datadog-agent-7 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the datadog-agent-7 package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Improper Handling of Highly Compressed Data (Data Amplification)

*
  • L
Directory Traversal

<7.75.0-r0
  • L
Link Following

*
  • H
Deserialization of Untrusted Data

*
  • L
Incomplete Blacklist

*
  • L
Arbitrary Code Injection

<7.74.1-r1
  • L
Link Following

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • H
Improper Handling of Highly Compressed Data (Data Amplification)

*
  • L
Improper Certificate Validation

<7.72.4-r1
  • L
Improper Certificate Validation

<7.72.4-r1
  • L
CVE-2025-58181

<7.72.2-r1
  • L
CVE-2025-47914

<7.72.2-r1
  • L
CVE-2025-58183

<7.71.1-r0
  • L
CVE-2025-58187

<7.71.2-r0
  • L
CVE-2025-58185

<7.71.1-r0
  • L
CVE-2025-61724

<7.71.1-r0
  • L
CVE-2025-58186

<7.71.1-r0
  • L
CVE-2025-47910

<7.70.1-r1
  • L
CVE-2025-58189

<7.71.1-r0
  • L
CVE-2025-47912

<7.71.1-r0
  • L
CVE-2025-58188

<7.71.1-r0
  • L
CVE-2025-61723

<7.71.1-r0
  • L
CVE-2025-61725

<7.71.1-r0
  • M
Memory Leak

<7.72.1-r2
  • H
Incorrect Execution-Assigned Permissions

<7.72.1-r2
  • H
Symlink Following

<7.72.1-r1
  • L
GHSA-fv92-fjc5-jj9h

<7.67.0-r1
  • M
Open Redirect

*
  • L
CVE-2025-8869

<7.72.0-r0
  • L
Insufficiently Protected Credentials

<7.68.3-r1
  • L
CVE-2025-22874

<7.66.1-r1
  • L
Improper Verification of Cryptographic Signature

<7.67.0-r1
  • L
CVE-2025-47906

<7.68.3-r1
  • M
Open Redirect

<7.69.0-r0
  • L
Allocation of Resources Without Limits or Throttling

<7.69.4-r1
  • L
CVE-2025-4673

<7.66.1-r1
  • L
GHSA-2464-8j7c-4cjm

<7.69.2-r1
  • M
Missing Initialization of Resource

<7.66.0-r0
  • M
CVE-2025-4565

<7.68.0-r0
  • L
CVE-2025-47907

<7.68.3-r1
  • L
CVE-2025-4674

<7.68.0-r0
  • L
Link Following

<7.66.1-r1
  • L
Allocation of Resources Without Limits or Throttling

<7.69.4-r1
  • L
GHSA-jc7w-c686-c4v9

<7.69.4-r1
  • L
GHSA-2464-8j7c-4cjm

<7.69.2-r1