Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Elastic | Elasticsearch | 7.0.0 ~ 7.17.12 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Elasticsearch Stack Overflow Vulnerability | https://github.com/sqrtZeroKnowledge/Elasticsearch-Exploit-CVE-2023-31419 | POC Details |
| 2 | Elasticsearch DoS CVE-2023-31419 exploit | https://github.com/u238/Elasticsearch-CVE-2023-31419 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2023-31422 | 9.0 CRITICAL | Kibana Insertion of Sensitive Information into Log File |
| CVE-2023-46667 | 8.1 HIGH | Fleet Server Insertion of Sensitive Information into Log File |
| CVE-2023-31418 | 7.5 HIGH | Elasticsearch uncontrolled resource consumption |
| CVE-2023-31421 | 5.9 MEDIUM | Beats, Elastic Agent, APM Server, and Fleet Server Improper Certificate Validation issue |
| CVE-2023-46666 | 5.3 MEDIUM | Elastic Sharepoint Online Python Connector Improper Access Control |
| CVE-2023-31416 | 5.3 MEDIUM | Elastic Cloud on Kubernetes (ECK) secret token configuration issue |
| CVE-2023-31417 | 4.1 MEDIUM | Elasticsearch Insertion of sensitive information in audit logs |
No comments yet