ok vi ska tydligen byta ut splunk mot victorialogs på jobbet

#splunk #victorialogs #softwareEngineering

Critical Splunk RCE Vulnerability (CVE-2026–20163) Lets Attackers Run Shell Commands on Your Server
The discovered vulnerability is a Remote Code Execution (RCE) in Splunk, a popular data processing software. The flaw stems from insufficient input validation in the application's search interface. By constructing a crafted search query, an attacker can exploit the vulnerability and execute arbitrary shell commands on the target server. Specifically, an attacker can utilize the 'enableJavaScript' and 'enableCookies' search commands to trigger the RCE. When the search interface receives a request, it inadvertently executes JavaScript provided by the attacker, enabling further exploitation. The impact of this vulnerability is severe, as it allows unauthorized execution of commands with the privileges of the Splunk user, potentially leading to data breaches or unauthorized access. The researcher received a $15,000 bounty from Splunk for reporting this critical issue. To remediate, Splunk suggests implementing input validation and sanitization for user-supplied search queries. Key lesson: Always validate user inputs to prevent RCE attacks. #BugBounty #Cybersecurity #RCE #Splunk #InputValidation

https://medium.com/@EternalSec/critical-splunk-rce-vulnerability-cve-2026-20163-lets-attackers-run-shell-commands-on-your-server-244fcbe3497d?source=rss------bug_bounty-5

Critical Splunk RCE Vulnerability (CVE-2026–20163) Lets Attackers Run Shell Commands on Your Server

A high-severity flaw in Splunk Enterprise and Cloud Platform is putting organizations at risk. Here’s what you need to know — and how to…

Medium
CVE Alert: CVE-2026-20163 - Splunk - Splunk Enterprise - RedPacket Security

In Splunk Enterprise versions below 10.2.0, 10.0.4, 9.4.9, and 9.3.10, and Splunk Cloud Platform versions below 10.2.2510.5, 10.0.2503.12, 10.1.2507.16, and

RedPacket Security

@kobold @nakal

Du kriegst #Cisco raus aus der Technik

#soniclinux auf den Switches https://sonicfoundation.dev/ 💪

@OpenTalkMeeting statt #Webex 💪💪

#elasticsearch oder #opensearch statt #splunk 💪

Aber wie kriegst Du Cisco raus aus den Köpfen 🤷

Sonic Foundation – Linux Foundation Project

Use Splunk to fetch our vulnerability data very easily https://splunkbase.splunk.com/app/4190/ #vuldb #splunk #logging
VulDB Vulnerability and Threat Intelligence | Splunkbase

CVE-2025-59287: Deserialización de Objetos .NET como Vector de RCE en WSUS. – Red-Orbita

We use #splunk which is owned by #cisco which means we get invites to the world worst online events
You may use our vulnerability data with Splunk https://splunkbase.splunk.com/app/4190/ #vuldb #splunk #logging
VulDB Vulnerability and Threat Intelligence | Splunkbase

It is very easy to use our vulnerability data with Splunk https://splunkbase.splunk.com/app/4190/ #vuldb #splunk #logging
VulDB Vulnerability and Threat Intelligence | Splunkbase

🔐 IT-Sicherheits- und Logging-Spezialist*in (E13 TV-L) gesucht

Die HHU Düsseldorf sucht zum 01.03.2026 eine*n IT-Sicherheits- und Logging-Spezialist*in für das ZIM.

Aufgabenschwerpunkte:
• IT-Security-Design & Incident Response
• Threat Detection & Angriffssimulationen
• Betrieb & Ausbau des zentralen Loggings (z. B. Splunk)

📍 Düsseldorf | ⏳ Bewerbung bis 12.01.2026

https://karriere.hhu.de/index.php?ac=jobad&id=544

#Stellenausschreibung #ITSecurity #InfosecJobs #CyberSecurity #Hochschule #Splunk #ThreatHunting

IT-Sicherheits- und Logging-Spezialist*in

Heinrich-Heine-Universität Düsseldorf