diff --git a/advisories/github-reviewed/2022/05/GHSA-8qhq-rq4j-8prj/GHSA-8qhq-rq4j-8prj.json b/advisories/github-reviewed/2022/05/GHSA-8qhq-rq4j-8prj/GHSA-8qhq-rq4j-8prj.json index cda0327a2dd75..29b7c83f61337 100644 --- a/advisories/github-reviewed/2022/05/GHSA-8qhq-rq4j-8prj/GHSA-8qhq-rq4j-8prj.json +++ b/advisories/github-reviewed/2022/05/GHSA-8qhq-rq4j-8prj/GHSA-8qhq-rq4j-8prj.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-8qhq-rq4j-8prj", - "modified": "2025-04-16T17:18:13Z", + "modified": "2025-04-16T17:18:15Z", "published": "2022-05-14T00:58:13Z", "aliases": [ "CVE-2014-4326" @@ -10,8 +10,8 @@ "details": "Elasticsearch Logstash 1.0.14 through 1.4.x before 1.4.2 allows remote attackers to execute arbitrary commands via a crafted event in (1) `zabbix.rb` or (2) `nagios_nsca.rb` in `outputs/`.", "severity": [ { - "type": "CVSS_V4", - "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U" + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" } ], "affected": [ @@ -61,7 +61,7 @@ "cwe_ids": [ "CWE-78" ], - "severity": "HIGH", + "severity": "LOW", "github_reviewed": true, "github_reviewed_at": "2025-04-14T16:59:20Z", "nvd_published_at": "2014-07-22T14:55:00Z"