Vulnerabilities
Vulnerable Software
Secret token configuration is never applied when using ECK <2.8 with APM Server >=8.0. This could lead to anonymous requests to an APM Server being accepted and the data ingested into this APM deployment.
CVSS Score
5.3
EPSS Score
0.001
Published
2023-10-26


Contact Us

Shodan ® - All rights reserved