Page 3 of 14 results (0.004 seconds)

CVSS: 5.9EPSS: 0%CPEs: 9EXPL: 0

Logstash 1.4.x before 1.4.5 and 1.5.x before 1.5.4 with Lumberjack output or the Logstash forwarder does not validate SSL/TLS certificates from the Logstash server, which might allow attackers to obtain sensitive information via a man-in-the-middle attack. Logstash en versiones 1.4.x anteriores a la 1.4.5 y en versiones 1.5.x anteriores a la 1.5.4 con salida Lumberjack o el redireccionador Logstash no valida certificados SSL/TLS desde el servidor Logstash, lo que podría permitir que atacantes obtuviesen información confidencial mediante un ataque man-in-the-middle. • http://packetstormsecurity.com/files/133269/Logstash-1.5.3-Man-In-The-Middle.html http://www.securityfocus.com/archive/1/536294/100/0/threaded http://www.securityfocus.com/archive/1/536858/100/0/threaded http://www.securityfocus.com/bid/76455 https://www.elastic.co/blog/logstash-1-5-4-and-1-4-5-released • CWE-295: Improper Certificate Validation •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

Logstash 1.5.x before 1.5.3 and 1.4.x before 1.4.4 allows remote attackers to read communications between Logstash Forwarder agent and Logstash server. Logstash 1.5.x versiones anteriores a 1.5.3 y 1.4.x anteriores a 1.4.4 permite a atacantes remotos leer las comunicaciones entre el agente Logstash Forwarder y el servidor Logstash. • http://packetstormsecurity.com/files/132800/Logstash-1.5.2-SSL-TLS-FREAK.html http://www.securityfocus.com/archive/1/536050/100/0/threaded http://www.securityfocus.com/archive/1/536859/100/0/threaded http://www.securityfocus.com/bid/76015 https://www.elastic.co/community/security • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 0

Directory traversal vulnerability in the file output plugin in Elasticsearch Logstash before 1.4.3 allows remote attackers to write to arbitrary files via vectors related to dynamic field references in the path option. Vulnerabilidad de salto de directorio en el plugin file output en Elasticsearch Logstash anterior a 1.4.3 permite a atacantes remotos escribir en ficheros arbitrarios a través de vectores relacionados con referencia a campos dinámicos en la opción de rutas. • http://packetstormsecurity.com/files/132233/Logstash-1.4.2-Directory-Traversal.html http://www.securityfocus.com/archive/1/535725/100/0/threaded https://www.elastic.co/blog/logstash-1-4-3-released https://www.elastic.co/community/security • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 0%CPEs: 27EXPL: 0

Elasticsearch Logstash 1.0.14 through 1.4.x before 1.4.2 allows remote attackers to execute arbitrary commands via a crafted event in (1) zabbix.rb or (2) nagios_nsca.rb in outputs/. Elasticsearch Logstash 1.0.14 hasta 1.4.x anterior a 1.4.2 permite a atacantes remotos ejecutar comandos arbitrarios a través de un evento manipulado en (1) zabbix.rb o (2) nagios_nsca.rb en outputs/. • http://www.elasticsearch.org/blog/logstash-1-4-2 http://www.securityfocus.com/archive/1/532841/100/0/threaded https://www.elastic.co/community/security • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •