Логотип exploitDog
bind:"CVE-2024-1313" OR bind:"CVE-2024-1394"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2024-1313" OR bind:"CVE-2024-1394"

Количество 43

Количество 43

rocky логотип

RLSA-2024:3265

около 1 года назад

Important: grafana security update

EPSS: Низкий
rocky логотип

RLSA-2024:2568

около 1 года назад

Moderate: grafana security update

EPSS: Низкий
oracle-oval логотип

ELSA-2024-3265

около 1 года назад

ELSA-2024-3265: grafana security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-2568

около 1 года назад

ELSA-2024-2568: grafana security update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2024-1313

около 1 года назад

It is possible for a user in a different organization from the owner of a snapshot to bypass authorization and delete a snapshot by issuing a DELETE request to /api/snapshots/<key> using its view key. This functionality is intended to only be available to individuals with the permission to write/edit to the snapshot in question, but due to a bug in the authorization logic, deletion requests issued by an unprivileged user in a different organization than the snapshot owner are treated as authorized. Grafana Labs would like to thank Ravid Mazon and Jay Chen of Palo Alto Research for discovering and disclosing this vulnerability. This issue affects Grafana: from 9.5.0 before 9.5.18, from 10.0.0 before 10.0.13, from 10.1.0 before 10.1.9, from 10.2.0 before 10.2.6, from 10.3.0 before 10.3.5.

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2024-1313

около 1 года назад

It is possible for a user in a different organization from the owner of a snapshot to bypass authorization and delete a snapshot by issuing a DELETE request to /api/snapshots/<key> using its view key. This functionality is intended to only be available to individuals with the permission to write/edit to the snapshot in question, but due to a bug in the authorization logic, deletion requests issued by an unprivileged user in a different organization than the snapshot owner are treated as authorized. Grafana Labs would like to thank Ravid Mazon and Jay Chen of Palo Alto Research for discovering and disclosing this vulnerability. This issue affects Grafana: from 9.5.0 before 9.5.18, from 10.0.0 before 10.0.13, from 10.1.0 before 10.1.9, from 10.2.0 before 10.2.6, from 10.3.0 before 10.3.5.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2024-1313

около 1 года назад

It is possible for a user in a different organization from the owner of a snapshot to bypass authorization and delete a snapshot by issuing a DELETE request to /api/snapshots/<key> using its view key. This functionality is intended to only be available to individuals with the permission to write/edit to the snapshot in question, but due to a bug in the authorization logic, deletion requests issued by an unprivileged user in a different organization than the snapshot owner are treated as authorized. Grafana Labs would like to thank Ravid Mazon and Jay Chen of Palo Alto Research for discovering and disclosing this vulnerability. This issue affects Grafana: from 9.5.0 before 9.5.18, from 10.0.0 before 10.0.13, from 10.1.0 before 10.1.9, from 10.2.0 before 10.2.6, from 10.3.0 before 10.3.5.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2024-1313

около 1 года назад

It is possible for a user in a different organization from the owner o ...

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2024-1394

около 1 года назад

A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs​. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey​ and ctx​. That function uses named return parameters to free pkey​ and ctx​ if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the "return nil, nil, fail(...)" pattern, meaning that pkey​ and ctx​ will be nil inside the deferred function that should free them.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2024-1394

около 1 года назад

A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs​. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey​ and ctx​. That function uses named return parameters to free pkey​ and ctx​ if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the "return nil, nil, fail(...)" pattern, meaning that pkey​ and ctx​ will be nil inside the deferred function that should free them.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-67rv-qpw2-6qrr

около 1 года назад

Grafana: Users outside an organization can delete a snapshot with its key

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2024-04116

около 1 года назад

Уязвимость веб-инструмента представления данных Grafana, связанная с обходом авторизации, позволяющая нарушителю обойти процесс авторизации и удалить моментальный снимок

CVSS3: 6.5
EPSS: Низкий
rocky логотип

RLSA-2024:4502

11 месяцев назад

Important: skopeo security update

EPSS: Низкий
rocky логотип

RLSA-2024:2569

около 1 года назад

Important: grafana-pcp security update

EPSS: Низкий
rocky логотип

RLSA-2024:1646

около 1 года назад

Important: grafana security and bug fix update

EPSS: Низкий
rocky логотип

RLSA-2024:1644

около 1 года назад

Important: grafana-pcp security and bug fix update

EPSS: Низкий
rocky логотип

RLSA-2024:1502

около 1 года назад

Important: grafana-pcp security update

EPSS: Низкий
github логотип

GHSA-78hx-gp6g-7mj6

около 1 года назад

Memory leaks in code encrypting and verifying RSA payloads

CVSS3: 7.5
EPSS: Низкий
oracle-oval логотип

ELSA-2024-4762

11 месяцев назад

ELSA-2024-4762: runc security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-4761

11 месяцев назад

ELSA-2024-4761: containernetworking-plugins security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
rocky логотип
RLSA-2024:3265

Important: grafana security update

около 1 года назад
rocky логотип
RLSA-2024:2568

Moderate: grafana security update

около 1 года назад
oracle-oval логотип
ELSA-2024-3265

ELSA-2024-3265: grafana security update (IMPORTANT)

около 1 года назад
oracle-oval логотип
ELSA-2024-2568

ELSA-2024-2568: grafana security update (MODERATE)

около 1 года назад
ubuntu логотип
CVE-2024-1313

It is possible for a user in a different organization from the owner of a snapshot to bypass authorization and delete a snapshot by issuing a DELETE request to /api/snapshots/<key> using its view key. This functionality is intended to only be available to individuals with the permission to write/edit to the snapshot in question, but due to a bug in the authorization logic, deletion requests issued by an unprivileged user in a different organization than the snapshot owner are treated as authorized. Grafana Labs would like to thank Ravid Mazon and Jay Chen of Palo Alto Research for discovering and disclosing this vulnerability. This issue affects Grafana: from 9.5.0 before 9.5.18, from 10.0.0 before 10.0.13, from 10.1.0 before 10.1.9, from 10.2.0 before 10.2.6, from 10.3.0 before 10.3.5.

CVSS3: 6.5
0%
Низкий
около 1 года назад
redhat логотип
CVE-2024-1313

It is possible for a user in a different organization from the owner of a snapshot to bypass authorization and delete a snapshot by issuing a DELETE request to /api/snapshots/<key> using its view key. This functionality is intended to only be available to individuals with the permission to write/edit to the snapshot in question, but due to a bug in the authorization logic, deletion requests issued by an unprivileged user in a different organization than the snapshot owner are treated as authorized. Grafana Labs would like to thank Ravid Mazon and Jay Chen of Palo Alto Research for discovering and disclosing this vulnerability. This issue affects Grafana: from 9.5.0 before 9.5.18, from 10.0.0 before 10.0.13, from 10.1.0 before 10.1.9, from 10.2.0 before 10.2.6, from 10.3.0 before 10.3.5.

CVSS3: 6.5
0%
Низкий
около 1 года назад
nvd логотип
CVE-2024-1313

It is possible for a user in a different organization from the owner of a snapshot to bypass authorization and delete a snapshot by issuing a DELETE request to /api/snapshots/<key> using its view key. This functionality is intended to only be available to individuals with the permission to write/edit to the snapshot in question, but due to a bug in the authorization logic, deletion requests issued by an unprivileged user in a different organization than the snapshot owner are treated as authorized. Grafana Labs would like to thank Ravid Mazon and Jay Chen of Palo Alto Research for discovering and disclosing this vulnerability. This issue affects Grafana: from 9.5.0 before 9.5.18, from 10.0.0 before 10.0.13, from 10.1.0 before 10.1.9, from 10.2.0 before 10.2.6, from 10.3.0 before 10.3.5.

CVSS3: 6.5
0%
Низкий
около 1 года назад
debian логотип
CVE-2024-1313

It is possible for a user in a different organization from the owner o ...

CVSS3: 6.5
0%
Низкий
около 1 года назад
redhat логотип
CVE-2024-1394

A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs​. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey​ and ctx​. That function uses named return parameters to free pkey​ and ctx​ if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the "return nil, nil, fail(...)" pattern, meaning that pkey​ and ctx​ will be nil inside the deferred function that should free them.

CVSS3: 7.5
1%
Низкий
около 1 года назад
nvd логотип
CVE-2024-1394

A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs​. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey​ and ctx​. That function uses named return parameters to free pkey​ and ctx​ if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the "return nil, nil, fail(...)" pattern, meaning that pkey​ and ctx​ will be nil inside the deferred function that should free them.

CVSS3: 7.5
1%
Низкий
около 1 года назад
github логотип
GHSA-67rv-qpw2-6qrr

Grafana: Users outside an organization can delete a snapshot with its key

CVSS3: 6.5
0%
Низкий
около 1 года назад
fstec логотип
BDU:2024-04116

Уязвимость веб-инструмента представления данных Grafana, связанная с обходом авторизации, позволяющая нарушителю обойти процесс авторизации и удалить моментальный снимок

CVSS3: 6.5
0%
Низкий
около 1 года назад
rocky логотип
RLSA-2024:4502

Important: skopeo security update

1%
Низкий
11 месяцев назад
rocky логотип
RLSA-2024:2569

Important: grafana-pcp security update

1%
Низкий
около 1 года назад
rocky логотип
RLSA-2024:1646

Important: grafana security and bug fix update

1%
Низкий
около 1 года назад
rocky логотип
RLSA-2024:1644

Important: grafana-pcp security and bug fix update

1%
Низкий
около 1 года назад
rocky логотип
RLSA-2024:1502

Important: grafana-pcp security update

1%
Низкий
около 1 года назад
github логотип
GHSA-78hx-gp6g-7mj6

Memory leaks in code encrypting and verifying RSA payloads

CVSS3: 7.5
1%
Низкий
около 1 года назад
oracle-oval логотип
ELSA-2024-4762

ELSA-2024-4762: runc security update (IMPORTANT)

11 месяцев назад
oracle-oval логотип
ELSA-2024-4761

ELSA-2024-4761: containernetworking-plugins security update (IMPORTANT)

11 месяцев назад

Уязвимостей на страницу