Browse all 6 CVE security advisories affecting Splunk, Inc. AI-powered Chinese analysis, POCs, and references for each vulnerability.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2022-32158 | Splunk Enterprise deployment servers allow client publishing of forwarder bundles — Splunk EnterpriseCWE-284 | 9.0 | Critical | 2022-06-15 |
| CVE-2022-32157 | Splunk Enterprise deployment servers allow unauthenticated forwarder bundle downloads — Splunk EnterpriseCWE-306 | 7.5 | High | 2022-06-15 |
| CVE-2022-32155 | Universal Forwarder management services allows remote login by default — Universal Forwarder | 9.1 | - | 2022-06-15 |
| CVE-2022-32154 | Risky commands warnings in Splunk Enterprise Dashboards — Splunk EnterpriseCWE-20 | 6.8 | Medium | 2022-06-15 |
| CVE-2022-32153 | Splunk Enterprise lacked TLS host name validation — Splunk EnterpriseCWE-297 | 8.1 | High | 2022-06-15 |
| CVE-2022-32151 | Splunk Enterprise disabled TLS validation using the CA certificate stores in Python 3 libraries by default — Splunk EnterpriseCWE-295 | 7.4 | High | 2022-06-15 |
This page lists every published CVE security advisory associated with Splunk, Inc. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.