Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:splunk:splunk:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "08C26981-B12C-4C2B-A5CA-41DE1BD4B124", "vulnerable": true}, {"criteria": "cpe:2.3:a:splunk:splunk:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "107859A5-076A-47BD-83A9-7249A0852823", "vulnerable": true}, {"criteria": "cpe:2.3:a:splunk:splunk:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D9F9FBC9-A0A4-463B-9632-87E66703D807", "vulnerable": true}, {"criteria": "cpe:2.3:a:splunk:splunk:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24373712-F6B5-4428-9D4B-C15CEE4B51C3", "vulnerable": true}, {"criteria": "cpe:2.3:a:splunk:splunk:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "A26FA5CD-7C9E-41ED-AAF2-D18AC89E4CBC", "vulnerable": true}, {"criteria": "cpe:2.3:a:splunk:splunk:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "8D3A40B9-4557-46E2-803C-7B71C6906342", "vulnerable": true}, {"criteria": "cpe:2.3:a:splunk:splunk:6.1:*:*:*:enterprise:*:*:*", "matchCriteriaId": "2620A075-A13C-42EE-B320-A9356FAD98DD", "vulnerable": true}, {"criteria": "cpe:2.3:a:splunk:splunk:6.1.1:*:*:*:enterprise:*:*:*", "matchCriteriaId": "BE618334-8239-42DB-9F79-DE9241AEBF5C", "vulnerable": true}, {"criteria": "cpe:2.3:a:splunk:splunk:6.1.2:*:*:*:enterprise:*:*:*", "matchCriteriaId": "D3764A91-2A1C-4076-8F2C-ECED2FFD15DB", "vulnerable": true}, {"criteria": "cpe:2.3:a:splunk:splunk:6.1.3:*:*:*:enterprise:*:*:*", "matchCriteriaId": "C9BF3278-84C0-46CE-9CB4-952D0361A117", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Splunk Web in Splunk Enterprise 6.1.x before 6.1.4 and 6.0.x before 6.0.6 allows remote attackers to inject arbitrary web script or HTML via vectors related to event parsing."}, {"lang": "es", "value": "Vulnerabilida de XSS en Splunk Web en Splunk Enterprise 6.1.x anterior a 6.1.4 anterior a 6.0.x anterior a 6.0.6 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de vectores relacionados con el an\u00e1lisis del evento."}], "id": "CVE-2014-8303", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}]}, "published": "2014-10-16T19:55:17.037", "references": [{"source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1030994"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://www.splunk.com/view/SP-CAAANHS"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1030994"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.splunk.com/view/SP-CAAANHS"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}], "source": "nvd@nist.gov", "type": "Primary"}]}