Логотип exploitDog
product: "grafana"
Консоль
Логотип exploitDog

exploitDog

product: "grafana"

Количество 383

Количество 383

fstec логотип

BDU:2023-03204

около 2 лет назад

Уязвимость веб-инструмента представления данных Grafana, связанная с ошибками синхронизации, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2022-03373

около 3 лет назад

Уязвимость веб-инструмента представления данных Grafana, связанная с возможностью обхода процедуры аутентификации, позволяющая нарушителю повысить свои привилегии путем отправки специально сформированного HTTP-запроса

CVSS3: 9.8
EPSS: Средний
rocky логотип

RLSA-2022:5717

около 3 лет назад

Important: grafana security update

EPSS: Низкий
github логотип

GHSA-xr3x-62qw-vc4w

около 3 лет назад

Grafana stored XSS

CVSS3: 5.4
EPSS: Средний
github логотип

GHSA-xc3p-28hw-q24g

около 1 года назад

Grafana proxy Cross-site Scripting

CVSS3: 6.8
EPSS: Низкий
github логотип

GHSA-vw7q-p2qg-4m5f

около 1 года назад

Grafana Stored Cross-site Scripting in Unified Alerting

CVSS3: 7.3
EPSS: Средний
github логотип

GHSA-rhxj-gh46-jvw8

около 1 года назад

Grafana Plugin signature bypass

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-rgjg-66cx-5x9m

больше 3 лет назад

Grafana Authentication Bypass

CVSS3: 9.8
EPSS: Высокий
github логотип

GHSA-mx47-6497-3fv2

около 1 года назад

Grafana account takeover via OAuth vulnerability

CVSS3: 7.1
EPSS: Низкий
github логотип

GHSA-h5rh-w6vm-9ghc

больше 3 лет назад

Denial of service in Grafana

CVSS3: 8.2
EPSS: Высокий
github логотип

GHSA-cmf4-h3xc-jw8w

больше 1 года назад

Grafana Cross Site Request Forgery (CSRF)

CVSS3: 6.8
EPSS: Низкий
github логотип

GHSA-63g3-9jq3-mccv

около 1 года назад

Grafana API IDOR

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-3jq7-8ph8-63xm

около 3 лет назад

Grafana information disclosure

CVSS3: 5.5
EPSS: Низкий
ubuntu логотип

CVE-2022-31123

почти 3 года назад

Grafana is an open source observability and data visualization platform. Versions prior to 9.1.8 and 8.5.14 are vulnerable to a bypass in the plugin signature verification. An attacker can convince a server admin to download and successfully run a malicious plugin even though unsigned plugins are not allowed. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not install plugins downloaded from untrusted sources.

CVSS3: 6.1
EPSS: Низкий
redhat логотип

CVE-2022-31123

почти 3 года назад

Grafana is an open source observability and data visualization platform. Versions prior to 9.1.8 and 8.5.14 are vulnerable to a bypass in the plugin signature verification. An attacker can convince a server admin to download and successfully run a malicious plugin even though unsigned plugins are not allowed. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not install plugins downloaded from untrusted sources.

CVSS3: 6.1
EPSS: Низкий
nvd логотип

CVE-2022-31123

почти 3 года назад

Grafana is an open source observability and data visualization platform. Versions prior to 9.1.8 and 8.5.14 are vulnerable to a bypass in the plugin signature verification. An attacker can convince a server admin to download and successfully run a malicious plugin even though unsigned plugins are not allowed. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not install plugins downloaded from untrusted sources.

CVSS3: 6.1
EPSS: Низкий
debian логотип

CVE-2022-31123

почти 3 года назад

Grafana is an open source observability and data visualization platfor ...

CVSS3: 6.1
EPSS: Низкий
ubuntu логотип

CVE-2022-31107

около 3 лет назад

Grafana is an open-source platform for monitoring and observability. In versions 5.3 until 9.0.3, 8.5.9, 8.4.10, and 8.3.10, it is possible for a malicious user who has authorization to log into a Grafana instance via a configured OAuth IdP which provides a login name to take over the account of another user in that Grafana instance. This can occur when the malicious user is authorized to log in to Grafana via OAuth, the malicious user's external user id is not already associated with an account in Grafana, the malicious user's email address is not already associated with an account in Grafana, and the malicious user knows the Grafana username of the target user. If these conditions are met, the malicious user can set their username in the OAuth provider to that of the target user, then go through the OAuth flow to log in to Grafana. Due to the way that external and internal user accounts are linked together during login, if the conditions above are all met then the malicious user w...

CVSS3: 7.1
EPSS: Низкий
redhat логотип

CVE-2022-31107

около 3 лет назад

Grafana is an open-source platform for monitoring and observability. In versions 5.3 until 9.0.3, 8.5.9, 8.4.10, and 8.3.10, it is possible for a malicious user who has authorization to log into a Grafana instance via a configured OAuth IdP which provides a login name to take over the account of another user in that Grafana instance. This can occur when the malicious user is authorized to log in to Grafana via OAuth, the malicious user's external user id is not already associated with an account in Grafana, the malicious user's email address is not already associated with an account in Grafana, and the malicious user knows the Grafana username of the target user. If these conditions are met, the malicious user can set their username in the OAuth provider to that of the target user, then go through the OAuth flow to log in to Grafana. Due to the way that external and internal user accounts are linked together during login, if the conditions above are all met then the malicious user w...

CVSS3: 7.1
EPSS: Низкий
nvd логотип

CVE-2022-31107

около 3 лет назад

Grafana is an open-source platform for monitoring and observability. In versions 5.3 until 9.0.3, 8.5.9, 8.4.10, and 8.3.10, it is possible for a malicious user who has authorization to log into a Grafana instance via a configured OAuth IdP which provides a login name to take over the account of another user in that Grafana instance. This can occur when the malicious user is authorized to log in to Grafana via OAuth, the malicious user's external user id is not already associated with an account in Grafana, the malicious user's email address is not already associated with an account in Grafana, and the malicious user knows the Grafana username of the target user. If these conditions are met, the malicious user can set their username in the OAuth provider to that of the target user, then go through the OAuth flow to log in to Grafana. Due to the way that external and internal user accounts are linked together during login, if the conditions above are all met then the malicious user will

CVSS3: 7.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2023-03204

Уязвимость веб-инструмента представления данных Grafana, связанная с ошибками синхронизации, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
1%
Низкий
около 2 лет назад
fstec логотип
BDU:2022-03373

Уязвимость веб-инструмента представления данных Grafana, связанная с возможностью обхода процедуры аутентификации, позволяющая нарушителю повысить свои привилегии путем отправки специально сформированного HTTP-запроса

CVSS3: 9.8
28%
Средний
около 3 лет назад
rocky логотип
RLSA-2022:5717

Important: grafana security update

0%
Низкий
около 3 лет назад
github логотип
GHSA-xr3x-62qw-vc4w

Grafana stored XSS

CVSS3: 5.4
64%
Средний
около 3 лет назад
github логотип
GHSA-xc3p-28hw-q24g

Grafana proxy Cross-site Scripting

CVSS3: 6.8
1%
Низкий
около 1 года назад
github логотип
GHSA-vw7q-p2qg-4m5f

Grafana Stored Cross-site Scripting in Unified Alerting

CVSS3: 7.3
51%
Средний
около 1 года назад
github логотип
GHSA-rhxj-gh46-jvw8

Grafana Plugin signature bypass

CVSS3: 6.1
0%
Низкий
около 1 года назад
github логотип
GHSA-rgjg-66cx-5x9m

Grafana Authentication Bypass

CVSS3: 9.8
75%
Высокий
больше 3 лет назад
github логотип
GHSA-mx47-6497-3fv2

Grafana account takeover via OAuth vulnerability

CVSS3: 7.1
0%
Низкий
около 1 года назад
github логотип
GHSA-h5rh-w6vm-9ghc

Denial of service in Grafana

CVSS3: 8.2
75%
Высокий
больше 3 лет назад
github логотип
GHSA-cmf4-h3xc-jw8w

Grafana Cross Site Request Forgery (CSRF)

CVSS3: 6.8
2%
Низкий
больше 1 года назад
github логотип
GHSA-63g3-9jq3-mccv

Grafana API IDOR

CVSS3: 4.3
0%
Низкий
около 1 года назад
github логотип
GHSA-3jq7-8ph8-63xm

Grafana information disclosure

CVSS3: 5.5
0%
Низкий
около 3 лет назад
ubuntu логотип
CVE-2022-31123

Grafana is an open source observability and data visualization platform. Versions prior to 9.1.8 and 8.5.14 are vulnerable to a bypass in the plugin signature verification. An attacker can convince a server admin to download and successfully run a malicious plugin even though unsigned plugins are not allowed. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not install plugins downloaded from untrusted sources.

CVSS3: 6.1
0%
Низкий
почти 3 года назад
redhat логотип
CVE-2022-31123

Grafana is an open source observability and data visualization platform. Versions prior to 9.1.8 and 8.5.14 are vulnerable to a bypass in the plugin signature verification. An attacker can convince a server admin to download and successfully run a malicious plugin even though unsigned plugins are not allowed. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not install plugins downloaded from untrusted sources.

CVSS3: 6.1
0%
Низкий
почти 3 года назад
nvd логотип
CVE-2022-31123

Grafana is an open source observability and data visualization platform. Versions prior to 9.1.8 and 8.5.14 are vulnerable to a bypass in the plugin signature verification. An attacker can convince a server admin to download and successfully run a malicious plugin even though unsigned plugins are not allowed. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not install plugins downloaded from untrusted sources.

CVSS3: 6.1
0%
Низкий
почти 3 года назад
debian логотип
CVE-2022-31123

Grafana is an open source observability and data visualization platfor ...

CVSS3: 6.1
0%
Низкий
почти 3 года назад
ubuntu логотип
CVE-2022-31107

Grafana is an open-source platform for monitoring and observability. In versions 5.3 until 9.0.3, 8.5.9, 8.4.10, and 8.3.10, it is possible for a malicious user who has authorization to log into a Grafana instance via a configured OAuth IdP which provides a login name to take over the account of another user in that Grafana instance. This can occur when the malicious user is authorized to log in to Grafana via OAuth, the malicious user's external user id is not already associated with an account in Grafana, the malicious user's email address is not already associated with an account in Grafana, and the malicious user knows the Grafana username of the target user. If these conditions are met, the malicious user can set their username in the OAuth provider to that of the target user, then go through the OAuth flow to log in to Grafana. Due to the way that external and internal user accounts are linked together during login, if the conditions above are all met then the malicious user w...

CVSS3: 7.1
0%
Низкий
около 3 лет назад
redhat логотип
CVE-2022-31107

Grafana is an open-source platform for monitoring and observability. In versions 5.3 until 9.0.3, 8.5.9, 8.4.10, and 8.3.10, it is possible for a malicious user who has authorization to log into a Grafana instance via a configured OAuth IdP which provides a login name to take over the account of another user in that Grafana instance. This can occur when the malicious user is authorized to log in to Grafana via OAuth, the malicious user's external user id is not already associated with an account in Grafana, the malicious user's email address is not already associated with an account in Grafana, and the malicious user knows the Grafana username of the target user. If these conditions are met, the malicious user can set their username in the OAuth provider to that of the target user, then go through the OAuth flow to log in to Grafana. Due to the way that external and internal user accounts are linked together during login, if the conditions above are all met then the malicious user w...

CVSS3: 7.1
0%
Низкий
около 3 лет назад
nvd логотип
CVE-2022-31107

Grafana is an open-source platform for monitoring and observability. In versions 5.3 until 9.0.3, 8.5.9, 8.4.10, and 8.3.10, it is possible for a malicious user who has authorization to log into a Grafana instance via a configured OAuth IdP which provides a login name to take over the account of another user in that Grafana instance. This can occur when the malicious user is authorized to log in to Grafana via OAuth, the malicious user's external user id is not already associated with an account in Grafana, the malicious user's email address is not already associated with an account in Grafana, and the malicious user knows the Grafana username of the target user. If these conditions are met, the malicious user can set their username in the OAuth provider to that of the target user, then go through the OAuth flow to log in to Grafana. Due to the way that external and internal user accounts are linked together during login, if the conditions above are all met then the malicious user will

CVSS3: 7.1
0%
Низкий
около 3 лет назад

Уязвимостей на страницу