kibana vulnerabilities

Kibana is an open source (Apache Licensed), browser based analytics and search dashboard for Elasticsearch. Kibana is a snap to setup and start using. Kibana strives to be easy to get started with, while also being flexible and powerful, just like Elastic
Licenses: Apache-2.0

Package Health Score

29/100
  • securitySecurity issues found
  • popularitySmall
  • maintenanceInactive
  • communitySustainable

Maintenance

INACTIVE
DEPRECATED

Commit Frequency

No commits over the last 6 months

Open Issues
9091
Open PR
1129
New PRS
0
Last Release
8 years ago
Last Commit
1 years ago
Maintainers
1

Further analysis of the maintenance status of kibana based on released npm versions cadence, the repository activity, and other data points determined that its maintenance is Inactive.

An important project maintenance signal to consider for kibana is that it hasn't seen any new versions released to npm in the past 12 months, and could be considered as a discontinued project, or that which receives low attention from its maintainers.

In the past month we didn't find any pull request activity or change in issues status has been detected for the GitHub repository.

Popularity

SMALL
Weekly downloads (31)
GitHub Stars
19.1k
Forks
8.0k
Contributors
0

The npm package kibana receives a total of 31 downloads a week. As such, we scored kibana popularity level to be Small.

Based on project statistics from the GitHub repository for the npm package kibana, we found that it has been starred 19,119 times.

Downloads are calculated as moving averages for a period of the last 12 months, excluding weekends and known missing data points.

Community

SUSTAINABLE
Readme.md
Yes
Contributing.md
Yes
Code of Conduct
Yes
Contributors
0
Funding
No
LICENSE
Apache-2.0

This project has seen only 10 or less contributors.

License

Direct Vulnerabilities

Known vulnerabilities in the kibana package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free

Security

SECURITY ISSUES FOUND
Show only direct vulnerabilities in latest version
VulnerabilityVulnerable Version
  • M
Open Redirect

<7.17.29>=8.0.0 <8.17.8>=8.18.0 <8.18.3>=9.0.0 <9.0.3
  • M
Cross-site Scripting (XSS)

<8.18.8>=8.19.0 <8.19.5>=9.0.0 <9.0.8>=9.1.0 <9.1.5
  • M
Insufficiently Protected Credentials

<8.1.0>=8.14.0 <8.18.8>=8.19.0 <8.19.5>=9.0.0 <9.0.8>=9.1.0 <9.1.5
  • H
Missing Authorization

<8.12.1
  • H
Allocation of Resources Without Limits or Throttling

<7.17.23>=8.0.0 <8.15.0
  • H
Allocation of Resources Without Limits or Throttling

<7.17.23>=8.0.0 <8.15.0
  • H
Allocation of Resources Without Limits or Throttling

<7.17.23>=8.0.0 <8.14.2
  • M
Allocation of Resources Without Limits or Throttling

<7.17.22>=8.0.0-alpha1 <8.14.0
  • M
URL Redirection to Untrusted Site ('Open Redirect')

<7.17.22>=8.0.0-alpha1 <8.14.0
  • M
Open Redirect

<6.8.16>=7.0.0 <7.13.0
  • M
Prototype Pollution

<6.8.9<7.7.0
  • C
Cross-site Scripting (XSS)

<6.8.10>=7.7.0 <7.7.1
  • M
Arbitrary Command Execution

<5.3.13>=6.4.0 <6.4.3
  • M
Cross-site Scripting (XSS)

>=5.1.1 <5.6.6>=6.0.0 <6.1.2
  • H
Denial of Service (DoS)

>=5.0.0 <5.2.1
  • M
Cross-site Scripting (XSS)

<5.4.1
  • M
Open Redirect

>=5.1.1 <5.6.7>=6.0.0 <6.1.3
  • M
Cross-site Scripting (XSS)

>=5.1.1 <5.6.7>=6.0.0 <6.1.3
  • M
Cross-site Scripting (XSS)

<5.6.5>=6 <6.0.1
  • M
Open Redirect

<5.6.5>=6 <6.0.1
  • M
Open Redirect

<5.3.1
  • H
Denial of Service (DoS)

<5.2.1
  • M
Information Exposure

<5.4.3
  • M
Cross-site Scripting (XSS)

<5.6.1

Package versions

1 VERSIONS IN TOTAL
versionpublisheddirect vulnerabilities
5.1.16 Jun, 2017
  • 1
    C
  • 6
    H
  • 17
    M
  • 0
    L