Splunk Vulnerabilities
Comprehensive security vulnerability database for Splunk products
1
0
1
0
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2022-32156 | 8.1 | This vulnerability allows an attacker to potentially intercept and manipulate data between the Splunk command-line interface and a remote Splunk instance because the system does not verify the security of the connection by default. However, for this to happen, the attacker would need to be in a position to perform a man-in-the-middle attack, which requires specific conditions that are not easily achievable. | splunksplunk | Exploit Available | almost 4 years agoJun 15, 2022 |
About Splunk Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Splunk products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.