grafana-selinux vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the grafana-selinux package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Improper Input Validation

*
  • L
Inefficient Regular Expression Complexity

*
  • L
Improper Input Validation

*
  • H
Improper Certificate Validation

*
  • M
Origin Validation Error

*
  • M
Exposed Dangerous Method or Function

*
  • M
Improper Access Control

*
  • H
Cross-site Scripting (XSS)

<0:10.2.6-13.el9_6
  • M
Inefficient Regular Expression Complexity

*
  • M
Incomplete Filtering of Special Elements

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Cross-site Scripting (XSS)

*
  • M
HTTP Request Smuggling

*
  • H
Asymmetric Resource Consumption (Amplification)

<0:10.2.6-11.el9_6
  • M
Improper Input Validation

*
  • M
Cross-site Scripting (XSS)

*
  • M
Server-Side Request Forgery (SSRF)

*
  • M
Arbitrary Code Injection

*
  • H
Cross-site Scripting (XSS)

<0:10.2.6-7.el9_5
  • H
Arbitrary Argument Injection

*
  • M
Information Exposure

*
  • M
Cross-site Scripting (XSS)

*
  • H
Resource Exhaustion

*
  • L
Improper Handling of Exceptional Conditions

*
  • M
Information Exposure

*
  • L
Information Exposure

*
  • L
Authorization Bypass Through User-Controlled Key

*
  • M
CRLF Injection

*
  • L
Improper Verification of Cryptographic Signature

*
  • H
Use of Uninitialized Variable

<0:9.2.10-19.el9_4
  • M
Insufficient Compartmentalization

*
  • M
Insufficiently Protected Credentials

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • H
Uncontrolled Recursion

<0:10.2.6-7.el9_5
  • M
Uncontrolled Recursion

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Improper Input Validation

<0:10.2.6-4.el9
  • M
Information Exposure Through Log Files

<0:10.2.6-4.el9
  • M
Improper Input Validation

<0:10.2.6-4.el9
  • M
Misinterpretation of Input

<0:10.2.6-4.el9
  • M
Resource Exhaustion

*
  • M
Authentication Bypass

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Arbitrary Code Injection

*
  • M
Arbitrary Code Injection

*
  • M
Improper Input Validation

*
  • M
Misinterpretation of Input

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:10.2.6-4.el9
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
CVE-2023-39321

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Resource Exhaustion

*
  • L
Insufficient Entropy

*
  • M
Improper Input Validation

*
  • M
Memory Leak

<0:9.2.10-16.el9_4
  • M
Authorization Bypass Through User-Controlled Key

<0:9.2.10-16.el9_4