Vulnerabilities > Splunk > Splunk > 6.6.5

DATE CVE VULNERABILITY TITLE RISK
2022-05-06 CVE-2022-26070 Information Exposure Through an Error Message vulnerability in Splunk
When handling a mismatched pre-authentication cookie, the application leaks the internal error message in the response, which contains the Splunk Enterprise local system path.
network
low complexity
splunk CWE-209
4.0
2022-03-25 CVE-2021-3422 Improper Input Validation vulnerability in Splunk
The lack of validation of a key-value field in the Splunk-to-Splunk protocol results in a denial-of-service in Splunk Enterprise instances configured to index Universal Forwarder traffic.
network
splunk CWE-20
4.3
2018-10-19 CVE-2017-18348 Incorrect Permission Assignment for Critical Resource vulnerability in Splunk
Splunk Enterprise 6.6.x, when configured to run as root but drop privileges to a specific non-root account, allows local users to gain privileges by leveraging access to that non-root account to modify $SPLUNK_HOME/etc/splunk-launch.conf and insert Trojan horse programs into $SPLUNK_HOME/bin, because the non-root setup instructions state that chown should be run across all of $SPLUNK_HOME to give non-root access.
local
splunk CWE-732
6.9
2018-06-08 CVE-2018-11409 Information Exposure vulnerability in Splunk
Splunk through 7.0.1 allows information disclosure by appending __raw/services/server/info/server-info?output_mode=json to a query, as demonstrated by discovering a license key.
network
low complexity
splunk CWE-200
5.0