grafana vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the grafana package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Use of Uninitialized Variable

<0:9.2.10-20.el8_10
  • H
Cross-site Scripting (XSS)

<0:9.2.10-20.el8_10
  • M
CVE-2024-24791

<0:9.2.10-18.el8_10
  • H
CVE-2024-1313

<0:9.2.10-16.el8_10
  • H
Memory Leak

<0:9.2.10-16.el8_10
  • M
Allocation of Resources Without Limits or Throttling

<0:7.5.15-5.el8_8
  • M
CVE-2023-44487

<0:7.5.15-5.el8_8
  • M
Misinterpretation of Input

<0:7.3.6-2.el8
  • M
Cross-site Scripting (XSS)

<0:7.3.6-2.el8
  • H
Improper Authentication

<0:7.3.6-3.el8_4
  • M
Improper Certificate Validation

<0:7.5.9-4.el8
  • M
Missing Authorization

<0:7.5.9-4.el8
  • M
Arbitrary Code Injection

<0:7.5.9-4.el8
  • M
Incorrect Calculation

<0:7.5.9-4.el8
  • M
CVE-2021-27358

<0:7.5.9-4.el8
  • H
Resource Exhaustion

<0:7.5.9-5.el8_5
  • M
Allocation of Resources Without Limits or Throttling

<0:7.5.15-3.el8
  • L
Directory Traversal

<0:7.5.11-2.el8
  • M
CVE-2022-32148

<0:7.5.15-3.el8
  • M
Uncontrolled Recursion

<0:7.5.15-3.el8
  • M
Uncontrolled Recursion

<0:7.5.15-3.el8
  • M
Uncontrolled Recursion

<0:7.5.15-3.el8
  • M
Uncontrolled Recursion

<0:7.5.15-3.el8
  • M
Uncontrolled Recursion

<0:7.5.15-3.el8
  • M
Uncontrolled Recursion

<0:7.5.15-3.el8
  • M
Uncontrolled Recursion

<0:7.5.15-3.el8
  • M
HTTP Request Smuggling

<0:7.5.15-3.el8
  • H
Incorrect Authorization

<0:7.5.11-3.el8_6
  • M
Authorization Bypass Through User-Controlled Key

<0:7.5.15-3.el8
  • M
Cross-site Request Forgery (CSRF)

<0:7.5.15-3.el8
  • M
Cross-site Scripting (XSS)

<0:7.5.15-3.el8
  • M
CVE-2022-21673

<0:7.5.15-3.el8
  • M
Cross-site Scripting (XSS)

<0:7.5.15-3.el8