grafana-debuginfo

Direct Vulnerabilities

Known vulnerabilities in the grafana-debuginfo package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Improper Validation of Syntactic Correctness of Input

<0:10.2.6-25.el10_2
  • H
Multiple Locks of a Critical Resource

<0:10.2.6-26.el10_2
  • M
Time-of-check Time-of-use (TOCTOU)

<0:10.2.6-26.el10_2
  • H
Information Exposure

<0:10.2.6-26.el10_2
  • M
Time-of-check Time-of-use (TOCTOU)

<0:10.2.6-24.el10_0
  • H
Multiple Locks of a Critical Resource

<0:10.2.6-24.el10_0
  • H
Allocation of Resources Without Limits or Throttling

<0:10.2.6-24.el10_0
  • H
Multiple Locks of a Critical Resource

<0:10.2.6-25.el10_1
  • M
Time-of-check Time-of-use (TOCTOU)

<0:10.2.6-25.el10_1
  • H
Information Exposure

<0:10.2.6-23.el10_0
  • H
Information Exposure

<0:10.2.6-24.el10_1
  • H
Improper Validation of Syntactic Correctness of Input

<0:10.2.6-22.el10_0
  • H
Improper Validation of Syntactic Correctness of Input

<0:10.2.6-23.el10_1
  • H
Excessive Platform Resource Consumption within a Loop

<0:10.2.6-21.el10_0
  • H
Allocation of Resources Without Limits or Throttling

<0:10.2.6-21.el10_0
  • M
Allocation of Resources Without Limits or Throttling

<0:10.2.6-21.el10_0
  • M
CVE-2025-68121

<0:10.2.6-21.el10_0
  • H
Authorization Bypass Through User-Controlled Key

<0:10.2.6-20.el10_0
  • H
Excessive Platform Resource Consumption within a Loop

<0:10.2.6-22.el10_1
  • M
CVE-2025-68121

<0:10.2.6-22.el10_1
  • M
Allocation of Resources Without Limits or Throttling

<0:10.2.6-22.el10_1
  • H
Allocation of Resources Without Limits or Throttling

<0:10.2.6-22.el10_1
  • H
Authorization Bypass Through User-Controlled Key

<0:10.2.6-22.el10_1
  • M
Allocation of Resources Without Limits or Throttling

<0:10.2.6-21.el10_1
  • M
Allocation of Resources Without Limits or Throttling

<0:10.2.6-19.el10_0
  • M
HTTP Request Smuggling

<0:10.2.6-18.el10_0
  • H
Cross-site Scripting (XSS)

<0:10.2.6-17.el10_0
  • H
Asymmetric Resource Consumption (Amplification)

<0:10.2.6-15.el10_0