grafana-selinux vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the grafana-selinux package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Cross-site Scripting (XSS)

*
  • M
HTTP Request Smuggling

*
  • H
Asymmetric Resource Consumption (Amplification)

<0:10.2.6-9.el9_5
  • M
Improper Input Validation

*
  • M
Cross-site Scripting (XSS)

*
  • M
Server-Side Request Forgery (SSRF)

*
  • M
Arbitrary Code Injection

*
  • H
Improper Validation of Syntactic Correctness of Input

*
  • H
Cross-site Scripting (XSS)

<0:9.2.10-19.el9_4
  • H
Arbitrary Argument Injection

*
  • M
Information Exposure

*
  • M
Cross-site Scripting (XSS)

*
  • H
Resource Exhaustion

*
  • L
Improper Handling of Exceptional Conditions

*
  • M
Information Exposure

*
  • L
Information Exposure

*
  • L
Authorization Bypass Through User-Controlled Key

*
  • M
CRLF Injection

*
  • L
Improper Verification of Cryptographic Signature

*
  • H
Use of Uninitialized Variable

<0:9.2.10-19.el9_4
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Insufficient Compartmentalization

*
  • M
Insufficiently Protected Credentials

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • H
Uncontrolled Recursion

<0:9.2.10-17.el9_4
  • M
Uncontrolled Recursion

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Improper Input Validation

*
  • M
Information Exposure Through Log Files

*
  • M
Improper Input Validation

<0:10.2.6-4.el9
  • M
Misinterpretation of Input

*
  • M
Resource Exhaustion

*
  • M
Authentication Bypass

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Arbitrary Code Injection

*
  • M
Arbitrary Code Injection

*
  • M
Improper Input Validation

*
  • M
Misinterpretation of Input

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • H
Resource Exhaustion

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
CVE-2023-39321

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Resource Exhaustion

*
  • L
Insufficient Entropy

*
  • M
Improper Input Validation

*
  • M
Memory Leak

<0:9.2.10-16.el9_4
  • M
Authorization Bypass Through User-Controlled Key

<0:9.2.10-16.el9_4
  • C
Directory Traversal

*