servicemesh-grafana vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the servicemesh-grafana package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Resource Exhaustion

*
  • M
Missing Release of Resource after Effective Lifetime

*
  • M
Missing Release of Resource after Effective Lifetime

*
  • L
Insufficient Entropy

*
  • L
Insufficient Entropy

*
  • M
Buffer Overflow

*
  • M
Buffer Overflow

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Resource Exhaustion

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Direct Request ('Forced Browsing')

*
  • M
Direct Request ('Forced Browsing')

*
  • M
Cleartext Storage of Sensitive Information

*
  • M
Cleartext Storage of Sensitive Information

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • H
Exposure of Private Information ('Privacy Violation')

*
  • L
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • H
Improper Input Validation

*
  • M
Resource Exhaustion

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Improperly Controlled Modification of Dynamically-Determined Object Attributes

*
  • L
Improperly Controlled Modification of Dynamically-Determined Object Attributes

*
  • M
Improper Input Validation

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • H
Improperly Controlled Modification of Dynamically-Determined Object Attributes

*
  • H
Improperly Controlled Modification of Dynamically-Determined Object Attributes

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Improper Input Validation

*
  • M
Directory Traversal

*
  • M
Improper Input Validation

*
  • M
Resource Exhaustion

*
  • M
Directory Traversal

*
  • M
Unchecked Return Value

*
  • M
Unchecked Return Value

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Open Redirect

*
  • M
Resource Exhaustion

*
  • M
Open Redirect

*
  • M
Open Redirect

*
  • M
Improper Certificate Validation

*
  • M
Improper Certificate Validation

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • L
Directory Traversal

*
  • L
Directory Traversal

*
  • H
Improperly Controlled Modification of Dynamically-Determined Object Attributes

*
  • M
Improperly Controlled Modification of Dynamically-Determined Object Attributes

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Resource Exhaustion

*
  • H
Improper Validation of Array Index

*
  • C
Misinterpretation of Input

*
  • L
Misinterpretation of Input

*
  • L
Modification of Assumed-Immutable Data (MAID)

*
  • L
Modification of Assumed-Immutable Data (MAID)

*
  • L
Integer Overflow or Wraparound

*
  • L
Directory Traversal

*
  • L
Directory Traversal

*
  • M
OS Command Injection

*
  • M
Arbitrary Code Injection

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Arbitrary Code Injection

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Race Condition

*
  • M
Improper Input Validation

*
  • M
Resource Exhaustion

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Cross-site Scripting (XSS)

*
  • L
Cross-site Scripting (XSS)

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • L
Information Exposure

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Cross-site Scripting (XSS)

*
  • L
Cross-site Scripting (XSS)

*
  • H
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • M
Open Redirect

*
  • M
Open Redirect

*
  • M
Overly Restrictive Regular Expression

*
  • M
Overly Restrictive Regular Expression

*
  • M
Overly Restrictive Regular Expression

*
  • M
Overly Restrictive Regular Expression

*
  • M
Improper Check for Dropped Privileges

*
  • M
Improper Check for Dropped Privileges

*
  • M
Uncontrolled Recursion

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • H
Time-of-check Time-of-use (TOCTOU)

*
  • H
Time-of-check Time-of-use (TOCTOU)

*
  • M
Insufficient Granularity of Access Control

*
  • M
Insufficient Granularity of Access Control

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Resource Exhaustion

*
  • M
Improper Handling of Insufficient Permissions or Privileges

*
  • M
External Control of Assumed-Immutable Web Parameter

*
  • M
External Control of Assumed-Immutable Web Parameter

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Cross-site Scripting (XSS)

*
  • M
Incorrect Implementation of Authentication Algorithm

*
  • M
Incorrect Implementation of Authentication Algorithm

*
  • M
Cross-site Scripting (XSS)

*
  • M
Directory Traversal

*
  • M
Resource Exhaustion

*
  • M
Missing Authorization

*
  • M
NULL Pointer Dereference

*
  • M
Open Redirect

*
  • M
Improper Verification of Cryptographic Signature

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Cross-site Scripting (XSS)

*
  • M
Resource Exhaustion

*
  • M
Improper Input Validation

*
  • M
Cross-site Scripting (XSS)

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
Buffer Overflow

*
  • M
Resource Exhaustion

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • H
Authorization Bypass Through User-Controlled Key

*
  • M
Authorization Bypass Through User-Controlled Key

*
  • M
Authorization Bypass Through User-Controlled Key

*
  • M
Authorization Bypass Through User-Controlled Key

*
  • H
Authorization Bypass Through User-Controlled Key

*
  • H
Authorization Bypass Through User-Controlled Key

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • H
Authorization Bypass Through User-Controlled Key

*
  • H
Authorization Bypass Through User-Controlled Key

*
  • H
Improper Authentication

*
  • H
Improper Authentication

*
  • M
Authentication Bypass

*
  • M
Authentication Bypass

*
  • H
Cross-site Scripting (XSS)

*
  • H
Cross-site Scripting (XSS)

*
  • M
Missing Synchronization

*
  • H
Cross-site Scripting (XSS)

*
  • M
Improper Access Control

*
  • M
Cross-site Scripting (XSS)

*
  • M
Information Exposure

*
  • M
Incorrect Calculation

*
  • M
Incorrect Calculation

*
  • M
Authentication Bypass by Primary Weakness

*
  • M
Authentication Bypass

*