Show filters
185 Total Results
Displaying 71-80 of 185
Sort by:
Attacker Value
Unknown
CVE-2022-23710
Disclosure Date: March 03, 2022 (last updated February 23, 2025)
A cross-site-scripting (XSS) vulnerability was discovered in the Data Preview Pane (previously known as Index Pattern Preview Pane) which could allow arbitrary JavaScript to be executed in a victim’s browser.
0
Attacker Value
Unknown
CVE-2022-23709
Disclosure Date: March 03, 2022 (last updated February 23, 2025)
A flaw was discovered in Kibana in which users with Read access to the Uptime feature could modify alerting rules. A user with this privilege would be able to create new alerting rules or overwrite existing ones. However, any new or modified rules would not be enabled, and a user with this privilege could not modify alerting connectors. This effectively means that Read users could disable existing alerting rules.
0
Attacker Value
Unknown
CVE-2022-23708
Disclosure Date: March 03, 2022 (last updated February 23, 2025)
A flaw was discovered in Elasticsearch 7.17.0’s upgrade assistant, in which upgrading from version 6.x to 7.x would disable the in-built protections on the security index, allowing authenticated users with “*” index permissions access to this index.
0
Attacker Value
Unknown
CVE-2022-23707
Disclosure Date: February 11, 2022 (last updated February 23, 2025)
An XSS vulnerability was found in Kibana index patterns. Using this vulnerability, an authenticated user with permissions to create index patterns can inject malicious javascript into the index pattern which could execute against other users
0
Attacker Value
Unknown
CVE-2021-37941
Disclosure Date: December 08, 2021 (last updated February 23, 2025)
A local privilege escalation issue was found with the APM Java agent, where a user on the system could attach a malicious file to an application running with the APM Java agent. Using this vector, a malicious or compromised user account could use the agent to run commands at a higher level of permissions than they possess. This vulnerability affects users that have set up the agent via the attacher cli 3, the attach API 2, as well as users that have enabled the profiling_inferred_spans_enabled option
0
Attacker Value
Unknown
CVE-2021-37940
Disclosure Date: December 07, 2021 (last updated February 23, 2025)
An information disclosure via GET request server-side request forgery vulnerability was discovered with the Workplace Search Github Enterprise Server integration. Using this vulnerability, a malicious Workplace Search admin could use the GHES integration to view hosts that might not be publicly accessible.
0
Attacker Value
Unknown
CVE-2021-37939
Disclosure Date: November 18, 2021 (last updated February 23, 2025)
It was discovered that Kibana’s JIRA connector & IBM Resilient connector could be used to return HTTP response data on internal hosts, which may be intentionally hidden from public view. Using this vulnerability, a malicious user with the ability to create connectors, could utilize these connectors to view limited HTTP response data on hosts accessible to the cluster.
0
Attacker Value
Unknown
CVE-2021-37938
Disclosure Date: November 18, 2021 (last updated February 23, 2025)
It was discovered that on Windows operating systems specifically, Kibana was not validating a user supplied path, which would load .pbf files. Because of this, a malicious user could arbitrarily traverse the Kibana host to load internal files ending in the .pbf extension. Thanks to Dominic Couture for finding this vulnerability.
0
Attacker Value
Unknown
CVE-2021-22147
Disclosure Date: September 15, 2021 (last updated February 23, 2025)
Elasticsearch before 7.14.0 did not apply document and field level security to searchable snapshots. This could lead to an authenticated user gaining access to information that they are unauthorized to view.
0
Attacker Value
Unknown
CVE-2021-22149
Disclosure Date: September 15, 2021 (last updated February 23, 2025)
Elastic Enterprise Search App Search versions before 7.14.0 are vulnerable to an issue where API keys were missing authorization via an alternate route. Using this vulnerability, an authenticated attacker could utilize API keys belonging to higher privileged users.
0