grafana vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the grafana package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Information Exposure Through Log Files

<0:10.2.6-4.el9
  • M
CVE-2024-24791

<0:10.2.6-4.el9
  • M
CVE-2024-24790

<0:10.2.6-4.el9
  • M
CVE-2024-24789

<0:10.2.6-4.el9
  • M
CVE-2024-24788

<0:10.2.6-4.el9
  • H
Use of Uninitialized Variable

<0:9.2.10-19.el9_4
  • H
Cross-site Scripting (XSS)

<0:10.2.6-7.el9_5
  • H
CVE-2024-34156

<0:10.2.6-7.el9_5
  • M
CVE-2024-1313

<0:9.2.10-16.el9_4.alma.1
  • M
Memory Leak

<0:9.2.10-16.el9_4.alma.1
  • M
Resource Exhaustion

<0:9.2.10-7.el9_3.alma.1
  • M
Allocation of Resources Without Limits or Throttling

<0:9.2.10-7.el9_3.alma.1
  • M
Cross-site Scripting (XSS)

<0:9.2.10-7.el9_3.alma.1
  • M
Information Exposure

<0:9.2.10-7.el9_3.alma.1
  • M
Improper Input Validation

<0:9.2.10-7.el9_3.alma.1
  • M
CVE-2022-39201

<0:9.2.10-7.el9_3.alma.1
  • M
Insufficiently Protected Credentials

<0:9.2.10-7.el9_3.alma.1
  • M
Improper Verification of Cryptographic Signature

<0:9.2.10-7.el9_3.alma.1
  • M
Cross-site Scripting (XSS)

<0:9.2.10-7.el9_3.alma.1
  • M
CVE-2023-44487

<0:9.0.9-4.el9_2.alma.1
  • M
Allocation of Resources Without Limits or Throttling

<0:9.0.9-4.el9_2.alma.1
  • C
Authentication Bypass

<0:9.0.9-3.el9_2.alma
  • H
Authorization Bypass Through User-Controlled Key

<0:7.5.15-3.el9
  • H
Cross-site Request Forgery (CSRF)

<0:7.5.15-3.el9
  • H
Cross-site Scripting (XSS)

<0:7.5.15-3.el9
  • H
CVE-2022-21673

<0:7.5.15-3.el9
  • H
Cross-site Scripting (XSS)

<0:7.5.15-3.el9
  • M
Authentication Bypass

<0:9.0.9-2.el9
  • H
Incorrect Authorization

<0:7.5.11-5.el9_0
  • M
Improper Authentication

<0:9.0.9-2.el9
  • M
CVE-2022-27664

<0:9.0.9-2.el9
  • H
CVE-2022-32148

<0:7.5.15-3.el9
  • H
Uncontrolled Recursion

<0:7.5.15-3.el9
  • H
Uncontrolled Recursion

<0:7.5.15-3.el9
  • H
Uncontrolled Recursion

<0:7.5.15-3.el9
  • H
Uncontrolled Recursion

<0:7.5.15-3.el9
  • H
Uncontrolled Recursion

<0:7.5.15-3.el9
  • H
Uncontrolled Recursion

<0:7.5.15-3.el9
  • H
Uncontrolled Recursion

<0:7.5.15-3.el9
  • H
HTTP Request Smuggling

<0:7.5.15-3.el9
  • M
CVE-2022-41715

<0:9.0.9-2.el9
  • M
HTTP Request Smuggling

<0:9.0.9-2.el9
  • H
Allocation of Resources Without Limits or Throttling

<0:7.5.15-3.el9