Splunk Universal Forwarder vulnerabilities
62 known vulnerabilities affecting splunk/universal_forwarder.
Total CVEs
62
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL6HIGH26MEDIUM24LOW6
Vulnerabilities
Page 3 of 4
CVE-2021-22926HIGHCVSS 7.5≥ 8.2.0, < 8.2.12≥ 9.0.0, < 9.0.6+1 more2021-08-05
CVE-2021-22926 [HIGH] CWE-840 CVE-2021-22926: libcurl-using applications can ask for a specific client certificate to be used in a transfer. This
libcurl-using applications can ask for a specific client certificate to be used in a transfer. This is done with the `CURLOPT_SSLCERT` option (`--cert` with the command line tool).When libcurl is built to use the macOS native TLS library Secure Transport, an application can ask for the client certificate by name or with a file name - using the same opt
nvd
CVE-2021-22925MEDIUMCVSS 5.3≥ 8.2.0, < 8.2.12≥ 9.0.0, < 9.0.6+1 more2021-08-05
CVE-2021-22925 [MEDIUM] CWE-200 CVE-2021-22925: curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS`in libcurl. This rarely
curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS`in libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending `NEW_ENV` variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revea
nvd
CVE-2021-22923MEDIUMCVSS 5.3≥ 8.2.0, < 8.2.12≥ 9.0.0, < 9.0.6+1 more2021-08-05
CVE-2021-22923 [MEDIUM] CWE-319 CVE-2021-22923: When curl is instructed to get content using the metalink feature, and a user name and password are
When curl is instructed to get content using the metalink feature, and a user name and password are used to download the metalink XML file, those same credentials are then subsequently passed on to each of the servers from which curl will download or try to download the contents from. Often contrary to the user's expectations and intentions and witho
nvd
CVE-2021-22922MEDIUMCVSS 6.5≥ 8.2.0, < 8.2.12≥ 9.0.0, < 9.0.6+1 more2021-08-05
CVE-2021-22922 [MEDIUM] CWE-840 CVE-2021-22922: When curl is instructed to download content using the metalink feature, thecontents is verified agai
When curl is instructed to download content using the metalink feature, thecontents is verified against a hash provided in the metalink XML file.The metalink XML file points out to the client how to get the same contentfrom a set of different URLs, potentially hosted by different servers and theclient can then download the file from one or several o
nvd
CVE-2021-22924LOWCVSS 3.7≥ 8.2.0, < 8.2.12≥ 9.0.0, < 9.0.6+1 more2021-08-05
CVE-2021-22924 [LOW] CWE-20 CVE-2021-22924: libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if
libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take 'issuercert' into account and it compared the involved paths *case insensitively*,which could lead to libcurl reusing wrong connections.File paths are, or c
nvd
CVE-2021-30560HIGHCVSS 8.8≥ 8.2.0, < 8.2.12≥ 9.0.0, < 9.0.6+1 more2021-08-03
CVE-2021-30560 [HIGH] CWE-416 CVE-2021-30560: Use after free in Blink XSLT in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to po
Use after free in Blink XSLT in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
nvd
CVE-2021-36976MEDIUMCVSS 6.5≥ 8.2.0, < 8.2.12≥ 9.0.0, < 9.0.6+1 more2021-07-20
CVE-2021-36976 [MEDIUM] CWE-416 CVE-2021-36976: libarchive 3.4.1 through 3.5.1 has a use-after-free in copy_string (called from do_uncompress_block
libarchive 3.4.1 through 3.5.1 has a use-after-free in copy_string (called from do_uncompress_block and process_block).
nvd
CVE-2021-22901HIGHCVSS 8.1≥ 8.2.0, < 8.2.12≥ 9.0.0, < 9.0.6+1 more2021-06-11
CVE-2021-22901 [HIGH] CWE-416 CVE-2021-22901: curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed me
curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious server can use this in rare unfortunate circumstances to potentially reach remote code execution in the client. When libcurl at run-time sets up support for TLS 1.3 ses
nvd
CVE-2021-22897MEDIUMCVSS 5.3≥ 8.2.0, < 8.2.12≥ 9.0.0, < 9.0.6+1 more2021-06-11
CVE-2021-22897 [MEDIUM] CWE-840 CVE-2021-22897: curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake i
curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single "static" variable in the library, which has the surprising side-effect that if an application sets up multiple
nvd
CVE-2021-22898LOWCVSS 3.1≥ 8.2.0, < 8.2.12≥ 9.0.0, < 9.0.6+1 more2021-06-11
CVE-2021-22898 [LOW] CWE-200 CVE-2021-22898: curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, kn
curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the se
nvd
CVE-2021-3520CRITICALCVSS 9.8≥ 8.2.0, < 8.2.12≥ 9.0.0, < 9.0.6+1 more2021-06-02
CVE-2021-3520 [CRITICAL] CWE-190 CVE-2021-3520: There's a flaw in lz4. An attacker who submits a crafted file to an application linked with lz4 may
There's a flaw in lz4. An attacker who submits a crafted file to an application linked with lz4 may be able to trigger an integer overflow, leading to calling of memmove() on a negative size argument, causing an out-of-bounds write and/or a crash. The greatest impact of this flaw is to availability, with some potential impact to confidentiality and i
nvd
CVE-2021-22876MEDIUMCVSS 5.3≥ 8.2.0, < 8.2.12≥ 9.0.0, < 9.0.6+1 more2021-04-01
CVE-2021-22876 [MEDIUM] CWE-359 CVE-2021-22876: curl 7.1.1 to and including 7.75.0 is vulnerable to an "Exposure of Private Personal Information to
curl 7.1.1 to and including 7.75.0 is vulnerable to an "Exposure of Private Personal Information to an Unauthorized Actor" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leak
nvd
CVE-2021-22890LOWCVSS 3.7≥ 8.2.0, < 8.2.12≥ 9.0.0, < 9.0.6+1 more2021-04-01
CVE-2021-22890 [LOW] CWE-300 CVE-2021-22890: curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MI
curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MITM a connection due to bad handling of TLS 1.3 session tickets. When using a HTTPS proxy and TLS 1.3, libcurl can confuse session tickets arriving from the HTTPS proxy but work as if they arrived from the remote server and then wrongly "short-cut" the ho
nvd
CVE-2020-8231HIGHCVSS 7.5≥ 8.2.0, < 8.2.12≥ 9.0.0, < 9.0.6+1 more2020-12-14
CVE-2020-8231 [HIGH] CWE-416 CVE-2020-8231: Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when se
Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data.
nvd
CVE-2020-8177HIGHCVSS 7.8≥ 8.2.0, < 8.2.12≥ 9.0.0, < 9.0.6+1 more2020-12-14
CVE-2020-8177 [HIGH] CWE-99 CVE-2020-8177: curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resour
curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.
nvd
CVE-2020-8286HIGHCVSS 7.5≥ 8.2.0, < 8.2.12≥ 9.0.0, < 9.0.6+1 more2020-12-14
CVE-2020-8286 [HIGH] CWE-295 CVE-2020-8286: curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insu
curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response.
nvd
CVE-2020-8285HIGHCVSS 7.5≥ 8.2.0, < 8.2.12≥ 9.0.0, < 9.0.6+1 more2020-12-14
CVE-2020-8285 [HIGH] CWE-674 CVE-2020-8285: curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow
curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.
nvd
CVE-2020-8169HIGHCVSS 7.5≥ 8.2.0, < 8.2.12≥ 9.0.0, < 9.0.6+1 more2020-12-14
CVE-2020-8169 [HIGH] CWE-200 CVE-2020-8169: curl 7.62.0 through 7.70.0 is vulnerable to an information disclosure vulnerability that can lead to
curl 7.62.0 through 7.70.0 is vulnerable to an information disclosure vulnerability that can lead to a partial password being leaked over the network and to the DNS server(s).
nvd
CVE-2020-8284LOWCVSS 3.7≥ 8.2.0, < 8.2.12≥ 9.0.0, < 9.0.6+1 more2020-12-14
CVE-2020-8284 [LOW] CWE-200 CVE-2020-8284: A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting ba
A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.
nvd
CVE-2019-20838HIGHCVSS 7.5≥ 8.2.0, < 8.2.12≥ 9.0.0, < 9.0.6+1 more2020-06-15
CVE-2019-20838 [HIGH] CVE-2019-20838: libpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is disabled, and \X or
libpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is disabled, and \X or \R has more than one fixed quantifier, a related issue to CVE-2019-20454.
nvd