kibana-9.3-advanced

Direct Vulnerabilities

Known vulnerabilities in the kibana-9.3-advanced package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • L
Improper Handling of Unicode Encoding

*
  • L
Improper Input Validation

*
  • L
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • H
Arbitrary Code Injection

*
  • L
CVE-2026-44902

*
  • L
Improper Validation of Specified Quantity in Input

*
  • L
CVE-2026-45134

*
  • L
Information Exposure Through Caching

*
  • L
XML Injection

*
  • L
CVE-2026-44724

*
  • L
Arbitrary Code Injection

*
  • L
CVE-2026-6321

*
  • L
CVE-2026-6322

*
  • L
Uncontrolled Recursion

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • M
Arbitrary Code Injection

*
  • L
Arbitrary Code Injection

*
  • M
Improper Authentication

*
  • C
Permissive Whitelist

*
  • H
Uncontrolled Recursion

*
  • L
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • L
CRLF Injection

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • M
Cross-site Scripting (XSS)

*
  • L
Improper Encoding or Escaping of Output

*
  • H
Server-Side Request Forgery (SSRF)

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • C
Improperly Controlled Modification of Dynamically-Determined Object Attributes

*
  • C
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • L
HTTP Response Splitting

*
  • L
Uncontrolled Recursion

*
  • L
GHSA-v8w9-8mx6-g223

<9.3.4-r0
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<9.3.4-r0
  • H
Resource Exhaustion

<9.3.4-r0
  • M
Cross-site Scripting (XSS)

*
  • L
Improper Verification of Cryptographic Signature

<9.3.4-r0
  • L
Improper Input Validation

<9.3.4-r0
  • L
GHSA-c7w3-x93f-qmm8

*
  • L
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<9.3.4-r0
  • C
Improper Certificate Validation

<9.3.4-r0
  • L
Inefficient Regular Expression Complexity

<9.3.4-r0
  • L
GHSA-7rx3-28cr-v5wh

<9.3.4-r0
  • H
Cross-site Scripting (XSS)

<9.3.4-r0
  • L
Arbitrary Code Injection

<9.3.4-r0
  • L
Improper Check for Unusual or Exceptional Conditions

<9.3.4-r0
  • L
GHSA-442j-39wm-28r2

<9.3.4-r0
  • L
Arbitrary Code Injection

<9.3.4-r0
  • L
Arbitrary Code Injection

<9.3.4-r0
  • L
CVE-2026-4923

<9.3.4-r0
  • L
CVE-2026-4926

<9.3.4-r0
  • L
Directory Traversal

<9.3.4-r0
  • M
CVE-2026-2950

*
  • L
Improper Input Validation

<9.3.4-r0
  • L
GHSA-26pp-8wgv-hjvm

<9.3.4-r0
  • M
Directory Traversal

<9.3.4-r0
  • H
CVE-2026-39412

<9.3.4-r0
  • L
CRLF Injection

<9.3.4-r0
  • H
Inefficient Regular Expression Complexity

<9.3.4-r0
  • H
Symlink Following

<9.3.4-r0
  • L
Directory Traversal

<9.3.4-r0
  • M
Resource Exhaustion

<9.3.4-r0
  • H
Directory Traversal

<9.3.4-r0
  • M
Incorrect Behavior Order: Validate Before Canonicalize

<9.3.4-r0
  • L
GHSA-vvjj-xcjg-gr5g

*
  • C
CVE-2026-4800

*
  • L
GHSA-458j-xx4x-4375

<9.3.4-r0
  • L
Resource Exhaustion

*
  • L
GHSA-r4q5-vmmm-2653

*
  • L
GHSA-6v7q-wjvx-w8wg

*
  • L
Information Exposure

*
  • C
Arbitrary Code Injection

*
  • L
GHSA-39q2-94rc-95cp

*
  • M
HTTP Response Splitting

<9.3.4-r0
  • L
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • C
Unintended Proxy or Intermediary ('Confused Deputy')

<9.3.4-r0
  • L
Cross-site Scripting (XSS)

*
  • L
XML Injection

*
  • L
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • L
GHSA-w5hq-g745-h8pq

*
  • M
Uncontrolled Recursion

*
  • H
CVE-2026-33458

<9.3.3-r0
  • L
CVE-2026-33459

<9.3.3-r0
  • L
CVE-2026-33460

<9.3.3-r0
  • M
CVE-2026-33461

<9.3.3-r0
  • L
CVE-2026-4498

<9.3.3-r0
  • L
Improper Input Validation

<9.3.3-r0
  • L
Improper Input Validation

<9.3.3-r0
  • L
Resource Exhaustion

<9.3.2-r1
  • L
Improper Validation of Specified Quantity in Input

<9.3.3-r0
  • L
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

<9.3.3-r0
  • L
GHSA-cj63-jhhr-wcxv

<9.3.2-r1
  • L
GHSA-cjmm-f4jc-qw8r

<9.3.2-r1
  • L
GHSA-h8r8-wccr-v5f2

<9.3.2-r1
  • M
CVE-2026-26940

<9.3.2-r1
  • L
CVE-2026-26939

<9.3.1-r0
  • M
Off-by-one Error

<9.3.2-r1
  • L
CVE-2026-3449

*
  • L
Incorrect Authorization

<9.3.2-r1
  • C
CVE-2026-1525

*
  • H
Directory Traversal

<9.3.3-r0
  • L
CVE-2026-1526

*
  • L
CVE-2026-2581

*
  • M
Cross-site Scripting (XSS)

<9.3.2-r1
  • M
Directory Traversal

<9.3.2-r1
  • L
CVE-2026-1527

*
  • L
CVE-2026-1528

*
  • L
CVE-2026-2229

*
  • M
Directory Traversal

<9.3.2-r1
  • H
CVE-2026-26938

<9.3.1-r0
  • L
Inefficient Regular Expression Complexity

<9.3.2-r1
  • H
CVE-2026-26935

<9.3.1-r0
  • L
Algorithmic Complexity

<9.3.2-r1
  • H
Buffer Overflow

<9.3.3-r0
  • L
CVE-2026-26934

<9.3.1-r0
  • C
Directory Traversal

<9.3.2-r1
  • L
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

<9.3.1-r0
  • H
Directory Traversal

<9.3.1-r0
  • L
Incorrect Regular Expression

<9.3.1-r0
  • L
Inefficient Regular Expression Complexity

<9.3.2-r1
  • H
OS Command Injection

*
  • H
Inefficient Regular Expression Complexity

<9.3.2-r1
  • L
OS Command Injection

*
  • H
CVE-2026-2391

<9.3.2-r1
  • L
CVE-2026-2739

*
  • H
CVE-2026-2327

<9.3.2-r1
  • L
Improper Check for Unusual or Exceptional Conditions

<9.3.2-r1
  • L
Race Condition

<9.3.2-r1
  • L
GHSA-6475-r3vj-m8vf

<9.3.1-r0
  • M
CVE-2025-13465

<9.3.1-r0
  • L
Improper Input Validation

<9.3.1-r0
  • L
CVE-2025-15284

<9.3.2-r1
  • L
Server-Side Request Forgery (SSRF)

<9.3.4-r0
  • L
OS Command Injection

<9.3.3-r0
  • L
Directory Traversal

<9.3.1-r0
  • M
Cross-site Scripting (XSS)

*
  • C
Deserialization of Untrusted Data

<9.3.4-r0