Software catalogue for Elastic Stack

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
[] 
Main › Vulnerability Database › Elastic Stack

Software catalogue for Elastic Stack

APM Server App Search web crawler Beats Elastic Agent Elastic APM .NET Agent Elastic APM Go Agent Elastic Cloud Enterprise Elastic Cloud on Kubernetes Elastic connectors Elastic Defend
Elastic Endpoint Elastic Sharepoint Online Python Connector Elasticsearch Elasticsearch for Apache Hadoop Enterprise Search Filebeat Filebeat OSS Fleet Server Journalbeat Kibana


Showing elements 1 - 20 out of 24

  • Previous
  • 2
  • Next

Latest security bulletins

Secuity bulletin Severity Status Published
SB2026031962: Denial of service in Kibana Medium
Patched
19.03.2026
SB2026031961: Missing authorization in Kibana Low
Patched
19.03.2026
SB2026031960: Logstash update for lz4-java Medium
Patched
19.03.2026
SB2026031959: Elasticsearch update for PyTorch High
Patched
19.03.2026
SB2026022724: Elastic Synthetics Recorder update for third-party components Critical
Patched Exploited
27.02.2026
SB2026022721: Denial of service in Elastic Packetbeat Medium
Patched
27.02.2026
SB2026022720: Multiple vulnerabilities in Elastic Kibana Medium
Patched
27.02.2026
SB2026022719: Two vulnerabilities in Elastic Kibana Medium
Patched
27.02.2026
SB20260113105: Remote denia of service in Elastic Metricbeat Medium
Patched
13.01.2026
SB20260113104: Remote denial of service in Elastic Packetbeat Medium
Patched
13.01.2026

Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or