datadog-agent-fips vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the datadog-agent-fips package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
GHSA-c77r-fh37-x2px

<7.64.1-r0
  • L
CVE-2024-34156

<7.64.1-r0
  • L
CVE-2024-34158

<7.64.1-r0
  • L
GHSA-crqm-pwhx-j97f

<7.64.1-r0
  • L
CVE-2024-41110

<7.64.1-r0
  • M
Open Redirect

<7.64.1-r0
  • L
GHSA-v23v-6jw2-98fq

<7.64.1-r0
  • H
Authentication Bypass

<7.64.1-r0
  • L
GHSA-8xfx-rj4p-23jm

<7.64.1-r0
  • L
GHSA-mh55-gqvf-xfwm

<7.64.1-r0
  • L
GHSA-265r-hfxg-fhmg

<7.64.1-r0
  • L
GHSA-j7vj-rw65-4v26

<7.64.1-r0
  • L
CVE-2024-34155

<7.64.1-r0
  • L
GHSA-xr7q-jx4m-x55m

<7.64.1-r0
  • L
GHSA-33c5-9fx5-fvjm

<7.64.1-r0
  • L
Integer Overflow or Wraparound

<7.64.1-r0
  • L
GHSA-qxp5-gwg8-xv66

<7.63.3-r3
  • L
CVE-2025-22870

<7.63.3-r3
  • L
CVE-2025-22868

<7.63.3-r2
  • L
CVE-2025-22869

<7.63.3-r1
  • M
Information Exposure Through Log Files

<7.63.1-r0
  • L
GHSA-79v4-65xg-pq4g

<7.60.1-r5
  • L
CVE-2024-12797

<7.60.1-r5
  • L
Deserialization of Untrusted Data

<7.63.1-r0
  • L
GHSA-r2x6-cjg7-8r43

<7.63.1-r0
  • L
SQL Injection

<7.63.1-r0
  • L
GHSA-5vvg-pvhp-hv2m

<7.63.1-r0
  • L
Incorrect Default Permissions

<7.63.1-r0
  • L
GHSA-m4f6-vcj4-w5mx

<7.63.1-r0
  • L
GHSA-2vpq-fh52-j3wv

<7.63.1-r0
  • L
CVE-2025-22866

<7.60.1-r4
  • L
GHSA-3whm-j4xm-rv8x

<7.60.1-r4
  • L
Resource Exhaustion

<7.60.1-r1
  • L
Arbitrary Argument Injection

<7.60.1-r1
  • L
GHSA-v725-9546-7q7m

<7.60.1-r1
  • L
GHSA-r9px-m959-cxf4

<7.60.1-r1
  • L
CVE-2024-45338

<7.59.1-r2
  • L
GHSA-w32m-9786-jp63

<7.59.1-r2
  • L
GHSA-v778-237x-gjrc

<7.59.1-r1
  • L
CVE-2024-45337

<7.59.1-r1
  • L
CVE-2024-6257

<7.54.1-r1
  • L
GHSA-xfhp-jf8p-mh5w

<7.54.1-r1
  • L
GHSA-c74f-6mfw-mm4v

<7.54.0-r4
  • H
Out-of-Bounds

<7.54.0-r4
  • L
GHSA-87m9-rv8p-rgmg

<7.54.0-r4
  • L
GHSA-rhh4-rh7c-7r5v

<7.54.0-r0
  • L
Directory Traversal

<7.54.0-r0
  • L
GHSA-2jwv-jmq4-4j3r

<7.53.0-r1
  • L
CVE-2024-24787

<7.53.0-r1
  • L
CVE-2024-24788

<7.53.0-r1
  • L
GHSA-5fq7-4mxc-535h

<7.53.0-r1
  • L
CVE-2023-45288

<7.52.1-r3
  • L
GHSA-4v7x-pqxf-cx7m

<7.52.1-r3
  • L
CVE-2024-29018

<7.52.0-r0
  • L
GHSA-mq39-4gv4-mvpx

<7.52.0-r0
  • L
GHSA-xw73-rw38-6vjc

<7.51.1-r3
  • H
Origin Validation Error

<7.51.1-r3
  • L
CVE-2024-24786

<7.51.1-r2
  • L
GHSA-8r3f-844c-mc37

<7.51.1-r2
  • L
CVE-2024-24784

<7.51.1-r1
  • L
GHSA-fgq5-q76c-gx78

<7.51.1-r1
  • L
CVE-2024-24783

<7.51.1-r1
  • L
CVE-2023-45290

<7.51.1-r1
  • L
GHSA-rr6r-cfgf-gc6h

<7.51.1-r1
  • L
GHSA-j6m3-gc37-6r6q

<7.51.1-r1
  • L
GHSA-3q2c-pvp5-3cqp

<7.51.1-r1
  • L
CVE-2024-24785

<7.51.1-r1
  • L
CVE-2023-45289

<7.51.1-r1
  • L
GHSA-32ch-6x54-q4h9

<7.51.1-r1
  • L
GHSA-xr7r-f8xq-vfvv

<7.50.3-r1
  • C
Incorrect Authorization

<7.50.3-r1
  • H
Race Condition

<7.50.3-r1
  • C
Directory Traversal

<7.50.3-r1
  • M
Improper Check for Unusual or Exceptional Conditions

<7.50.3-r1
  • L
GHSA-4v98-7qmw-rqr8

<7.50.3-r1
  • L
GHSA-9p26-698r-w4hx

<7.50.3-r1
  • H
Exposure of Resource to Wrong Sphere

<7.50.3-r1
  • L
GHSA-m3r6-h7wv-7xxv

<7.50.3-r1
  • L
GHSA-wr6v-9f75-vh2g

<7.50.3-r1