Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Elastic | Beats | 8.0.0, 8.9.2 | - | |
| Elastic | Elastic Agent | 8.0.0, 8.9.2 | - | |
| Elastic | APM Server | 8.0.0, 8.9.2 | - | |
| Elastic | Fleet Server | 8.0.0, 8.9.2 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2023-31422 | 9.0 CRITICAL | Kibana Insertion of Sensitive Information into Log File |
| CVE-2023-46667 | 8.1 HIGH | Fleet Server Insertion of Sensitive Information into Log File |
| CVE-2023-31418 | 7.5 HIGH | Elasticsearch uncontrolled resource consumption |
| CVE-2023-31419 | 6.5 MEDIUM | Elasticsearch StackOverflow vulnerability |
| CVE-2023-46666 | 5.3 MEDIUM | Elastic Sharepoint Online Python Connector Improper Access Control |
| CVE-2023-31416 | 5.3 MEDIUM | Elastic Cloud on Kubernetes (ECK) secret token configuration issue |
| CVE-2023-31417 | 4.1 MEDIUM | Elasticsearch Insertion of sensitive information in audit logs |
No comments yet