Insecure remote OS command execution via dynamic scripting in Elasticsearch and Logstas
Reporter | Title | Published | Views | Family All 34 |
---|---|---|---|---|
![]() | ElasticSearch - Remote Code Execution | 15 May 201400:00 | – | exploitpack |
![]() | CVE-2014-3120 | 28 Jul 201419:55 | – | cve |
![]() | Elasticsearch Remote Code Execution Vulnerability | 25 Mar 202200:00 | – | cisa_kev |
![]() | RHEL 6 : katello-configure (RHSA-2014:1186) | 12 Sep 201400:00 | – | nessus |
![]() | Elasticsearch 'source' Parameter RCE | 17 Jul 201400:00 | – | nessus |
![]() | FreeBSD : elasticsearch and logstash -- remote OS command execution via dynamic scripting (43ac9d42-1b9a-11e5-b43d-002590263bf5) | 26 Jun 201500:00 | – | nessus |
![]() | ElasticSearch Dynamic Script Arbitrary Java Execution | 27 May 201423:01 | – | metasploit |
![]() | ElasticSearch search Remote Code Execution (CVE-2014-3120) | 25 May 201400:00 | – | checkpoint_advisories |
![]() | Default configuration | 28 Jul 201419:55 | – | prion |
![]() | Elastic Search 1.1.1 Arbitrary File Read | 30 Jul 201400:00 | – | packetstorm |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
FreeBSD | any | noarch | elasticsearch | 1.2.0 | UNKNOWN |
FreeBSD | any | noarch | logstash | 1.4.3 | UNKNOWN |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo