Show filters
185 Total Results
Displaying 101-110 of 185
Sort by:
Attacker Value
Unknown
CVE-2020-7016
Disclosure Date: July 27, 2020 (last updated February 21, 2025)
Kibana versions before 6.8.11 and 7.8.1 contain a denial of service (DoS) flaw in Timelion. An attacker can construct a URL that when viewed by a Kibana user can lead to the Kibana process consuming large amounts of CPU and becoming unresponsive.
0
Attacker Value
Unknown
CVE-2020-7011
Disclosure Date: June 03, 2020 (last updated February 21, 2025)
Elastic App Search versions before 7.7.0 contain a cross site scripting (XSS) flaw when displaying document URLs in the Reference UI. If the Reference UI injects a URL into a result, that URL will be rendered by the web browser. If an attacker is able to control the contents of such a field, they could execute arbitrary JavaScript in the victim�s web browser.
0
Attacker Value
Unknown
CVE-2020-7014
Disclosure Date: June 03, 2020 (last updated February 21, 2025)
The fix for CVE-2020-7009 was found to be incomplete. Elasticsearch versions from 6.7.0 to 6.8.7 and 7.0.0 to 7.6.1 contain a privilege escalation flaw if an attacker is able to create API keys and also authentication tokens. An attacker who is able to generate an API key and an authentication token can perform a series of steps that result in an authentication token being generated with elevated privileges.
0
Attacker Value
Unknown
CVE-2020-7015
Disclosure Date: June 03, 2020 (last updated February 21, 2025)
Kibana versions before 6.8.9 and 7.7.0 contains a stored XSS flaw in the TSVB visualization. An attacker who is able to edit or create a TSVB visualization could allow the attacker to obtain sensitive information from, or perform destructive actions, on behalf of Kibana users who edit the TSVB visualization.
0
Attacker Value
Unknown
CVE-2020-7012
Disclosure Date: June 03, 2020 (last updated February 21, 2025)
Kibana versions 6.7.0 to 6.8.8 and 7.0.0 to 7.6.2 contain a prototype pollution flaw in the Upgrade Assistant. An authenticated attacker with privileges to write to the Kibana index could insert data that would cause Kibana to execute arbitrary code. This could possibly lead to an attacker executing code with the permissions of the Kibana process on the host system.
0
Attacker Value
Unknown
CVE-2020-7010
Disclosure Date: June 03, 2020 (last updated February 21, 2025)
Elastic Cloud on Kubernetes (ECK) versions prior to 1.1.0 generate passwords using a weak random number generator. If an attacker is able to determine when the current Elastic Stack cluster was deployed they may be able to more easily brute force the Elasticsearch credentials generated by ECK.
0
Attacker Value
Unknown
CVE-2020-7013
Disclosure Date: June 03, 2020 (last updated February 21, 2025)
Kibana versions before 6.8.9 and 7.7.0 contain a prototype pollution flaw in TSVB. An authenticated attacker with privileges to create TSVB visualizations could insert data that would cause Kibana to execute arbitrary code. This could possibly lead to an attacker executing code with the permissions of the Kibana process on the host system.
0
Attacker Value
Unknown
CVE-2020-7009
Disclosure Date: March 31, 2020 (last updated February 21, 2025)
Elasticsearch versions from 6.7.0 before 6.8.8 and 7.0.0 before 7.6.2 contain a privilege escalation flaw if an attacker is able to create API keys. An attacker who is able to generate an API key can perform a series of steps that result in an API key being generated with elevated privileges.
0
Attacker Value
Unknown
CVE-2019-7621
Disclosure Date: December 18, 2019 (last updated November 27, 2024)
Kibana versions before 6.8.6 and 7.5.1 contain a cross site scripting (XSS) flaw in the coordinate and region map visualizations. An attacker with the ability to create coordinate map visualizations could create a malicious visualization. If another Kibana user views that visualization or a dashboard containing the visualization it could execute JavaScript in the victim�s browser.
0
Attacker Value
Unknown
CVE-2019-7620
Disclosure Date: October 30, 2019 (last updated November 27, 2024)
Logstash versions before 7.4.1 and 6.8.4 contain a denial of service flaw in the Logstash Beats input plugin. An unauthenticated user who is able to connect to the port the Logstash beats input could send a specially crafted network packet that would cause Logstash to stop responding.
0