CVE-2018-17247
- EPSS 0.29%
- Veröffentlicht 20.12.2018 22:29:00
- Zuletzt bearbeitet 21.11.2024 03:54:09
Elasticsearch Security versions 6.5.0 and 6.5.1 contain an XXE flaw in Machine Learning's find_file_structure API. If a policy allowing external network access has been added to Elasticsearch's Java Security Manager then an attacker could send a spec...
CVE-2018-17244
- EPSS 0.86%
- Veröffentlicht 20.12.2018 22:29:00
- Zuletzt bearbeitet 21.11.2024 03:54:09
Elasticsearch Security versions 6.4.0 to 6.4.2 contain an error in the way request headers are applied to requests when using the Active Directory, LDAP, Native, or File realms. A request may receive headers intended for another request if the same u...
CVE-2018-3831
- EPSS 0.86%
- Veröffentlicht 19.09.2018 19:29:01
- Zuletzt bearbeitet 21.11.2024 04:06:07
Elasticsearch Alerting and Monitoring in versions before 6.4.1 or 5.6.12 have an information disclosure issue when secrets are configured via the API. The Elasticsearch _cluster/settings API, when queried, could leak sensitive configuration informati...
CVE-2018-3826
- EPSS 0.4%
- Veröffentlicht 19.09.2018 19:29:00
- Zuletzt bearbeitet 21.11.2024 04:06:06
In Elasticsearch versions 6.0.0-beta1 to 6.2.4 a disclosure flaw was found in the _snapshot API. When the access_key and security_key parameters are set using the _snapshot API they can be exposed as plain text by users able to query the _snapshot AP...
CVE-2015-5377
- EPSS 39.9%
- Veröffentlicht 06.03.2018 20:29:00
- Zuletzt bearbeitet 21.11.2024 02:32:54
Elasticsearch before 1.6.1 allows remote attackers to execute arbitrary code via unspecified vectors involving the transport protocol. NOTE: ZDI appears to claim that CVE-2015-3253 and CVE-2015-5377 are the same vulnerability
CVE-2015-1427
- EPSS 92.33%
- Veröffentlicht 17.02.2015 15:59:04
- Zuletzt bearbeitet 22.10.2025 01:16:08
The Groovy scripting engine in Elasticsearch before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to bypass the sandbox protection mechanism and execute arbitrary shell commands via a crafted script.