Логотип exploitDog
product: "grafana"
Консоль
Логотип exploitDog

exploitDog

product: "grafana"

Количество 394

Количество 394

github логотип

GHSA-7533-c8qv-jm9m

больше 1 года назад

Grafana directory traversal for .cvs files

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-6wh2-8hw7-jw94

почти 2 года назад

Grafana XSS via adding a link in General feature

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-69j6-29vr-p3j9

около 4 лет назад

Authentication bypass for viewing and deletions of snapshots

CVSS3: 7.3
EPSS: Критический
github логотип

GHSA-6858-383c-7xhr

больше 3 лет назад

Grafana Enterprise 7.2.x and 7.3.x before 7.3.10 and 7.4.x before 7.4.5 allows a dashboard editor to bypass a permission check concerning a data source they should not be able to access.

CVSS3: 7.1
EPSS: Низкий
github логотип

GHSA-66c4-2g2v-54qw

около 1 года назад

Grafana org admin can delete pending invites in different org

CVSS3: 2.2
EPSS: Низкий
github логотип

GHSA-6676-9pqr-4cw3

около 2 лет назад

Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, Request security is a deny list that allows admins to configure Grafana in a way so that the instance doesn’t call specific hosts. However, the restriction can be bypassed used punycode encoding of the characters in the request address.

CVSS3: 6.6
EPSS: Низкий
github логотип

GHSA-5mxf-42f5-j782

почти 2 года назад

Grafana's users with permissions to create a data source can CRUD all data sources

CVSS3: 6
EPSS: Низкий
github логотип

GHSA-57qv-hxpw-pjp9

больше 3 лет назад

The querier component in Grafana Enterprise Logs 1.1.x through 1.3.x before 1.4.0 does not require authentication when X-Scope-OrgID is used. Versions 1.2.1, 1.3.1, and 1.4.0 contain the bugfix. This affects -auth.type=enterprise in microservices mode

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-4pwp-cx67-5cpx

почти 2 года назад

Grafana Arbitrary File Read

CVSS3: 6.5
EPSS: Средний
github логотип

GHSA-4pff-25fv-cm83

почти 2 года назад

Grafana is an open-source platform for monitoring and observability. The CSV datasource plugin is a Grafana Labs maintained plugin for Grafana that allows for retrieving and processing CSV data from a remote endpoint configured by an administrator. If this plugin was configured to send requests to a bare host with no path (e.g. https://www.example.com/ https://www.example.com/` ), requests to an endpoint other than the one configured by the administrator could be triggered by a specially crafted request from any user, resulting in an SSRF vector. AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator

CVSS3: 5
EPSS: Низкий
github логотип

GHSA-4724-7jwc-3fpw

больше 1 года назад

Grafana Spoofing originalUrl of snapshots

CVSS3: 6.7
EPSS: Низкий
github логотип

GHSA-46x4-c48q-4248

больше 3 лет назад

Grafana version < 6.7.3 is vulnerable for annotation popup XSS.

EPSS: Низкий
github логотип

GHSA-3p62-42x7-gxg5

больше 1 года назад

Grafana User enumeration via forget password

CVSS3: 6.7
EPSS: Низкий
github логотип

GHSA-3j9m-hcv9-rpj8

около 4 лет назад

XSS vulnerability allowing arbitrary JavaScript execution

CVSS3: 6.9
EPSS: Высокий
github логотип

GHSA-3hv4-r2fm-h27f

почти 2 года назад

Email Validation Bypass And Preventing Sign Up From Email's Owner

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-2x6g-h2hg-rq84

больше 1 года назад

Grafana Email addresses and usernames can not be trusted

CVSS3: 6.4
EPSS: Низкий
ubuntu логотип

CVE-2025-4123

7 месяцев назад

A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF. The default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive.

CVSS3: 7.6
EPSS: Низкий
redhat логотип

CVE-2025-4123

7 месяцев назад

A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF. The default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive.

CVSS3: 7.6
EPSS: Низкий
nvd логотип

CVE-2025-4123

7 месяцев назад

A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF. The default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive.

CVSS3: 7.6
EPSS: Низкий
debian логотип

CVE-2025-4123

7 месяцев назад

A cross-site scripting (XSS) vulnerability exists in Grafana caused by ...

CVSS3: 7.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-7533-c8qv-jm9m

Grafana directory traversal for .cvs files

CVSS3: 4.3
1%
Низкий
больше 1 года назад
github логотип
GHSA-6wh2-8hw7-jw94

Grafana XSS via adding a link in General feature

CVSS3: 6.1
1%
Низкий
почти 2 года назад
github логотип
GHSA-69j6-29vr-p3j9

Authentication bypass for viewing and deletions of snapshots

CVSS3: 7.3
94%
Критический
около 4 лет назад
github логотип
GHSA-6858-383c-7xhr

Grafana Enterprise 7.2.x and 7.3.x before 7.3.10 and 7.4.x before 7.4.5 allows a dashboard editor to bypass a permission check concerning a data source they should not be able to access.

CVSS3: 7.1
0%
Низкий
больше 3 лет назад
github логотип
GHSA-66c4-2g2v-54qw

Grafana org admin can delete pending invites in different org

CVSS3: 2.2
0%
Низкий
около 1 года назад
github логотип
GHSA-6676-9pqr-4cw3

Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, Request security is a deny list that allows admins to configure Grafana in a way so that the instance doesn’t call specific hosts. However, the restriction can be bypassed used punycode encoding of the characters in the request address.

CVSS3: 6.6
0%
Низкий
около 2 лет назад
github логотип
GHSA-5mxf-42f5-j782

Grafana's users with permissions to create a data source can CRUD all data sources

CVSS3: 6
0%
Низкий
почти 2 года назад
github логотип
GHSA-57qv-hxpw-pjp9

The querier component in Grafana Enterprise Logs 1.1.x through 1.3.x before 1.4.0 does not require authentication when X-Scope-OrgID is used. Versions 1.2.1, 1.3.1, and 1.4.0 contain the bugfix. This affects -auth.type=enterprise in microservices mode

CVSS3: 9.8
0%
Низкий
больше 3 лет назад
github логотип
GHSA-4pwp-cx67-5cpx

Grafana Arbitrary File Read

CVSS3: 6.5
37%
Средний
почти 2 года назад
github логотип
GHSA-4pff-25fv-cm83

Grafana is an open-source platform for monitoring and observability. The CSV datasource plugin is a Grafana Labs maintained plugin for Grafana that allows for retrieving and processing CSV data from a remote endpoint configured by an administrator. If this plugin was configured to send requests to a bare host with no path (e.g. https://www.example.com/ https://www.example.com/` ), requests to an endpoint other than the one configured by the administrator could be triggered by a specially crafted request from any user, resulting in an SSRF vector. AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator

CVSS3: 5
0%
Низкий
почти 2 года назад
github логотип
GHSA-4724-7jwc-3fpw

Grafana Spoofing originalUrl of snapshots

CVSS3: 6.7
0%
Низкий
больше 1 года назад
github логотип
GHSA-46x4-c48q-4248

Grafana version < 6.7.3 is vulnerable for annotation popup XSS.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-3p62-42x7-gxg5

Grafana User enumeration via forget password

CVSS3: 6.7
0%
Низкий
больше 1 года назад
github логотип
GHSA-3j9m-hcv9-rpj8

XSS vulnerability allowing arbitrary JavaScript execution

CVSS3: 6.9
79%
Высокий
около 4 лет назад
github логотип
GHSA-3hv4-r2fm-h27f

Email Validation Bypass And Preventing Sign Up From Email's Owner

CVSS3: 5.4
0%
Низкий
почти 2 года назад
github логотип
GHSA-2x6g-h2hg-rq84

Grafana Email addresses and usernames can not be trusted

CVSS3: 6.4
0%
Низкий
больше 1 года назад
ubuntu логотип
CVE-2025-4123

A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF. The default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive.

CVSS3: 7.6
5%
Низкий
7 месяцев назад
redhat логотип
CVE-2025-4123

A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF. The default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive.

CVSS3: 7.6
5%
Низкий
7 месяцев назад
nvd логотип
CVE-2025-4123

A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF. The default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive.

CVSS3: 7.6
5%
Низкий
7 месяцев назад
debian логотип
CVE-2025-4123

A cross-site scripting (XSS) vulnerability exists in Grafana caused by ...

CVSS3: 7.6
5%
Низкий
7 месяцев назад

Уязвимостей на страницу