Search Results (Refine Search)
- CPE Product Version: cpe:/a:elasticsearch:elasticsearch:1.1.1
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2015-5531 |
Directory traversal vulnerability in Elasticsearch before 1.6.1 allows remote attackers to read arbitrary files via unspecified vectors related to snapshot API calls. Published: August 17, 2015; 11:59:02 AM -0400 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
CVE-2015-3337 |
Directory traversal vulnerability in Elasticsearch before 1.4.5 and 1.5.x before 1.5.2, when a site plugin is enabled, allows remote attackers to read arbitrary files via unspecified vectors. Published: May 01, 2015; 11:59:06 AM -0400 |
V3.x:(not available) V2.0: 4.3 MEDIUM |
CVE-2015-1427 |
The Groovy scripting engine in Elasticsearch before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to bypass the sandbox protection mechanism and execute arbitrary shell commands via a crafted script. Published: February 17, 2015; 10:59:04 AM -0500 |
V3.x:(not available) V2.0: 7.5 HIGH |
CVE-2014-6439 |
Cross-site scripting (XSS) vulnerability in the CORS functionality in Elasticsearch before 1.4.0.Beta1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Published: October 09, 2014; 9:55:11 PM -0400 |
V3.x:(not available) V2.0: 4.3 MEDIUM |
CVE-2014-3120 |
The default configuration in Elasticsearch before 1.2 enables dynamic scripting, which allows remote attackers to execute arbitrary MVEL expressions and Java code via the source parameter to _search. NOTE: this only violates the vendor's intended security policy if the user does not run Elasticsearch in its own independent virtual machine. Published: July 28, 2014; 3:55:04 PM -0400 |
V3.x:(not available) V2.0: 6.8 MEDIUM |