Логотип exploitDog
bind:CVE-2023-40593
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-40593

Количество 2

Количество 2

nvd логотип

CVE-2023-40593

больше 2 лет назад

In Splunk Enterprise versions lower than 9.0.6 and 8.2.12, a malicious actor can send a malformed security assertion markup language (SAML) request to the `/saml/acs` REST endpoint which can cause a denial of service through a crash or hang of the Splunk daemon.

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-qpqv-mwrg-mw8j

больше 2 лет назад

In Splunk Enterprise versions lower than 9.0.6 and 8.2.12, a malicious actor can send a malformed security assertion markup language (SAML) request to the `/saml/acs` REST endpoint which can cause a denial of service through a crash or hang of the Splunk daemon.

CVSS3: 6.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-40593

In Splunk Enterprise versions lower than 9.0.6 and 8.2.12, a malicious actor can send a malformed security assertion markup language (SAML) request to the `/saml/acs` REST endpoint which can cause a denial of service through a crash or hang of the Splunk daemon.

CVSS3: 6.3
0%
Низкий
больше 2 лет назад
github логотип
GHSA-qpqv-mwrg-mw8j

In Splunk Enterprise versions lower than 9.0.6 and 8.2.12, a malicious actor can send a malformed security assertion markup language (SAML) request to the `/saml/acs` REST endpoint which can cause a denial of service through a crash or hang of the Splunk daemon.

CVSS3: 6.3
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу