Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
elasticsearch logstash 1.4.3 vulnerabilities and exploits
(subscribe to this query)
6.4
CVSSv2
CVE-2015-4152
Directory traversal vulnerability in the file output plugin in Elasticsearch Logstash prior to 1.4.3 allows remote malicious users to write to arbitrary files via vectors related to dynamic field references in the path option.
Elastic Logstash
5
CVSSv2
CVE-2015-5378
Logstash 1.5.x prior to 1.5.3 and 1.4.x prior to 1.4.4 allows remote malicious users to read communications between Logstash Forwarder agent and Logstash server.
Elasticsearch Logstash 1.5.1
Elasticsearch Logstash 1.4.3
Elasticsearch Logstash 1.5.0
Elasticsearch Logstash 1.5.2
Elastic Logstash 1.4.1
Elastic Logstash 1.4.2
Elastic Logstash 1.4.0
4.3
CVSSv2
CVE-2015-5619
Logstash 1.4.x prior to 1.4.5 and 1.5.x prior to 1.5.4 with Lumberjack output or the Logstash forwarder does not validate SSL/TLS certificates from the Logstash server, which might allow malicious users to obtain sensitive information via a man-in-the-middle attack.
Elasticsearch Logstash 1.5.3
Elasticsearch Logstash 1.4.4
Elasticsearch Logstash 1.5.1
Elasticsearch Logstash 1.4.3
Elasticsearch Logstash 1.5.0
Elasticsearch Logstash 1.5.2
Elastic Logstash 1.4.1
Elastic Logstash 1.4.2
Elastic Logstash 1.4.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27802
template injection
CVE-2024-0044
code injection
CVE-2024-35474
CVE-2024-27857
CVE-2024-23251
CVE-2024-23692
physical
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started