CVE-2024-36991
HIGH
Published 2024-07-01T16:31:03.563Z
Actions:
CVSS Score
V3.1
7.5
/10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Base Score Metrics
Exploitability: N/A
Impact: N/A
EPSS Score
v2023.03.01
0.120
probability
of exploitation in the wild
There is a 12.0% chance that this vulnerability will be exploited in the wild within the next 30 days.
Updated: 2025-01-25
Exploit Probability
Percentile: 0.954
Higher than 95.4% of all CVEs
Attack Vector Metrics
Impact Metrics
Description
In Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10, an attacker could perform a path traversal on the /modules/messaging/ endpoint in Splunk Enterprise on Windows. This vulnerability should only affect Splunk Enterprise on Windows.
Available Exploits
Splunk Enterprise - Local File Inclusion
In Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10, an attacker could perform a path traversal on the /modules/messaging/ endpoint in Splunk Enterprise on Windows. This vulnerability should only affect Splunk Enterprise on Windows.
ID: CVE-2024-36991
Author: DhiyaneshDK
High
Related News
No news articles found for this CVE.
Affected Products
References
Published: 2024-07-01T16:31:03.563Z
Last Modified: 2025-02-28T11:03:48.685Z
Copied to clipboard!