:tropical_fish: Beats - Lightweight shippers for Elasticsearch & Logstash
github.com/elastic/[email protected]+incompatible has vulnerabilities — update to latest
Update to >= 7.0.0-alpha2.0.20260112100137-de072c4e371e to fix known vulnerabilities
| Severity | ID | Summary | Fixed in |
|---|---|---|---|
| medium | CVE-2025-68383 | Filebeat Beats has Buffer Overflow via Malformed Syslog Message or Malicious Tokenizer Pattern in Dissect Configuration | 7.0.0-alpha2.0.20251204214633-dd3af18220bf |
| high | CVE-2025-68388 | Elasticsearch Packetbeat has Excessive Allocation of Memory and CPU via Malicious IPv4 Fragments | 7.0.0-alpha2.0.20251209162832-28cfc80d2f4e |
| unknown | CVE-2025-68388 | Elasticsearch Packetbeat has Excessive Allocation of Memory and CPU via Malicious IPv4 Fragments in github.com/elastic/beats | 7.0.0-alpha2.0.20251209162832-28cfc80d2f4e |
| unknown | CVE-2026-0528 | Metricbeat affected by multiple denial of service vulnerabilities in github.com/elastic/beats | 7.0.0-alpha2.0.20251217054608-6e42552a23ce |
| unknown | CVE-2026-26933 | Packetbeat does not properly validate an array index in multiple protocol parser components in github.com/elastic/beats | 7.0.0-alpha2.0.20260126223743-dec1b31111ec |
| unknown | CVE-2026-26931 | Metricbeat Allocates Memory with Excessive Size Value Leading to Denial of Service in github.com/elastic/beats | 7.0.0-alpha2.0.20260112100137-de072c4e371e |
Get this data programmatically — free, no authentication.
curl https://depscope.dev/api/check/go/github.com/elastic/beatsLast updated · 2022-01-04T05:58:54Z