Логотип exploitDog
product: "grafana"
Консоль
Логотип exploitDog

exploitDog

product: "grafana"

Количество 390

Количество 390

redhat логотип

CVE-2022-21702

больше 3 лет назад

Grafana is an open-source platform for monitoring and observability. In affected versions an attacker could serve HTML content thru the Grafana datasource or plugin proxy and trick a user to visit this HTML page using a specially crafted link and execute a Cross-site Scripting (XSS) attack. The attacker could either compromise an existing datasource for a specific Grafana instance or either set up its own public service and instruct anyone to set it up in their Grafana instance. To be impacted, all of the following must be applicable. For the data source proxy: A Grafana HTTP-based datasource configured with Server as Access Mode and a URL set, the attacker has to be in control of the HTTP server serving the URL of above datasource, and a specially crafted link pointing at the attacker controlled data source must be clicked on by an authenticated user. For the plugin proxy: A Grafana HTTP-based app plugin configured and enabled with a URL set, the attacker has to be in control of th...

CVSS3: 6.8
EPSS: Низкий
nvd логотип

CVE-2022-21702

больше 3 лет назад

Grafana is an open-source platform for monitoring and observability. In affected versions an attacker could serve HTML content thru the Grafana datasource or plugin proxy and trick a user to visit this HTML page using a specially crafted link and execute a Cross-site Scripting (XSS) attack. The attacker could either compromise an existing datasource for a specific Grafana instance or either set up its own public service and instruct anyone to set it up in their Grafana instance. To be impacted, all of the following must be applicable. For the data source proxy: A Grafana HTTP-based datasource configured with Server as Access Mode and a URL set, the attacker has to be in control of the HTTP server serving the URL of above datasource, and a specially crafted link pointing at the attacker controlled data source must be clicked on by an authenticated user. For the plugin proxy: A Grafana HTTP-based app plugin configured and enabled with a URL set, the attacker has to be in control of the H

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2022-21702

больше 3 лет назад

Grafana is an open-source platform for monitoring and observability. I ...

CVSS3: 6.5
EPSS: Низкий
ubuntu логотип

CVE-2021-27358

больше 4 лет назад

The snapshot feature in Grafana 6.7.3 through 7.4.1 can allow an unauthenticated remote attackers to trigger a Denial of Service via a remote API call if a commonly used configuration is set.

CVSS3: 7.5
EPSS: Высокий
redhat логотип

CVE-2021-27358

больше 4 лет назад

The snapshot feature in Grafana 6.7.3 through 7.4.1 can allow an unauthenticated remote attackers to trigger a Denial of Service via a remote API call if a commonly used configuration is set.

CVSS3: 7.5
EPSS: Высокий
nvd логотип

CVE-2021-27358

больше 4 лет назад

The snapshot feature in Grafana 6.7.3 through 7.4.1 can allow an unauthenticated remote attackers to trigger a Denial of Service via a remote API call if a commonly used configuration is set.

CVSS3: 7.5
EPSS: Высокий
debian логотип

CVE-2021-27358

больше 4 лет назад

The snapshot feature in Grafana 6.7.3 through 7.4.1 can allow an unaut ...

CVSS3: 7.5
EPSS: Высокий
ubuntu логотип

CVE-2020-12458

больше 5 лет назад

An information-disclosure flaw was found in Grafana through 6.7.3. The database directory /var/lib/grafana and database file /var/lib/grafana/grafana.db are world readable. This can result in exposure of sensitive information (e.g., cleartext or encrypted datasource passwords).

CVSS3: 5.5
EPSS: Низкий
redhat логотип

CVE-2020-12458

больше 5 лет назад

An information-disclosure flaw was found in Grafana through 6.7.3. The database directory /var/lib/grafana and database file /var/lib/grafana/grafana.db are world readable. This can result in exposure of sensitive information (e.g., cleartext or encrypted datasource passwords).

CVSS3: 6.2
EPSS: Низкий
nvd логотип

CVE-2020-12458

больше 5 лет назад

An information-disclosure flaw was found in Grafana through 6.7.3. The database directory /var/lib/grafana and database file /var/lib/grafana/grafana.db are world readable. This can result in exposure of sensitive information (e.g., cleartext or encrypted datasource passwords).

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2020-12458

больше 5 лет назад

An information-disclosure flaw was found in Grafana through 6.7.3. The ...

CVSS3: 5.5
EPSS: Низкий
ubuntu логотип

CVE-2020-11110

около 5 лет назад

Grafana through 6.7.1 allows stored XSS due to insufficient input protection in the originalUrl field, which allows an attacker to inject JavaScript code that will be executed after clicking on Open Original Dashboard after visiting the snapshot.

CVSS3: 5.4
EPSS: Средний
redhat логотип

CVE-2020-11110

больше 5 лет назад

Grafana through 6.7.1 allows stored XSS due to insufficient input protection in the originalUrl field, which allows an attacker to inject JavaScript code that will be executed after clicking on Open Original Dashboard after visiting the snapshot.

CVSS3: 6.1
EPSS: Средний
nvd логотип

CVE-2020-11110

около 5 лет назад

Grafana through 6.7.1 allows stored XSS due to insufficient input protection in the originalUrl field, which allows an attacker to inject JavaScript code that will be executed after clicking on Open Original Dashboard after visiting the snapshot.

CVSS3: 5.4
EPSS: Средний
debian логотип

CVE-2020-11110

около 5 лет назад

Grafana through 6.7.1 allows stored XSS due to insufficient input prot ...

CVSS3: 5.4
EPSS: Средний
ubuntu логотип

CVE-2018-15727

около 7 лет назад

Grafana 2.x, 3.x, and 4.x before 4.6.4 and 5.x before 5.2.3 allows authentication bypass because an attacker can generate a valid "remember me" cookie knowing only a username of an LDAP or OAuth user.

CVSS3: 9.8
EPSS: Высокий
redhat логотип

CVE-2018-15727

около 7 лет назад

Grafana 2.x, 3.x, and 4.x before 4.6.4 and 5.x before 5.2.3 allows authentication bypass because an attacker can generate a valid "remember me" cookie knowing only a username of an LDAP or OAuth user.

CVSS3: 5.5
EPSS: Высокий
nvd логотип

CVE-2018-15727

около 7 лет назад

Grafana 2.x, 3.x, and 4.x before 4.6.4 and 5.x before 5.2.3 allows authentication bypass because an attacker can generate a valid "remember me" cookie knowing only a username of an LDAP or OAuth user.

CVSS3: 9.8
EPSS: Высокий
debian логотип

CVE-2018-15727

около 7 лет назад

Grafana 2.x, 3.x, and 4.x before 4.6.4 and 5.x before 5.2.3 allows aut ...

CVSS3: 9.8
EPSS: Высокий
fstec логотип

BDU:2025-09887

2 месяца назад

Уязвимость компонента OSS Organization Switching платформы для мониторинга и наблюдения Grafana, позволяющая нарушителю перенаправить пользователя на произвольный сайт

CVSS3: 4.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2022-21702

Grafana is an open-source platform for monitoring and observability. In affected versions an attacker could serve HTML content thru the Grafana datasource or plugin proxy and trick a user to visit this HTML page using a specially crafted link and execute a Cross-site Scripting (XSS) attack. The attacker could either compromise an existing datasource for a specific Grafana instance or either set up its own public service and instruct anyone to set it up in their Grafana instance. To be impacted, all of the following must be applicable. For the data source proxy: A Grafana HTTP-based datasource configured with Server as Access Mode and a URL set, the attacker has to be in control of the HTTP server serving the URL of above datasource, and a specially crafted link pointing at the attacker controlled data source must be clicked on by an authenticated user. For the plugin proxy: A Grafana HTTP-based app plugin configured and enabled with a URL set, the attacker has to be in control of th...

CVSS3: 6.8
1%
Низкий
больше 3 лет назад
nvd логотип
CVE-2022-21702

Grafana is an open-source platform for monitoring and observability. In affected versions an attacker could serve HTML content thru the Grafana datasource or plugin proxy and trick a user to visit this HTML page using a specially crafted link and execute a Cross-site Scripting (XSS) attack. The attacker could either compromise an existing datasource for a specific Grafana instance or either set up its own public service and instruct anyone to set it up in their Grafana instance. To be impacted, all of the following must be applicable. For the data source proxy: A Grafana HTTP-based datasource configured with Server as Access Mode and a URL set, the attacker has to be in control of the HTTP server serving the URL of above datasource, and a specially crafted link pointing at the attacker controlled data source must be clicked on by an authenticated user. For the plugin proxy: A Grafana HTTP-based app plugin configured and enabled with a URL set, the attacker has to be in control of the H

CVSS3: 6.5
1%
Низкий
больше 3 лет назад
debian логотип
CVE-2022-21702

Grafana is an open-source platform for monitoring and observability. I ...

CVSS3: 6.5
1%
Низкий
больше 3 лет назад
ubuntu логотип
CVE-2021-27358

The snapshot feature in Grafana 6.7.3 through 7.4.1 can allow an unauthenticated remote attackers to trigger a Denial of Service via a remote API call if a commonly used configuration is set.

CVSS3: 7.5
80%
Высокий
больше 4 лет назад
redhat логотип
CVE-2021-27358

The snapshot feature in Grafana 6.7.3 through 7.4.1 can allow an unauthenticated remote attackers to trigger a Denial of Service via a remote API call if a commonly used configuration is set.

CVSS3: 7.5
80%
Высокий
больше 4 лет назад
nvd логотип
CVE-2021-27358

The snapshot feature in Grafana 6.7.3 through 7.4.1 can allow an unauthenticated remote attackers to trigger a Denial of Service via a remote API call if a commonly used configuration is set.

CVSS3: 7.5
80%
Высокий
больше 4 лет назад
debian логотип
CVE-2021-27358

The snapshot feature in Grafana 6.7.3 through 7.4.1 can allow an unaut ...

CVSS3: 7.5
80%
Высокий
больше 4 лет назад
ubuntu логотип
CVE-2020-12458

An information-disclosure flaw was found in Grafana through 6.7.3. The database directory /var/lib/grafana and database file /var/lib/grafana/grafana.db are world readable. This can result in exposure of sensitive information (e.g., cleartext or encrypted datasource passwords).

CVSS3: 5.5
0%
Низкий
больше 5 лет назад
redhat логотип
CVE-2020-12458

An information-disclosure flaw was found in Grafana through 6.7.3. The database directory /var/lib/grafana and database file /var/lib/grafana/grafana.db are world readable. This can result in exposure of sensitive information (e.g., cleartext or encrypted datasource passwords).

CVSS3: 6.2
0%
Низкий
больше 5 лет назад
nvd логотип
CVE-2020-12458

An information-disclosure flaw was found in Grafana through 6.7.3. The database directory /var/lib/grafana and database file /var/lib/grafana/grafana.db are world readable. This can result in exposure of sensitive information (e.g., cleartext or encrypted datasource passwords).

CVSS3: 5.5
0%
Низкий
больше 5 лет назад
debian логотип
CVE-2020-12458

An information-disclosure flaw was found in Grafana through 6.7.3. The ...

CVSS3: 5.5
0%
Низкий
больше 5 лет назад
ubuntu логотип
CVE-2020-11110

Grafana through 6.7.1 allows stored XSS due to insufficient input protection in the originalUrl field, which allows an attacker to inject JavaScript code that will be executed after clicking on Open Original Dashboard after visiting the snapshot.

CVSS3: 5.4
64%
Средний
около 5 лет назад
redhat логотип
CVE-2020-11110

Grafana through 6.7.1 allows stored XSS due to insufficient input protection in the originalUrl field, which allows an attacker to inject JavaScript code that will be executed after clicking on Open Original Dashboard after visiting the snapshot.

CVSS3: 6.1
64%
Средний
больше 5 лет назад
nvd логотип
CVE-2020-11110

Grafana through 6.7.1 allows stored XSS due to insufficient input protection in the originalUrl field, which allows an attacker to inject JavaScript code that will be executed after clicking on Open Original Dashboard after visiting the snapshot.

CVSS3: 5.4
64%
Средний
около 5 лет назад
debian логотип
CVE-2020-11110

Grafana through 6.7.1 allows stored XSS due to insufficient input prot ...

CVSS3: 5.4
64%
Средний
около 5 лет назад
ubuntu логотип
CVE-2018-15727

Grafana 2.x, 3.x, and 4.x before 4.6.4 and 5.x before 5.2.3 allows authentication bypass because an attacker can generate a valid "remember me" cookie knowing only a username of an LDAP or OAuth user.

CVSS3: 9.8
75%
Высокий
около 7 лет назад
redhat логотип
CVE-2018-15727

Grafana 2.x, 3.x, and 4.x before 4.6.4 and 5.x before 5.2.3 allows authentication bypass because an attacker can generate a valid "remember me" cookie knowing only a username of an LDAP or OAuth user.

CVSS3: 5.5
75%
Высокий
около 7 лет назад
nvd логотип
CVE-2018-15727

Grafana 2.x, 3.x, and 4.x before 4.6.4 and 5.x before 5.2.3 allows authentication bypass because an attacker can generate a valid "remember me" cookie knowing only a username of an LDAP or OAuth user.

CVSS3: 9.8
75%
Высокий
около 7 лет назад
debian логотип
CVE-2018-15727

Grafana 2.x, 3.x, and 4.x before 4.6.4 and 5.x before 5.2.3 allows aut ...

CVSS3: 9.8
75%
Высокий
около 7 лет назад
fstec логотип
BDU:2025-09887

Уязвимость компонента OSS Organization Switching платформы для мониторинга и наблюдения Grafana, позволяющая нарушителю перенаправить пользователя на произвольный сайт

CVSS3: 4.2
1%
Низкий
2 месяца назад

Уязвимостей на страницу