The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Authorization Bypass Through User-Controlled Key vulnerabilities in an interactive lesson.
Start learningUpgrade github.com/grafana/grafana/pkg/api
to version 9.5.18, 10.0.13, 10.1.9, 10.2.6, 10.3.5 or higher.
github.com/grafana/grafana/pkg/api is an open and composable observability and data visualization platform.
Affected versions of this package are vulnerable to Authorization Bypass Through User-Controlled Key due to improper authorization checks in the snapshot deletion process. An attacker can bypass authorization and delete a snapshot by sending a DELETE
request to /api/snapshots/<key>
with its view key, even if they do not have the required permissions. This issue arises from a flaw in the authorization logic, where deletion requests from an unprivileged user in a different organization than the snapshot owner are incorrectly authorized.