Vulnerability Details CVE-2017-5880
Splunk Web in Splunk Enterprise versions 6.5.x before 6.5.2, 6.4.x before 6.4.5, 6.3.x before 6.3.9, 6.2.x before 6.2.13, 6.1.x before 6.1.12, 6.0.x before 6.0.13, 5.0.x before 5.0.17 and Splunk Light versions before 6.5.2 allows remote authenticated users to cause a denial of service (daemon crash) via a crafted GET request, aka SPL-130279.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.006
EPSS Ranking 67.2%
CVSS Severity
CVSS v3 Score 6.5
CVSS v2 Score 4.0
Products affected by CVE-2017-5880
-
cpe:2.3:a:splunk:splunk:5.0.0
-
cpe:2.3:a:splunk:splunk:5.0.1
-
cpe:2.3:a:splunk:splunk:5.0.10
-
cpe:2.3:a:splunk:splunk:5.0.11
-
cpe:2.3:a:splunk:splunk:5.0.12
-
cpe:2.3:a:splunk:splunk:5.0.13
-
cpe:2.3:a:splunk:splunk:5.0.14
-
cpe:2.3:a:splunk:splunk:5.0.15
-
cpe:2.3:a:splunk:splunk:5.0.16
-
cpe:2.3:a:splunk:splunk:5.0.2
-
cpe:2.3:a:splunk:splunk:5.0.3
-
cpe:2.3:a:splunk:splunk:5.0.4
-
cpe:2.3:a:splunk:splunk:5.0.5
-
cpe:2.3:a:splunk:splunk:5.0.6
-
cpe:2.3:a:splunk:splunk:5.0.7
-
cpe:2.3:a:splunk:splunk:5.0.8
-
cpe:2.3:a:splunk:splunk:5.0.9
-
cpe:2.3:a:splunk:splunk:6.0.0
-
cpe:2.3:a:splunk:splunk:6.0.1
-
cpe:2.3:a:splunk:splunk:6.0.10
-
cpe:2.3:a:splunk:splunk:6.0.11
-
cpe:2.3:a:splunk:splunk:6.0.12
-
cpe:2.3:a:splunk:splunk:6.0.2
-
cpe:2.3:a:splunk:splunk:6.0.3
-
cpe:2.3:a:splunk:splunk:6.0.4
-
cpe:2.3:a:splunk:splunk:6.0.5
-
cpe:2.3:a:splunk:splunk:6.0.6
-
cpe:2.3:a:splunk:splunk:6.0.7
-
cpe:2.3:a:splunk:splunk:6.0.8
-
cpe:2.3:a:splunk:splunk:6.0.9
-
cpe:2.3:a:splunk:splunk:6.1.0
-
cpe:2.3:a:splunk:splunk:6.1.1
-
cpe:2.3:a:splunk:splunk:6.1.10
-
cpe:2.3:a:splunk:splunk:6.1.11
-
cpe:2.3:a:splunk:splunk:6.1.2
-
cpe:2.3:a:splunk:splunk:6.1.3
-
cpe:2.3:a:splunk:splunk:6.1.4
-
cpe:2.3:a:splunk:splunk:6.1.5
-
cpe:2.3:a:splunk:splunk:6.1.6
-
cpe:2.3:a:splunk:splunk:6.1.7
-
cpe:2.3:a:splunk:splunk:6.1.8
-
cpe:2.3:a:splunk:splunk:6.1.9
-
cpe:2.3:a:splunk:splunk:6.2.0
-
cpe:2.3:a:splunk:splunk:6.2.1
-
cpe:2.3:a:splunk:splunk:6.2.10
-
cpe:2.3:a:splunk:splunk:6.2.11
-
cpe:2.3:a:splunk:splunk:6.2.12
-
cpe:2.3:a:splunk:splunk:6.2.2
-
cpe:2.3:a:splunk:splunk:6.2.3
-
cpe:2.3:a:splunk:splunk:6.2.4
-
cpe:2.3:a:splunk:splunk:6.2.5
-
cpe:2.3:a:splunk:splunk:6.2.6
-
cpe:2.3:a:splunk:splunk:6.2.7
-
cpe:2.3:a:splunk:splunk:6.2.8
-
cpe:2.3:a:splunk:splunk:6.2.9
-
cpe:2.3:a:splunk:splunk:6.3.0
-
cpe:2.3:a:splunk:splunk:6.3.1
-
cpe:2.3:a:splunk:splunk:6.3.2
-
cpe:2.3:a:splunk:splunk:6.3.3
-
cpe:2.3:a:splunk:splunk:6.3.4
-
cpe:2.3:a:splunk:splunk:6.3.5
-
cpe:2.3:a:splunk:splunk:6.3.6
-
cpe:2.3:a:splunk:splunk:6.3.7
-
cpe:2.3:a:splunk:splunk:6.3.8
-
cpe:2.3:a:splunk:splunk:6.4.0
-
cpe:2.3:a:splunk:splunk:6.4.1
-
cpe:2.3:a:splunk:splunk:6.4.2
-
cpe:2.3:a:splunk:splunk:6.4.3
-
cpe:2.3:a:splunk:splunk:6.4.4
-
cpe:2.3:a:splunk:splunk:6.5.0
-
cpe:2.3:a:splunk:splunk:6.5.1