Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

splunk

About This Vendor

splunk is a technology vendor producing software and infrastructure products. As a software provider, splunk's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of splunk's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 254 known vulnerabilities from splunk. This includes 9 critical-severity issues and 97 high-severity issues that represent significant risk. These vulnerabilities affect 246 distinct products across splunk's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2010 through 2026, indicating decades of continuous security attention and research. Organizations deploying splunk products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2010-2429 2010-06-24 2025-04-11 - 4.3 Likely
CVE-2010-2502 2010-06-28 2025-04-11 - 7.5 Unknown
CVE-2010-2503 2010-06-28 2025-04-11 - 4.3 Likely
CVE-2010-2504 2010-06-28 2025-04-11 - 6.0 Unknown
CVE-2010-3322 2010-09-14 2025-04-11 8.8 6.0 Unknown
CVE-2010-3323 2010-09-14 2025-04-11 - 4.6 Unknown
CVE-2011-4642 2012-01-03 2025-04-11 - 4.6 Unknown
CVE-2011-4643 2012-01-03 2025-04-11 - 4.0 Likely
CVE-2011-4644 2012-01-03 2025-04-11 - 9.3 Likely
CVE-2011-4778 2012-01-03 2025-04-11 - 4.3 Likely
CVE-2012-1908 2012-08-17 2025-04-11 - 4.3 Likely
CVE-2013-2766 2013-04-10 2025-04-11 - 4.3 Likely
CVE-2013-6870 2013-11-25 2025-04-11 - 4.3 Likely
CVE-2012-6447 2014-01-23 2025-04-11 - 4.3 Likely
CVE-2014-2578 2014-04-02 2025-04-12 - 4.3 Likely
CVE-2014-0160 2014-04-07 2025-10-22 7.5 5.0 Likely
CVE-2013-6771 2014-08-07 2025-04-12 - 9.3 Likely
CVE-2013-7394 2014-08-07 2025-04-12 - 9.0 Likely
CVE-2014-5197 2014-08-12 2025-04-12 - 4.0 Likely
CVE-2014-5198 2014-08-12 2025-04-12 - 4.3 Likely
CVE-2014-3147 2014-10-10 2025-04-12 - 3.5 Unknown
CVE-2014-8301 2014-10-16 2025-04-12 - 4.3 Likely
CVE-2014-8302 2014-10-16 2025-04-12 - 3.5 Unknown
CVE-2014-8303 2014-10-16 2025-04-12 - 4.3 Likely
CVE-2014-8380 2014-10-21 2025-04-12 - 4.3 Likely
CVE-2014-5466 2014-12-16 2025-04-12 - 4.3 Likely
CVE-2015-6514 2015-08-18 2025-04-12 - 4.3 Likely
CVE-2015-6515 2015-08-18 2025-04-12 - 4.3 Likely
CVE-2015-7604 2015-09-29 2025-04-12 - 4.3 Likely
CVE-2016-10126 2017-01-10 2025-04-20 9.8 10.0 Likely
CVE-2017-5880 2017-02-04 2025-04-20 6.5 4.0 Likely
CVE-2017-7565 2017-04-06 2025-04-20 8.8 6.5 Likely
CVE-2017-5607 2017-04-10 2025-04-20 3.5 3.5 Unknown
CVE-2016-4856 2017-05-12 2025-04-20 4.8 3.5 Unknown
CVE-2016-4857 2017-05-12 2025-04-20 6.1 5.8 Likely
CVE-2016-4858 2017-05-12 2025-04-20 4.8 3.5 Unknown
CVE-2016-4859 2017-05-12 2025-04-20 6.1 5.8 Likely
CVE-2017-12572 2017-08-05 2025-04-20 4.8 3.5 Unknown
CVE-2017-17067 2017-11-30 2025-04-20 9.8 10.0 Likely
CVE-2018-11409 2018-06-08 2024-11-21 5.3 5.0 Likely
CVE-2017-18348 2018-10-19 2024-11-21 7.0 6.9 Unknown
CVE-2018-7427 2018-10-23 2024-11-21 6.1 4.3 Likely
CVE-2018-7429 2018-10-23 2024-11-21 7.5 5.0 Likely
CVE-2018-7431 2018-10-23 2024-11-21 6.5 4.0 Likely
CVE-2018-7432 2018-10-23 2024-11-21 7.5 5.0 Likely
CVE-2019-5727 2019-02-21 2024-11-21 5.4 3.5 Unknown
CVE-2019-5729 2019-03-21 2024-11-21 8.1 6.8 Likely
CVE-2019-3800 2019-08-05 2024-11-21 6.3 2.1 Unknown
CVE-2013-6772 2020-01-23 2024-11-21 4.3 4.3 Likely
CVE-2013-6773 2020-01-23 2024-11-21 7.8 4.6 Unknown
CVE-2019-20454 2020-02-14 2024-11-21 7.5 5.0 Likely
CVE-2019-20838 2020-06-15 2024-11-21 7.5 4.3 Likely
CVE-2020-14155 2020-06-15 2024-11-21 5.3 5.0 Likely
CVE-2020-8169 2020-12-14 2024-11-21 7.5 5.0 Likely
CVE-2020-8177 2020-12-14 2024-11-21 7.8 4.6 Unknown
CVE-2020-8231 2020-12-14 2024-11-21 7.5 5.0 Likely
CVE-2020-8284 2020-12-14 2024-11-21 3.7 4.3 Likely
CVE-2020-8285 2020-12-14 2024-11-21 7.5 5.0 Likely
CVE-2020-8286 2020-12-14 2024-11-21 7.5 5.0 Likely
CVE-2021-22876 2021-04-01 2025-06-09 5.3 5.0 Likely
CVE-2021-22890 2021-04-01 2025-06-09 3.7 4.3 Likely
CVE-2021-3520 2021-06-02 2024-11-21 9.8 7.5 Likely
CVE-2021-22897 2021-06-11 2024-11-21 5.3 4.3 Likely
CVE-2021-22898 2021-06-11 2024-11-21 3.1 2.6 Unknown
CVE-2021-22901 2021-06-11 2024-11-21 8.1 6.8 Likely
CVE-2021-36976 2021-07-20 2025-11-03 6.5 4.3 Likely
CVE-2021-30560 2021-08-03 2025-05-05 8.8 6.8 Likely
CVE-2021-22922 2021-08-05 2024-11-21 6.5 4.3 Likely
CVE-2021-22923 2021-08-05 2024-11-21 5.3 2.6 Unknown
CVE-2021-22924 2021-08-05 2025-06-09 3.7 4.3 Likely
CVE-2021-22925 2021-08-05 2024-11-21 5.3 5.0 Likely
CVE-2021-22926 2021-08-05 2024-11-21 7.5 5.0 Likely
CVE-2021-22945 2021-09-23 2025-06-09 9.1 5.8 Likely
CVE-2021-22946 2021-09-29 2024-11-21 7.5 5.0 Likely
CVE-2021-22947 2021-09-29 2024-11-21 5.9 4.3 Likely
CVE-2021-3422 2022-03-25 2024-11-21 7.5 4.3 Likely
CVE-2021-26253 2022-05-06 2024-11-21 8.1 6.8 Likely
CVE-2021-31559 2022-05-06 2024-11-21 7.5 5.0 Likely
CVE-2021-33845 2022-05-06 2024-11-21 5.3 5.0 Likely
CVE-2021-42743 2022-05-06 2024-11-21 8.8 4.6 Unknown
CVE-2022-26070 2022-05-06 2024-11-21 4.3 4.0 Likely
CVE-2022-26889 2022-05-06 2024-11-21 8.8 5.1 Unknown
CVE-2022-27183 2022-05-06 2024-11-21 8.8 4.3 Likely
CVE-2022-22576 2022-05-26 2024-11-21 8.1 5.5 Likely
CVE-2022-27774 2022-06-02 2024-11-21 5.7 3.5 Unknown
CVE-2022-27775 2022-06-02 2024-11-21 7.5 5.0 Likely
CVE-2022-27776 2022-06-02 2024-11-21 6.5 4.3 Likely
CVE-2022-27778 2022-06-02 2024-11-21 8.1 5.8 Likely
CVE-2022-27779 2022-06-02 2024-11-21 5.3 5.0 Likely
CVE-2022-27780 2022-06-02 2024-11-21 7.5 5.0 Likely
CVE-2022-27781 2022-06-02 2024-11-21 7.5 5.0 Likely
CVE-2022-27782 2022-06-02 2024-11-21 7.5 5.0 Likely
CVE-2022-30115 2022-06-02 2024-11-21 4.3 4.0 Likely
CVE-2022-32151 2022-06-15 2024-11-21 7.4 6.4 Likely
CVE-2022-32152 2022-06-15 2024-11-21 8.1 6.5 Likely
CVE-2022-32153 2022-06-15 2024-11-21 8.1 6.8 Likely
CVE-2022-32154 2022-06-15 2024-11-21 6.8 4.0 Unknown
CVE-2022-32155 2022-06-15 2024-11-21 7.5 5.0 Likely
CVE-2022-32156 2022-06-15 2026-02-25 8.1 6.8 Likely
CVE-2022-32157 2022-06-15 2024-11-21 7.5 5.0 Likely
CVE-2022-32158 2022-06-15 2024-11-21 9.0 7.5 Likely
CVE-2022-32205 2022-07-07 2025-05-05 4.3 4.3 Likely
CVE-2022-32206 2022-07-07 2025-05-05 6.5 4.3 Likely
CVE-2022-32207 2022-07-07 2025-04-23 9.8 7.5 Likely
CVE-2022-32208 2022-07-07 2025-05-05 5.9 4.3 Likely
CVE-2022-35737 2022-08-03 2026-02-13 7.5 - -
CVE-2022-37437 2022-08-16 2024-11-21 7.4 - -
CVE-2022-37438 2022-08-16 2024-11-21 2.6 - -
CVE-2022-37439 2022-08-16 2024-11-21 5.5 - -
CVE-2021-31566 2022-08-23 2024-11-21 7.8 - -
CVE-2022-35252 2022-09-23 2025-05-05 3.7 - -
CVE-2022-42916 2022-10-29 2026-02-13 7.5 - -
CVE-2022-42915 2022-10-29 2025-05-07 8.1 - -
CVE-2022-43561 2022-11-03 2024-11-21 6.4 - -
CVE-2022-43571 2022-11-03 2024-11-21 8.8 - -
CVE-2022-43562 2022-11-04 2024-11-21 3.0 - -
CVE-2022-43563 2022-11-04 2024-11-21 8.1 - -
CVE-2022-43564 2022-11-04 2024-11-21 4.9 - -
CVE-2022-43565 2022-11-04 2024-11-21 8.1 - -
CVE-2022-43566 2022-11-04 2024-11-21 7.3 - -
CVE-2022-43567 2022-11-04 2024-11-21 8.8 - -
CVE-2022-43568 2022-11-04 2024-11-21 8.8 - -
CVE-2022-43569 2022-11-04 2024-11-21 8.0 - -
CVE-2022-43570 2022-11-04 2024-11-21 8.8 - -
CVE-2022-43572 2022-11-04 2024-11-21 7.5 - -
CVE-2022-36227 2022-11-22 2025-11-03 9.8 - -
CVE-2022-32221 2022-12-05 2026-02-13 9.8 - -
CVE-2022-35260 2022-12-05 2024-11-21 6.5 - -
CVE-2022-43551 2022-12-23 2026-02-13 7.5 - -
CVE-2022-43552 2023-02-09 2024-11-21 5.9 - -
CVE-2023-22931 2023-02-14 2024-11-21 4.3 - -
CVE-2023-22932 2023-02-14 2024-11-21 8.7 - -
CVE-2023-22933 2023-02-14 2024-11-21 8.0 - -
CVE-2023-22934 2023-02-14 2024-11-21 7.3 - -
CVE-2023-22935 2023-02-14 2024-11-21 8.1 - -
CVE-2023-22936 2023-02-14 2024-11-21 6.3 - -
CVE-2023-22937 2023-02-14 2024-11-21 4.3 - -
CVE-2023-22938 2023-02-14 2024-11-21 4.3 - -
CVE-2023-22939 2023-02-14 2024-11-21 8.1 - -
CVE-2023-22940 2023-02-14 2024-11-21 6.3 - -
CVE-2023-22941 2023-02-14 2024-11-21 6.5 - -
CVE-2023-22942 2023-02-14 2024-11-21 5.4 - -
CVE-2023-22943 2023-02-14 2024-11-21 4.8 - -
CVE-2023-23914 2023-02-23 2025-03-12 9.1 - -
CVE-2023-23915 2023-02-23 2026-02-13 6.5 - -
CVE-2023-23916 2023-02-23 2025-03-12 6.5 - -
CVE-2023-27533 2023-03-30 2026-02-13 8.8 - -
CVE-2023-27534 2023-03-30 2025-04-23 8.8 - -
CVE-2023-27535 2023-03-30 2025-06-09 5.9 - -
CVE-2023-27536 2023-03-30 2025-02-14 5.9 - -
CVE-2023-27537 2023-03-30 2024-11-21 5.9 - -
CVE-2023-27538 2023-03-30 2025-06-09 5.5 - -
CVE-2023-32706 2023-06-01 2024-11-21 7.7 - -
CVE-2023-32707 2023-06-01 2024-11-21 8.8 - -
CVE-2023-32708 2023-06-01 2024-11-21 7.2 - -
CVE-2023-32709 2023-06-01 2024-11-21 4.3 - -
CVE-2023-32710 2023-06-01 2024-11-21 4.8 - -
CVE-2023-32711 2023-06-01 2024-11-21 5.4 - -
CVE-2023-32712 2023-06-01 2024-11-21 8.6 - -
CVE-2023-32713 2023-06-01 2024-11-21 7.8 - -
CVE-2023-32714 2023-06-01 2024-11-21 8.1 - -
CVE-2023-32715 2023-06-01 2024-11-21 4.7 - -
CVE-2023-32716 2023-06-01 2024-11-21 6.5 - -
CVE-2023-32717 2023-06-01 2024-11-21 4.3 - -
CVE-2023-3997 2023-07-31 2024-12-10 8.6 - -
CVE-2023-40592 2023-08-30 2024-11-21 8.4 - -
CVE-2023-40593 2023-08-30 2024-11-21 6.3 - -
CVE-2023-40594 2023-08-30 2024-11-21 6.5 - -
CVE-2023-40595 2023-08-30 2024-11-21 8.8 - -
CVE-2023-40596 2023-08-30 2024-11-21 7.0 - -
CVE-2023-40597 2023-08-30 2024-11-21 7.8 - -
CVE-2023-40598 2023-08-30 2024-11-21 8.5 - -
CVE-2023-4571 2023-08-30 2024-12-10 8.6 - -
CVE-2023-46213 2023-11-16 2024-11-21 4.8 - -
CVE-2023-46214 2023-11-16 2024-11-21 8.0 - -
CVE-2024-22164 2024-01-09 2025-06-03 4.3 - -
CVE-2024-22165 2024-01-09 2024-11-21 6.5 - -
CVE-2024-23675 2024-01-22 2024-11-21 6.5 - -
CVE-2024-23676 2024-01-22 2024-11-21 4.6 - -
CVE-2024-23677 2024-01-22 2024-11-21 4.3 - -
CVE-2024-23678 2024-01-22 2024-11-21 7.5 - -
CVE-2023-46230 2024-01-30 2024-11-21 8.2 - -
CVE-2023-46231 2024-01-30 2024-11-21 6.8 - -
CVE-2024-29945 2024-03-27 2024-11-21 7.2 - -
CVE-2024-29946 2024-03-27 2024-11-21 8.1 - -
CVE-2024-36982 2024-07-01 2024-11-21 7.5 - -
CVE-2024-36983 2024-07-01 2025-03-07 8.0 - -
CVE-2024-36984 2024-07-01 2025-03-07 8.8 - -
CVE-2024-36985 2024-07-01 2025-03-07 8.8 - -
CVE-2024-36986 2024-07-01 2024-11-21 6.3 - -
CVE-2024-36987 2024-07-01 2024-11-21 4.3 - -
CVE-2024-36989 2024-07-01 2024-11-21 7.1 - -
CVE-2024-36990 2024-07-01 2024-11-21 6.5 - -
CVE-2024-36991 2024-07-01 2024-11-21 7.5 - -
CVE-2024-36992 2024-07-01 2024-11-21 5.4 - -
CVE-2024-36993 2024-07-01 2024-11-21 5.4 - -
CVE-2024-36994 2024-07-01 2024-11-21 5.4 - -
CVE-2024-36995 2024-07-01 2024-11-21 5.4 - -
CVE-2024-36996 2024-07-01 2024-11-21 5.3 - -
CVE-2024-36997 2024-07-01 2025-03-07 8.1 - -
CVE-2024-45731 2024-10-14 2024-10-17 8.0 - -
CVE-2024-45732 2024-10-14 2024-10-17 7.1 - -
CVE-2024-45733 2024-10-14 2024-10-16 8.8 - -
CVE-2024-45734 2024-10-14 2024-10-16 4.3 - -
CVE-2024-45735 2024-10-14 2024-10-16 4.3 - -
CVE-2024-45736 2024-10-14 2024-10-16 6.5 - -
CVE-2024-45737 2024-10-14 2024-10-16 4.3 - -
CVE-2024-45738 2024-10-14 2024-10-17 4.9 - -
CVE-2024-45739 2024-10-14 2024-10-17 4.9 - -
CVE-2024-45740 2024-10-14 2024-10-17 5.4 - -
CVE-2024-45741 2024-10-14 2024-10-17 5.4 - -
CVE-2024-53244 2024-12-10 2025-03-06 5.7 - -
CVE-2024-53245 2024-12-10 2025-03-06 3.1 - -
CVE-2024-53246 2024-12-10 2025-03-10 5.3 - -
CVE-2025-20226 2025-03-26 2025-07-21 5.7 - -
CVE-2025-20227 2025-03-26 2025-07-21 4.3 - -
CVE-2025-20228 2025-03-26 2025-07-21 6.5 - -
CVE-2025-20229 2025-03-26 2025-07-21 8.0 - -
CVE-2025-20231 2025-03-26 2025-07-21 7.1 - -
CVE-2025-20232 2025-03-26 2025-07-21 5.7 - -
CVE-2025-20233 2025-03-26 2025-08-01 2.5 - -
CVE-2025-20230 2025-03-26 2025-08-01 4.3 - -
CVE-2025-20297 2025-06-02 2025-08-01 4.3 - -
CVE-2025-20298 2025-06-02 2025-08-04 8.0 - -
CVE-2025-20300 2025-07-07 2025-07-21 4.3 - -
CVE-2025-20319 2025-07-07 2025-07-21 6.8 - -
CVE-2025-20320 2025-07-07 2025-07-21 6.3 - -
CVE-2025-20321 2025-07-07 2025-07-21 6.5 - -
CVE-2025-20322 2025-07-07 2025-07-21 4.3 - -
CVE-2025-20323 2025-07-07 2025-07-21 4.3 - -
CVE-2025-20324 2025-07-07 2025-07-21 5.4 - -
CVE-2025-20325 2025-07-07 2025-08-01 3.1 - -
CVE-2025-20366 2025-10-01 2025-10-08 6.5 - -
CVE-2025-20367 2025-10-01 2025-10-08 5.7 - -
CVE-2025-20368 2025-10-01 2025-10-08 5.7 - -
CVE-2025-20369 2025-10-01 2025-10-08 4.6 - -
CVE-2025-20370 2025-10-01 2025-10-08 4.9 - -
CVE-2025-20371 2025-10-01 2025-10-08 7.5 - -
CVE-2025-20378 2025-11-12 2025-12-03 3.1 - -
CVE-2025-20379 2025-11-12 2025-12-03 3.5 - -
CVE-2025-20382 2025-12-03 2025-12-05 3.5 - -
CVE-2025-20383 2025-12-03 2025-12-05 4.3 - -
CVE-2025-20384 2025-12-03 2025-12-05 5.3 - -
CVE-2025-20385 2025-12-03 2025-12-05 2.4 - -
CVE-2025-20386 2025-12-03 2025-12-05 8.0 - -
CVE-2025-20387 2025-12-03 2025-12-05 8.0 - -
CVE-2025-20388 2025-12-03 2025-12-05 2.7 - -
CVE-2025-20389 2025-12-03 2025-12-05 4.3 - -
CVE-2026-20137 2026-02-18 2026-02-20 3.5 - -
CVE-2026-20138 2026-02-18 2026-02-20 6.8 - -
CVE-2026-20139 2026-02-18 2026-02-20 4.3 - -
CVE-2026-20141 2026-02-18 2026-02-23 4.3 - -
CVE-2026-20142 2026-02-18 2026-02-23 6.8 - -
CVE-2026-20144 2026-02-18 2026-02-23 6.8 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for splunk by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with splunk's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.