cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-32714,https://securityvulnerability.io/vulnerability/CVE-2023-32714,Path Traversal in Splunk App for Lookup File Editing,"In the Splunk App for Lookup File Editing, versions prior to 4.0.1, a low-privileged user has the capability to exploit a path traversal vulnerability. This vulnerability is triggered through a specially crafted web request, allowing an unauthorized user to read and write data in restricted areas of the Splunk installation directory. This can lead to potential exposure of sensitive information and compromise the integrity of the application.",Splunk,Splunk App For Lookup File Editing,8.1,HIGH,0.0010300000431016088,false,,false,false,false,,,false,false,,2023-06-01T17:15:00.000Z,0 CVE-2023-32715,https://securityvulnerability.io/vulnerability/CVE-2023-32715,Self Cross-Site Scripting (XSS) on Splunk App for Lookup File Editing,"In the Splunk App for Lookup File Editing versions below 4.0.1, a user can insert potentially malicious JavaScript code into the app, which causes that code to run on the user’s machine. The app itself does not contain the potentially malicious JavaScript code. The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser, and requires additional user interaction to trigger. The attacker cannot exploit the vulnerability at will.",Splunk,Splunk App For Lookup File Editing,4.7,MEDIUM,0.0005600000149570405,false,,false,false,false,,,false,false,,2023-06-01T17:15:00.000Z,0