Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
elastic x-pack 5.0.1 vulnerabilities and exploits
(subscribe to this query)
6.5
CVSSv2
CVE-2017-8438
Elastic X-Pack Security versions 5.0.0 to 5.4.0 contain a privilege escalation bug in the run_as functionality. This bug prevents transitioning into the specified user specified in a run_as request. If a role has been created using a template that contains the _user properties, t...
Elastic X-pack 5.0.0
Elastic X-pack 5.3.2
Elastic X-pack 5.2.2
Elastic X-pack 5.2.0
Elastic X-pack 5.1.0
Elastic X-pack 5.2.1
Elastic X-pack 5.0.2
Elastic X-pack 5.3.3
Elastic X-pack 5.3.1
Elastic X-pack 5.4.0
Elastic X-pack 5.0.1
Elastic X-pack 5.1.1
Elastic X-pack 5.3.0
6.5
CVSSv2
CVE-2017-8448
An error was found in the permission model used by X-Pack Alerting 5.0.0 to 5.6.0 whereby users mapped to certain built-in roles could create a watch that results in that user gaining elevated privileges.
Elastic X-pack 5.0.0
Elastic X-pack 5.3.2
Elastic X-pack 5.2.2
Elastic X-pack 5.2.0
Elastic X-pack 5.2.1
Elastic X-pack 5.0.2
Elastic X-pack 5.3.3
Elastic X-pack 5.3.1
Elastic X-pack 5.4.0
Elastic X-pack 5.0.1
Elastic X-pack 5.1.1
Elastic X-pack 5.3.0
Elastic X-pack 5.6.0
Elastic X-pack 5.5.0
Elastic X-pack 5.5.2
4
CVSSv2
CVE-2016-10364
With X-Pack installed, Kibana versions 5.0.0 and 5.0.1 were not properly authenticating requests to advanced settings and the short URL service, any authenticated user could make requests to those services regardless of their own permissions.
Elastic Kibana 5.0.1
Elastic Kibana 5.0.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started