grafana vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the grafana package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
CVE-2024-24789

<0:10.2.6-4.el9
  • M
CVE-2024-24791

<0:10.2.6-4.el9
  • M
Information Exposure Through Log Files

<0:10.2.6-4.el9
  • M
CVE-2024-24790

<0:10.2.6-4.el9
  • M
CVE-2024-24788

<0:10.2.6-4.el9
  • H
Use of Uninitialized Variable

<0:9.2.10-19.el9_4
  • H
Cross-site Scripting (XSS)

<0:10.2.6-7.el9_5
  • H
CVE-2024-34156

<0:10.2.6-7.el9_5
  • M
CVE-2024-1313

<0:9.2.10-16.el9_4
  • M
Memory Leak

<0:9.2.10-16.el9_4
  • M
Cross-site Scripting (XSS)

<0:9.2.10-7.el9_3
  • M
Improper Input Validation

<0:9.2.10-7.el9_3
  • M
Allocation of Resources Without Limits or Throttling

<0:9.2.10-7.el9_3
  • M
Resource Exhaustion

<0:9.2.10-7.el9_3
  • M
Cross-site Scripting (XSS)

<0:9.2.10-7.el9_3
  • M
Information Exposure

<0:9.2.10-7.el9_3
  • M
CVE-2022-39201

<0:9.2.10-7.el9_3
  • M
Insufficiently Protected Credentials

<0:9.2.10-7.el9_3
  • M
Improper Verification of Cryptographic Signature

<0:9.2.10-7.el9_3
  • M
Allocation of Resources Without Limits or Throttling

<0:9.0.9-4.el9_2
  • M
CVE-2023-44487

<0:9.0.9-4.el9_2
  • C
Authentication Bypass

<0:9.0.9-3.el9_2
  • M
Improper Authentication

<0:9.0.9-2.el9
  • M
Authentication Bypass

<0:9.0.9-2.el9
  • M
HTTP Request Smuggling

<0:9.0.9-2.el9
  • M
CVE-2022-41715

<0:9.0.9-2.el9
  • H
Authorization Bypass Through User-Controlled Key

<0:7.5.15-3.el9
  • H
Cross-site Scripting (XSS)

<0:7.5.15-3.el9
  • H
Cross-site Scripting (XSS)

<0:7.5.15-3.el9
  • H
CVE-2022-21673

<0:7.5.15-3.el9
  • H
Cross-site Request Forgery (CSRF)

<0:7.5.15-3.el9
  • M
CVE-2022-27664

<0:9.0.9-2.el9
  • H
Uncontrolled Recursion

<0:7.5.15-3.el9
  • H
Uncontrolled Recursion

<0:7.5.15-3.el9
  • H
CVE-2022-32148

<0:7.5.15-3.el9
  • H
Uncontrolled Recursion

<0:7.5.15-3.el9
  • H
Uncontrolled Recursion

<0:7.5.15-3.el9
  • H
HTTP Request Smuggling

<0:7.5.15-3.el9
  • H
Uncontrolled Recursion

<0:7.5.15-3.el9
  • H
Uncontrolled Recursion

<0:7.5.15-3.el9
  • H
Uncontrolled Recursion

<0:7.5.15-3.el9
  • H
Incorrect Authorization

<0:7.5.11-5.el9_0
  • H
Allocation of Resources Without Limits or Throttling

<0:7.5.15-3.el9