Show filters
185 Total Results
Displaying 61-70 of 185
Sort by:
Attacker Value
Unknown

CVE-2022-38775

Disclosure Date: January 26, 2023 (last updated October 08, 2023)
An issue was discovered in the rollback feature of Elastic Endpoint Security for Windows, which could allow unprivileged users to elevate their privileges to those of the LocalSystem account.
Attacker Value
Unknown

CVE-2022-38774

Disclosure Date: January 26, 2023 (last updated October 08, 2023)
An issue was discovered in the quarantine feature of Elastic Endpoint Security and Elastic Endgame for Windows, which could allow unprivileged users to elevate their privileges to those of the LocalSystem account.
Attacker Value
Unknown

CVE-2021-37936

Disclosure Date: November 18, 2022 (last updated December 22, 2024)
It was discovered that Kibana was not sanitizing document fields containing HTML snippets. Using this vulnerability, an attacker with the ability to write documents to an elasticsearch index could inject HTML. When the Discover app highlighted a search term containing the HTML, it would be rendered for the user.
Attacker Value
Unknown

CVE-2021-22141

Disclosure Date: November 18, 2022 (last updated December 22, 2024)
An open redirect flaw was found in Kibana versions before 7.13.0 and 6.8.16. If a logged in user visits a maliciously crafted URL, it could result in Kibana redirecting the user to an arbitrary website.
Attacker Value
Unknown

CVE-2022-23716

Disclosure Date: September 28, 2022 (last updated October 08, 2023)
A flaw was discovered in ECE before 3.1.1 that could lead to the disclosure of the SAML signing private key used for the RBAC features, in deployment logs in the Logging and Monitoring cluster.
Attacker Value
Unknown

CVE-2022-23715

Disclosure Date: August 25, 2022 (last updated October 08, 2023)
A flaw was discovered in ECE before 3.4.0 that might lead to the disclosure of sensitive information such as user passwords and Elasticsearch keystore settings values in logs such as the audit log or deployment logs in the Logging and Monitoring cluster. The affected APIs are PATCH /api/v1/user and PATCH /deployments/{deployment_id}/elasticsearch/{ref_id}/keystore
Attacker Value
Unknown

CVE-2022-23714

Disclosure Date: July 06, 2022 (last updated October 07, 2023)
A local privilege escalation (LPE) issue was discovered in the ransomware canaries features of Elastic Endpoint Security for Windows, which could allow unprivileged users to elevate their privileges to those of the LocalSystem account.
Attacker Value
Unknown

CVE-2022-23713

Disclosure Date: July 06, 2022 (last updated October 07, 2023)
A cross-site-scripting (XSS) vulnerability was discovered in the Vega Charts Kibana integration which could allow arbitrary JavaScript to be executed in a victim’s browser.
Attacker Value
Unknown

CVE-2022-23712

Disclosure Date: June 06, 2022 (last updated October 07, 2023)
A Denial of Service flaw was discovered in Elasticsearch. Using this vulnerability, an unauthenticated attacker could forcibly shut down an Elasticsearch node with a specifically formatted network request.
Attacker Value
Unknown

CVE-2022-23711

Disclosure Date: April 21, 2022 (last updated February 23, 2025)
A vulnerability in Kibana could expose sensitive information related to Elastic Stack monitoring in the Kibana page source. Elastic Stack monitoring features provide a way to keep a pulse on the health and performance of your Elasticsearch cluster. Authentication with a vulnerable Kibana instance is not required to view the exposed information. The Elastic Stack monitoring exposure only impacts users that have set any of the optional monitoring.ui.elasticsearch.* settings in order to configure Kibana as a remote UI for Elastic Stack Monitoring. The same vulnerability in Kibana could expose other non-sensitive application-internal information in the page source.