Логотип exploitDog
bind:"CVE-2024-1394" OR bind:"CVE-2024-1313"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2024-1394" OR bind:"CVE-2024-1313"

Количество 45

Количество 45

rocky логотип

RLSA-2024:3265

почти 2 года назад

Important: grafana security update

EPSS: Низкий
rocky логотип

RLSA-2024:2568

почти 2 года назад

Moderate: grafana security update

EPSS: Низкий
oracle-oval логотип

ELSA-2024-3265

почти 2 года назад

ELSA-2024-3265: grafana security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-2568

почти 2 года назад

ELSA-2024-2568: grafana security update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2024-1313

около 2 лет назад

It is possible for a user in a different organization from the owner of a snapshot to bypass authorization and delete a snapshot by issuing a DELETE request to /api/snapshots/<key> using its view key. This functionality is intended to only be available to individuals with the permission to write/edit to the snapshot in question, but due to a bug in the authorization logic, deletion requests issued by an unprivileged user in a different organization than the snapshot owner are treated as authorized. Grafana Labs would like to thank Ravid Mazon and Jay Chen of Palo Alto Research for discovering and disclosing this vulnerability. This issue affects Grafana: from 9.5.0 before 9.5.18, from 10.0.0 before 10.0.13, from 10.1.0 before 10.1.9, from 10.2.0 before 10.2.6, from 10.3.0 before 10.3.5.

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2024-1313

около 2 лет назад

It is possible for a user in a different organization from the owner of a snapshot to bypass authorization and delete a snapshot by issuing a DELETE request to /api/snapshots/<key> using its view key. This functionality is intended to only be available to individuals with the permission to write/edit to the snapshot in question, but due to a bug in the authorization logic, deletion requests issued by an unprivileged user in a different organization than the snapshot owner are treated as authorized. Grafana Labs would like to thank Ravid Mazon and Jay Chen of Palo Alto Research for discovering and disclosing this vulnerability. This issue affects Grafana: from 9.5.0 before 9.5.18, from 10.0.0 before 10.0.13, from 10.1.0 before 10.1.9, from 10.2.0 before 10.2.6, from 10.3.0 before 10.3.5.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2024-1313

около 2 лет назад

It is possible for a user in a different organization from the owner of a snapshot to bypass authorization and delete a snapshot by issuing a DELETE request to /api/snapshots/<key> using its view key. This functionality is intended to only be available to individuals with the permission to write/edit to the snapshot in question, but due to a bug in the authorization logic, deletion requests issued by an unprivileged user in a different organization than the snapshot owner are treated as authorized. Grafana Labs would like to thank Ravid Mazon and Jay Chen of Palo Alto Research for discovering and disclosing this vulnerability. This issue affects Grafana: from 9.5.0 before 9.5.18, from 10.0.0 before 10.0.13, from 10.1.0 before 10.1.9, from 10.2.0 before 10.2.6, from 10.3.0 before 10.3.5.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2024-1313

около 2 лет назад

It is possible for a user in a different organization from the owner o ...

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2024-1394

около 2 лет назад

A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs​. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey​ and ctx​. That function uses named return parameters to free pkey​ and ctx​ if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the "return nil, nil, fail(...)" pattern, meaning that pkey​ and ctx​ will be nil inside the deferred function that should free them.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2024-1394

около 2 лет назад

A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs​. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey​ and ctx​. That function uses named return parameters to free pkey​ and ctx​ if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the "return nil, nil, fail(...)" pattern, meaning that pkey​ and ctx​ will be nil inside the deferred function that should free them.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-67rv-qpw2-6qrr

почти 2 года назад

Grafana: Users outside an organization can delete a snapshot with its key

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2024-04116

около 2 лет назад

Уязвимость веб-инструмента представления данных Grafana, связанная с обходом авторизации, позволяющая нарушителю обойти процесс авторизации и удалить моментальный снимок

CVSS3: 6.5
EPSS: Низкий
rocky логотип

RLSA-2024:4502

больше 1 года назад

Important: skopeo security update

EPSS: Низкий
rocky логотип

RLSA-2024:2569

почти 2 года назад

Important: grafana-pcp security update

EPSS: Низкий
rocky логотип

RLSA-2024:1646

почти 2 года назад

Important: grafana security and bug fix update

EPSS: Низкий
rocky логотип

RLSA-2024:1644

почти 2 года назад

Important: grafana-pcp security and bug fix update

EPSS: Низкий
rocky логотип

RLSA-2024:1502

почти 2 года назад

Important: grafana-pcp security update

EPSS: Низкий
rocky логотип

RLSA-2024:1472

около 2 лет назад

Important: go-toolset:rhel8 security update

EPSS: Низкий
github логотип

GHSA-78hx-gp6g-7mj6

около 2 лет назад

Memory leaks in code encrypting and verifying RSA payloads

CVSS3: 7.5
EPSS: Низкий
oracle-oval логотип

ELSA-2024-4762

больше 1 года назад

ELSA-2024-4762: runc security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
rocky логотип
RLSA-2024:3265

Important: grafana security update

почти 2 года назад
rocky логотип
RLSA-2024:2568

Moderate: grafana security update

почти 2 года назад
oracle-oval логотип
ELSA-2024-3265

ELSA-2024-3265: grafana security update (IMPORTANT)

почти 2 года назад
oracle-oval логотип
ELSA-2024-2568

ELSA-2024-2568: grafana security update (MODERATE)

почти 2 года назад
ubuntu логотип
CVE-2024-1313

It is possible for a user in a different organization from the owner of a snapshot to bypass authorization and delete a snapshot by issuing a DELETE request to /api/snapshots/<key> using its view key. This functionality is intended to only be available to individuals with the permission to write/edit to the snapshot in question, but due to a bug in the authorization logic, deletion requests issued by an unprivileged user in a different organization than the snapshot owner are treated as authorized. Grafana Labs would like to thank Ravid Mazon and Jay Chen of Palo Alto Research for discovering and disclosing this vulnerability. This issue affects Grafana: from 9.5.0 before 9.5.18, from 10.0.0 before 10.0.13, from 10.1.0 before 10.1.9, from 10.2.0 before 10.2.6, from 10.3.0 before 10.3.5.

CVSS3: 6.5
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2024-1313

It is possible for a user in a different organization from the owner of a snapshot to bypass authorization and delete a snapshot by issuing a DELETE request to /api/snapshots/<key> using its view key. This functionality is intended to only be available to individuals with the permission to write/edit to the snapshot in question, but due to a bug in the authorization logic, deletion requests issued by an unprivileged user in a different organization than the snapshot owner are treated as authorized. Grafana Labs would like to thank Ravid Mazon and Jay Chen of Palo Alto Research for discovering and disclosing this vulnerability. This issue affects Grafana: from 9.5.0 before 9.5.18, from 10.0.0 before 10.0.13, from 10.1.0 before 10.1.9, from 10.2.0 before 10.2.6, from 10.3.0 before 10.3.5.

CVSS3: 6.5
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2024-1313

It is possible for a user in a different organization from the owner of a snapshot to bypass authorization and delete a snapshot by issuing a DELETE request to /api/snapshots/<key> using its view key. This functionality is intended to only be available to individuals with the permission to write/edit to the snapshot in question, but due to a bug in the authorization logic, deletion requests issued by an unprivileged user in a different organization than the snapshot owner are treated as authorized. Grafana Labs would like to thank Ravid Mazon and Jay Chen of Palo Alto Research for discovering and disclosing this vulnerability. This issue affects Grafana: from 9.5.0 before 9.5.18, from 10.0.0 before 10.0.13, from 10.1.0 before 10.1.9, from 10.2.0 before 10.2.6, from 10.3.0 before 10.3.5.

CVSS3: 6.5
0%
Низкий
около 2 лет назад
debian логотип
CVE-2024-1313

It is possible for a user in a different organization from the owner o ...

CVSS3: 6.5
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2024-1394

A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs​. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey​ and ctx​. That function uses named return parameters to free pkey​ and ctx​ if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the "return nil, nil, fail(...)" pattern, meaning that pkey​ and ctx​ will be nil inside the deferred function that should free them.

CVSS3: 7.5
1%
Низкий
около 2 лет назад
nvd логотип
CVE-2024-1394

A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs​. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey​ and ctx​. That function uses named return parameters to free pkey​ and ctx​ if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the "return nil, nil, fail(...)" pattern, meaning that pkey​ and ctx​ will be nil inside the deferred function that should free them.

CVSS3: 7.5
1%
Низкий
около 2 лет назад
github логотип
GHSA-67rv-qpw2-6qrr

Grafana: Users outside an organization can delete a snapshot with its key

CVSS3: 6.5
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2024-04116

Уязвимость веб-инструмента представления данных Grafana, связанная с обходом авторизации, позволяющая нарушителю обойти процесс авторизации и удалить моментальный снимок

CVSS3: 6.5
0%
Низкий
около 2 лет назад
rocky логотип
RLSA-2024:4502

Important: skopeo security update

1%
Низкий
больше 1 года назад
rocky логотип
RLSA-2024:2569

Important: grafana-pcp security update

1%
Низкий
почти 2 года назад
rocky логотип
RLSA-2024:1646

Important: grafana security and bug fix update

1%
Низкий
почти 2 года назад
rocky логотип
RLSA-2024:1644

Important: grafana-pcp security and bug fix update

1%
Низкий
почти 2 года назад
rocky логотип
RLSA-2024:1502

Important: grafana-pcp security update

1%
Низкий
почти 2 года назад
rocky логотип
RLSA-2024:1472

Important: go-toolset:rhel8 security update

1%
Низкий
около 2 лет назад
github логотип
GHSA-78hx-gp6g-7mj6

Memory leaks in code encrypting and verifying RSA payloads

CVSS3: 7.5
1%
Низкий
около 2 лет назад
oracle-oval логотип
ELSA-2024-4762

ELSA-2024-4762: runc security update (IMPORTANT)

больше 1 года назад

Уязвимостей на страницу