grafana-fips-12.2

Direct Vulnerabilities

Known vulnerabilities in the grafana-fips-12.2 package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
Resource Exhaustion

*
  • L
CVE-2026-42499

<12.2.8.01-r4
  • L
Improper Encoding or Escaping of Output

<12.2.8.01-r4
  • H
Double Free

<12.2.8.01-r4
  • L
CVE-2026-42501

<12.2.8.01-r4
  • M
Out-of-bounds Write

<12.2.8.01-r4
  • M
Link Following

<12.2.8.01-r4
  • L
CVE-2026-39825

<12.2.8.01-r4
  • H
Allocation of Resources Without Limits or Throttling

<12.2.8.01-r4
  • L
Cross-site Scripting (XSS)

<12.2.8.01-r4
  • H
NULL Pointer Dereference

<12.2.8.01-r4
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<12.2.8.01-r4
  • L
CVE-2026-28375

*
  • H
Incorrect Authorization

*
  • L
Information Exposure

*
  • L
Uncontrolled Memory Allocation

*
  • L
GHSA-xmrv-pmrh-hhx2

*
  • M
Cross-site Scripting (XSS)

*
  • L
CVE-2026-21726

*
  • L
SQL Injection

*
  • L
Integer Overflow or Wraparound

*
  • L
Use of Incorrectly-Resolved Name or Reference

*
  • L
Allocation of Resources Without Limits or Throttling

<12.2.8.01-r1
  • L
CVE-2026-21727

<12.2.4-r0
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<12.2.8.01-r3
  • C
CVE-2026-27143

<12.2.8.01-r3
  • M
Cross-site Scripting (XSS)

<12.2.8.01-r3
  • M
Allocation of Resources Without Limits or Throttling

<12.2.8.01-r3
  • H
Allocation of Resources Without Limits or Throttling

<12.2.8.01-r3
  • L
CVE-2026-32280

<12.2.8.01-r3
  • H
Incorrect Authorization

<12.2.8.01-r3
  • M
Link Following

<12.2.8.01-r3
  • H
Improper Certificate Validation

<12.2.8.01-r3
  • H
Improper Certificate Validation

<12.2.8.01-r3
  • H
CVE-2026-27877

<12.2.8-r0
  • M
CVE-2026-21724

<12.2.8-r0
  • L
CVE-2026-33375

<12.2.8-r0
  • C
Improper Input Validation

<12.2.8.01-r1
  • L
Improper Authorization

<12.2.7-r1
  • L
GHSA-6g7g-w4f8-9c9x

<12.2.7-r1
  • L
Time-of-check Time-of-use (TOCTOU)

*
  • L
Cross-site Scripting (XSS)

<12.2.7-r0
  • L
Directory Traversal

<12.2.7-r0
  • L
Improper Certificate Validation

<12.2.7-r0
  • L
Direct Request ('Forced Browsing')

<12.2.7-r0
  • L
Improper Certificate Validation

<12.2.7-r0
  • L
Untrusted Search Path

<12.2.6-r3
  • C
CVE-2026-1229

<12.2.6-r1
  • L
Information Exposure

<12.2.4-r0
  • M
Cross-site Scripting (XSS)

<12.2.4-r0
  • L
CVE-2026-21721

<12.2.3-r0
  • L
CVE-2026-21720

<12.2.3-r0
  • L
CVE-2025-61732

<12.2.4-r2
  • C
CVE-2025-68121

<12.2.4-r2
  • H
Incorrect Authorization

<12.2.4-r2
  • L
Out-of-bounds Write

<12.2.4-r0
  • L
CVE-2025-61730

<12.2.4-r0
  • L
Allocation of Resources Without Limits or Throttling

<12.2.4-r0
  • L
CVE-2025-61731

<12.2.4-r0
  • L
Allocation of Resources Without Limits or Throttling

<12.2.4-r0
  • L
Improper Certificate Validation

<12.2.2-r2
  • L
Improper Certificate Validation

<12.2.2-r2
  • H
Improper Authorization

<12.2.4-r0
  • C
CVE-2025-41115

<12.2.2-r0
  • L
CVE-2025-47914

<12.2.2-r1
  • L
CVE-2025-58181

<12.2.2-r1
  • L
CVE-2025-47912

<12.2.1-r0
  • L
Information Exposure Through Log Files

<12.2.1-r0
  • L
Algorithmic Complexity

<12.2.1-r0
  • L
Allocation of Resources Without Limits or Throttling

<12.2.1-r0
  • L
CVE-2025-61725

<12.2.1-r0
  • L
CVE-2025-58183

<12.2.1-r0
  • L
CVE-2025-58186

<12.2.1-r0
  • L
Allocation of Resources Without Limits or Throttling

<12.2.1-r0
  • L
Allocation of Resources Without Limits or Throttling

<12.2.1-r0
  • L
Improper Certificate Validation

<12.2.1-r0