Editing, существующая из-за непринятия мер по защите структуры веб-страницы, позволяющая нарушителю провести атаку межсайтового скриптинга

CVSS3: 4.7
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу