Описание
Directory traversal vulnerability in Elasticsearch before 1.6.1 allows remote attackers to read arbitrary files via unspecified vectors related to snapshot API calls.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | ignored | end of life |
| bionic | DNE | |
| devel | DNE | |
| esm-apps/xenial | not-affected | 1.7.3+dfsg-3 |
| esm-infra-legacy/trusty | DNE | |
| precise | DNE | |
| precise/esm | DNE | |
| trusty | DNE | |
| trusty/esm | DNE | |
| upstream | released | 1.6.1+dfsg-1 |
Показывать по
10
EPSS
Процентиль: 100%
0.91581
Критический
5 Medium
CVSS2
Связанные уязвимости
redhat
больше 10 лет назад
Directory traversal vulnerability in Elasticsearch before 1.6.1 allows remote attackers to read arbitrary files via unspecified vectors related to snapshot API calls.
nvd
больше 10 лет назад
Directory traversal vulnerability in Elasticsearch before 1.6.1 allows remote attackers to read arbitrary files via unspecified vectors related to snapshot API calls.
debian
больше 10 лет назад
Directory traversal vulnerability in Elasticsearch before 1.6.1 allows ...
github
больше 3 лет назад
Improper Limitation of a Pathname to a Restricted Directory in Elasticsearch
EPSS
Процентиль: 100%
0.91581
Критический
5 Medium
CVSS2