Vulnerability Database

With exploit

splunk / splunk

Title Severity Exploit Date Affected Version
CVE-2016-4858 Low May 12, 2017 == 5.0.15
== 6.2.9
== 6.1.8
== 5.0.0
== 6.2.6
== 5.0.14
== 6.3.4
== 6.1.2
== 6.1.5
== 6.1.4
== 6.1.10
== 6.1.6
== 6.2.3
== 6.2.1
== 6.3.5
== 6.0.2
== 6.1.7
== 6.0.1
== 6.0.7
== 6.4.1
== 5.0.12
== 5.0.4
== 5.0.1
== 6.4.0
== 6.0.11
== 5.0.6
== 5.0.3
== 6.3.0
== 6.0.4
== 6.0.5
== 6.2.10
== 6.0.3
== 6.2.7
== 5.0.8
== 6.1.1
== 6.3.3
== 6.2.0
== 6.2.4
== 6.0.0
== 5.0.5
== 5.0.11
== 5.0.7
== 5.0.10
== 6.1.0
== 5.0.2
== 6.2.8
== 6.0.8
== 6.2.2
== 6.0.10
== 6.1.9
== 6.2.5
== 5.0.13
<= 6.4.2
== 6.0.9
== 5.0.9
== 6.3.1
== 6.3.2
== 6.1.3
== 6.0.6
CVE-2016-4859 Medium May 12, 2017 == 5.0.15
== 6.2.9
== 6.1.8
== 5.0.0
== 6.2.6
== 5.0.14
== 6.3.4
== 6.1.2
== 6.1.5
== 6.1.4
== 6.1.10
== 6.1.6
== 6.2.3
== 6.2.1
== 6.3.5
== 6.0.2
== 6.1.7
== 6.0.1
== 6.0.7
== 6.4.1
== 5.0.12
== 5.0.4
== 5.0.1
== 6.4.0
== 6.0.11
== 5.0.6
== 5.0.3
== 6.3.0
== 6.0.4
== 6.0.5
== 6.0.3
== 6.2.7
== 5.0.8
== 6.1.1
== 6.3.3
== 6.2.0
== 6.2.4
== 6.0.0
== 5.0.5
== 5.0.11
== 5.0.7
== 5.0.10
== 6.1.0
== 5.0.2
== 6.2.8
== 6.0.8
== 6.2.2
== 6.0.10
== 6.1.9
== 6.2.5
== 5.0.13
<= 6.4.2
== 6.0.9
== 5.0.9
== 6.3.1
== 6.3.2
== 6.1.3
== 6.0.6
CVE-2017-5607 Low Apr 10, 2017 <= 6.5.1
>= 6.5.0 < 6.5.3
>= 6.3.0 < 6.3.10
>= 6.0.0 < 6.0.14
>= 6.1.0 < 6.1.13
>= 6.4.0 < 6.4.6
>= 5.0.0 < 5.0.18
>= 6.2.0 < 6.2.13.1
CVE-2017-5880 Medium Feb 4, 2017 == 5.0.15
== 6.2.9
== 6.1.8
== 5.0.0
== 6.2.6
== 5.0.14
== 6.3.8
== 6.0.12
== 6.3.4
== 6.1.2
== 6.1.5
== 6.1.4
== 6.1.10
== 6.4.4
== 6.1.6
== 6.2.12
== 6.2.3
== 6.2.1
== 5.0.16
== 6.3.5
== 6.0.2
== 6.1.7
== 6.0.1
== 6.0.7
== 6.4.1
== 5.0.12
== 5.0.4
== 5.0.1
== 6.4.0
== 6.0.11
== 5.0.6
== 5.0.3
== 6.3.0
== 6.0.4
== 6.0.5
== 6.2.10
== 6.0.3
== 6.2.7
== 5.0.8
== 6.1.11
== 6.1.1
== 6.3.3
== 6.2.0
== 6.2.4
== 6.0.0
== 6.5.1
== 6.4.3
== 5.0.5
== 6.3.7
== 5.0.11
== 5.0.7
== 5.0.10
== 6.1.0
== 5.0.2
== 6.2.8
== 6.0.8
== 6.4.2
== 6.2.2
== 6.0.10
== 6.1.9
== 6.2.5
== 6.3.6
== 5.0.13
== 6.5.0
== 6.0.9
== 5.0.9
== 6.3.1
== 6.3.2
== 6.1.3
== 6.0.6
== 6.2.11
<= 6.5.1
CVE-2014-3147 Low Oct 10, 2014 == 6.0.2
<= 6.0.3
== 6.0.0
== 6.0.1
CVE-2013-6771 High Aug 7, 2014 == 5.0.1
== 5.0
== 5.0.2
<= 5.0.4
== 5.0.3
CVE-2013-7394 High Aug 7, 2014 == 5.0.1
== 5.0
== 5.0.2
<= 5.0.4
== 5.0.3
CVE-2014-2578 Low Apr 2, 2014 == 5.0.4
== 5.0.1
== 5.0
== 5.0.5
== 5.0.2
== 5.0.3
<= 5.0.7
== 5.0.6
CVE-2013-6870 Low Nov 25, 2013 == 3.3.1
== 4.0.4
== 2.1
== 3.3.4
== 3.0
== 4.0.6
== 4.1.2
== 3.2
== 5.0.4
== 4.1.1
== 4.2.3
== 4.0
== 3.4.13
== 3.0.1
== 3.3.2
== 4.2.2
== 4.3.1
== 3.4.9
== 4.0.3
== 4.1.8
== 5.0.1
== 3.4.10
== 4.1.3
== 5.0
== 3.4.8
== 3.2.3
== 4.2.
== 5.0.2
== 4.2
== 2.2.3
== 3.1.1
== 3.2.2
== 3.4.3
== 3.2.1
== 2.2.1
== 4.0.8
== 4.0.5
== 4.3.6
== 4.1.5
== 3.4.11
== 4.0.9
== 4.3.7
== 3.1.2
== 3.4.6
== 3.1
== 3.2.5
== 4.3
== 4.3.4
== 4.0.11
== 3.4.5
== 4.2.4
== 3.4.14
== 4.3.3
== 3.4
== 4.2.5
== 3.2.6
== 4.0.10
== 3.3
== 5.0.3
<= 5.0.5
== 4.1.7
== 3.0.2
== 4.3.2
== 3.4.2
== 4.1.4
== 4.1
== 4.0.1
== 4.1.6
== 3.4.12
== 4.0.7
== 4.0.2
== 3.2.4
== 3.1.3
== 3.1.4
== 3.3.3
== 4.3.5
== 2.2
== 3.4.1
== 4.2.1
== 2.2.6
CVE-2011-4644 High Jan 3, 2012 == 3.3.1
== 4.0.4
== 2.1
== 3.3.4
== 3.0
== 4.0.6
== 4.1.2
== 3.2
== 4.1.1
== 4.2.3
== 4.0
== 3.4.13
== 3.0.1
== 3.3.2
== 4.2.2
== 3.4.9
== 4.0.3
== 4.1.8
== 3.4.10
== 4.1.3
== 3.4.8
== 3.2.3
<= 4.2.5
== 4.2
== 2.2.3
== 3.1.1
== 3.2.2
== 3.4.3
== 3.2.1
== 2.2.1
== 4.0.8
== 4.0.5
== 4.1.5
== 3.4.11
== 4.0.9
== 3.1.2
== 3.4.6
== 3.1
== 3.2.5
== 4.0.11
== 3.4.5
== 4.2.4
== 3.4.14
== 3.4
== 3.2.6
== 4.0.10
== 3.3
== 4.1.7
== 3.0.2
== 3.4.2
== 4.1.4
== 4.1
== 4.0.1
== 4.1.6
== 3.4.12
== 4.0.7
== 4.0.2
== 3.2.4
== 3.1.3
== 3.1.4
== 3.3.3
== 2.2
== 3.4.1
== 4.2.1
== 2.2.6