{"vulnerability": "CVE-2023-32713", "sightings": [{"uuid": "b759697d-79e9-487c-9cff-d51affe8677d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32713", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1823", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-32713\n\ud83d\udd39 Description: In Splunk App for Stream versions below 8.1.1, a low-privileged user could use a vulnerability in the streamfwd process within the Splunk App for Stream to escalate their privileges on the machine that runs the Splunk Enterprise instance, up to and including the root user.\n\ud83d\udccf Published: 2023-06-01T16:34:30.265Z\n\ud83d\udccf Modified: 2025-01-15T17:05:44.940Z\n\ud83d\udd17 References:\n1. https://advisory.splunk.com/advisories/SVD-2023-0607", "creation_timestamp": "2025-01-15T17:55:03.000000Z"}, {"uuid": "de9d01f8-84c6-4e89-b9ae-8c864bf4bcc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32713", "type": "seen", "source": "https://t.me/cibsecurity/64865", "content": "\u203c CVE-2023-32713 \u203c\n\nIn Splunk App for Stream versions below 8.1.1, a low-privileged user could use a vulnerability in the streamfwd process within the Splunk App for Stream to escalate their privileges on the machine that runs the Splunk Enterprise instance, up to and including the root user.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-01T20:25:25.000000Z"}]}