Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-5531

Опубликовано: 17 авг. 2015
Источник: debian
EPSS Критический

Описание

Directory traversal vulnerability in Elasticsearch before 1.6.1 allows remote attackers to read arbitrary files via unspecified vectors related to snapshot API calls.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
elasticsearchfixed1.6.1+dfsg-1package
elasticsearchend-of-lifejessiepackage

Примечания

  • https://www.elastic.co/blog/elasticsearch-1-7-0-and-1-6-1-released#security

EPSS

Процентиль: 100%
0.91581
Критический

Связанные уязвимости

ubuntu
больше 10 лет назад

Directory traversal vulnerability in Elasticsearch before 1.6.1 allows remote attackers to read arbitrary files via unspecified vectors related to snapshot API calls.

redhat
больше 10 лет назад

Directory traversal vulnerability in Elasticsearch before 1.6.1 allows remote attackers to read arbitrary files via unspecified vectors related to snapshot API calls.

nvd
больше 10 лет назад

Directory traversal vulnerability in Elasticsearch before 1.6.1 allows remote attackers to read arbitrary files via unspecified vectors related to snapshot API calls.

github
больше 3 лет назад

Improper Limitation of a Pathname to a Restricted Directory in Elasticsearch

EPSS

Процентиль: 100%
0.91581
Критический