Kibana versions prior to 4.1.3 and 4.2.1 suffer from a cross site request forgery vulnerability.
6045ea2c042b81972ed4a68e93347e2b9910ce5897698ea762510910c470cac1
Logstash 1.5.2 and prior versions are vulnerable to a SSL/TLS security issue called the FREAK attack. If you are using the Lumberjack input, FREAK allows an attacker to successfully implement a man in the middle attack, intercepting communication between the Logstash Forwarder agent and Logstash server.
b7135fa3ae882e982da1c97f18565f7476767f2800a6c0cc71e186e95bad5b18
Elasticsearch versions from 1.0.0 to 1.6.0 are vulnerable to a directory traversal attack that allows an attacker to retrieve files that are readable by the Elasticsearch JVM process.
b31e33f0be2db96a5fdb079e65aaf1b8bd17143da9e03e617b58e897d6aa2937
Elasticsearch versions prior to 1.6.1 are vulnerable to an engineered attack on its transport protocol that enables remote code execution.
c7d03a23059a26c14cfa85c4a73e1ef9e80899f3676ade54bb247e68d5444f6b
Elasticsearch versions 1.0.0 through 1.5.2 are vulnerable to an engineered attack on other applications on the system. The snapshot API may be used indirectly to place snapshot metadata files into locations that are writeable by the user running the Elasticsearch process. It is possible to create a file that another application could read and take action on, such as code execution.
40fbbad63203d51d9594c5a223b36155c3bc025496d567a1cd717891d12e5525
Logstash versions 1.4.2 and prior are vulnerable to a directory traversal attack that allows an attacker to overwrite files on the server running Logstash.
15f05c723e1b04d767214a61d1c74ca2c6761f51c75c29b5564d9ff5525fe92f
Kibana versions 4.0.0, 4.0.1, and 4.0.2 suffer from a cross site scripting vulnerability.
49c7e5c94dc36f2240b1ab23d6ffcbb9873f9a1280b585195865fccb340cad36