Show filters
17 Total Results
Displaying 11-17 of 17
Sort by:
Attacker Value
Unknown
CVE-2015-5619
Disclosure Date: August 09, 2017 (last updated November 26, 2024)
Logstash 1.4.x before 1.4.5 and 1.5.x before 1.5.4 with Lumberjack output or the Logstash forwarder does not validate SSL/TLS certificates from the Logstash server, which might allow attackers to obtain sensitive information via a man-in-the-middle attack.
0
Attacker Value
Unknown
CVE-2015-5378
Disclosure Date: June 27, 2017 (last updated November 26, 2024)
Logstash 1.5.x before 1.5.3 and 1.4.x before 1.4.4 allows remote attackers to read communications between Logstash Forwarder agent and Logstash server.
0
Attacker Value
Unknown
CVE-2016-1000222
Disclosure Date: June 16, 2017 (last updated November 26, 2024)
Logstash prior to version 2.1.2, the CSV output can be attacked via engineered input that will create malicious formulas in the CSV data.
0
Attacker Value
Unknown
CVE-2016-10363
Disclosure Date: June 16, 2017 (last updated November 26, 2024)
Logstash versions prior to 2.3.3, when using the Netflow Codec plugin, a remote attacker crafting malicious Netflow v5, Netflow v9 or IPFIX packets could perform a denial of service attack on the Logstash instance. The errors resulting from these crafted inputs are not handled by the codec and can cause the Logstash process to exit.
0
Attacker Value
Unknown
CVE-2016-1000221
Disclosure Date: June 16, 2017 (last updated November 26, 2024)
Logstash prior to version 2.3.4, Elasticsearch Output plugin would log to file HTTP authorization headers which could contain sensitive information.
0
Attacker Value
Unknown
CVE-2015-4152
Disclosure Date: June 15, 2015 (last updated October 05, 2023)
Directory traversal vulnerability in the file output plugin in Elasticsearch Logstash before 1.4.3 allows remote attackers to write to arbitrary files via vectors related to dynamic field references in the path option.
0
Attacker Value
Unknown
CVE-2014-4326
Disclosure Date: July 22, 2014 (last updated October 05, 2023)
Elasticsearch Logstash 1.0.14 through 1.4.x before 1.4.2 allows remote attackers to execute arbitrary commands via a crafted event in (1) zabbix.rb or (2) nagios_nsca.rb in outputs/.
0