Логотип exploitDog
bind:CVE-2023-32717
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-32717

Количество 2

Количество 2

nvd логотип

CVE-2023-32717

больше 2 лет назад

On Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, and in Splunk Cloud Platform versions below 9.0.2303.100, an unauthorized user can access the {{/services/indexing/preview}} REST endpoint to overwrite search results if they know the search ID (SID) of an existing search job.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-vfcp-ccwj-q6wq

больше 2 лет назад

On Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, and in Splunk Cloud Platform versions below 9.0.2303.100, an unauthorized user can access the {{/services/indexing/preview}} REST endpoint to overwrite search results if they know the search ID (SID) of an existing search job.

CVSS3: 4.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-32717

On Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, and in Splunk Cloud Platform versions below 9.0.2303.100, an unauthorized user can access the {{/services/indexing/preview}} REST endpoint to overwrite search results if they know the search ID (SID) of an existing search job.

CVSS3: 4.3
0%
Низкий
больше 2 лет назад
github логотип
GHSA-vfcp-ccwj-q6wq

On Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, and in Splunk Cloud Platform versions below 9.0.2303.100, an unauthorized user can access the {{/services/indexing/preview}} REST endpoint to overwrite search results if they know the search ID (SID) of an existing search job.

CVSS3: 4.3
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу