Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-46561 | In Splunk Enterprise versions below 8.2.9 and 8.1.12, the way that the ‘tstats command handles Javascript Object Notation (JSON) lets an attacker bypass SPL safeguards for risky commands https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards . The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. |
Mon, 05 May 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Splunk
Published:
Updated: 2025-05-05T20:35:48.097Z
Reserved: 2022-10-20T18:37:09.181Z
Link: CVE-2022-43565
Updated: 2024-08-03T13:32:59.756Z
Status : Modified
Published: 2022-11-04T23:15:10.023
Modified: 2024-11-21T07:26:47.777
Link: CVE-2022-43565
No data.
OpenCVE Enrichment
No data.
EUVD