Vulnerability Database

With exploit

splunk / splunk

Title Severity Exploit Date Affected Version
CVE-2016-10126 Critical Jan 10, 2017 == 5.0.15
== 5.0.0
== 5.0.14
== 5.0.16
== 5.0.12
== 5.0.4
== 5.0.1
== 5.0.6
== 5.0.3
== 5.0.8
== 5.0.5
== 5.0.11
== 5.0.7
== 5.0.10
== 5.0.2
== 5.0.13
== 5.0.9
== 6.0.12
== 6.0.2
== 6.0.1
== 6.0.7
== 6.0.11
== 6.0.4
== 6.0.5
== 6.0.3
== 6.0.0
== 6.0.8
== 6.0.10
== 6.0.9
== 6.0.6
== 6.1.8
== 6.1.2
== 6.1.5
== 6.1.4
== 6.1.10
== 6.1.6
== 6.1.7
== 6.1.11
== 6.1.1
== 6.1.0
== 6.1.9
== 6.1.3
== 6.2.9
== 6.2.6
== 6.2.3
== 6.2.1
== 6.2.10
== 6.2.7
== 6.2.0
== 6.2.4
== 6.2.8
== 6.2.2
== 6.2.5
== 6.2.11
== 6.3.4
== 6.3.5
== 6.3.0
== 6.3.3
== 6.3.7
== 6.3.6
== 6.3.1
== 6.3.2
== 6.4.1
== 6.4.0
== 6.4.3
== 6.4.2
CVE-2015-7604 Low Sep 29, 2015 == 6.2.3
== 6.2.1
== 6.2.0
== 6.2.2
== 6.2.4
== 6.2.5
CVE-2015-6514 Low Aug 18, 2015 == 6.2.3
== 6.2.1
== 6.2.0
== 6.2.2
CVE-2015-6515 Low Aug 18, 2015 == 5.0.0
== 6.1.2
== 6.1.5
== 6.1.4
== 6.1.6
== 6.2.3
== 6.2.1
== 6.0.2
== 6.1.7
== 6.0.1
== 6.2.0
== 6.0.7
== 5.0.12
== 6.2.2
== 5.0.4
== 5.0.1
== 5.0.6
== 5.0.3
== 6.0.4
== 6.0.5
== 6.0.3
== 5.0.8
== 6.1.1
== 6.0.0
== 5.0.5
== 5.0.11
== 5.0.7
== 5.0.10
== 6.1.0
== 5.0.2
== 6.0.8
== 5.0.9
== 6.1.3
== 6.0.6
CVE-2014-5466 Low Dec 16, 2014 == 5.0.4
== 6.0.2
== 5.0.8
== 6.0.3
== 5.0.1
== 5.0
== 6.1.1
== 6.1.2
== 5.0.5
== 5.0.7
== 6.0.4
== 5.0.2
== 5.0.9
== 6.0.5
== 6.0.1
== 6.1
== 6.0
== 5.0.3
== 6.1.3
== 6.1.4
== 5.0.6
== 6.0.6
CVE-2014-8380 Low Oct 21, 2014 == 6.1.1
CVE-2014-8301 Low Oct 16, 2014 == 5.0.4
== 5.0.8
== 5.0.1
== 5.0
== 5.0.5
== 5.0.7
== 5.0.2
== 5.0.9
== 5.0.3
== 5.0.6
CVE-2014-8302 Low Oct 16, 2014 == 5.0.4
== 6.0.2
== 6.1.2
== 5.0.8
== 6.0.3
== 5.0.1
== 5.0
== 5.0.5
== 5.0.7
== 6.0.4
== 5.0.2
== 6.0.0
== 5.0.9
== 6.1.1
== 6.0.5
== 6.0.1
== 6.1
== 6.0
== 5.0.3
== 5.0.6
== 6.1.3
CVE-2014-8303 Low Oct 16, 2014 == 6.0.2
== 6.1.2
== 6.0.3
== 6.0.4
== 6.1.1
== 6.0.5
== 6.0.1
== 6.1
== 6.0
== 6.1.3
CVE-2014-3147 Low Oct 10, 2014 == 6.0.2
<= 6.0.3
== 6.0.0
== 6.0.1