Go module
github.com/gjulianm/grafana
history
arrow_drop_downv4.4.2+incompatible
Newer version availablewarning
Warning
We found errors while resolving dependencies that may result in an incomplete or inaccurate dependency graph.
Show details
- could not find module for package import: github.com/go-xorm/xorm
- could not find module for package import: github.com/prometheus/client_golang/api/prometheus
- Errors found while resolving some dependencies. Please go to the Dependencies tab for more information.
Security Advisories
43
In the dependencies
Similar advisories
Grafana XSS in Dashboard Text Panel
6.1 MODERATE·GHSA-cmq2-j8v8-2q44
Similar advisories
Grafana Authentication Bypass
9.8 CRITICAL·GHSA-rgjg-66cx-5x9m
Similar advisories
Access Restriction Bypass in go-ldap
8.1 HIGH·GHSA-x27w-qxhg-343v
Similar advisories
Grafana Cross-site Scripting (XSS)
6.1 MODERATE·GHSA-v5gq-qvjq-8p53
Similar advisories
Grafana information disclosure
5.5 HIGH·GHSA-3jq7-8ph8-63xm
Similar advisories
Grafana XSS via the OpenTSDB datasource
6.1 MODERATE·GHSA-7m2x-qhrq-rp8h
Similar advisories
Grafana XSS via a column style
6.1 MODERATE·GHSA-9hv8-4frf-cprf
Similar advisories
Grafana XSS in header column rename
6.1 MODERATE·GHSA-ccmg-w4xm-p28v
Similar advisories
Grafana XSS via a query alias for the ElasticSearch datasource
6.1 MODERATE·GHSA-mvpr-q6rh-8vrp
Similar advisories
Grafana stored XSS
5.4 MODERATE·GHSA-xr3x-62qw-vc4w
Similar advisories
Grafana Arbitrary File Read
6.5 MODERATE·GHSA-4pwp-cx67-5cpx
Similar advisories
Grafana User enumeration via forget password
6.7 HIGH·GHSA-3p62-42x7-gxg5
Similar advisories
Grafana Escalation from admin to server admin when auth proxy is used
6.6 HIGH·GHSA-ff5c-938w-8c9q
Similar advisories
Grafana when using email as a username can block other users from signing in
4.3 MODERATE·GHSA-gj7m-853r-289r
Similar advisories
Grafana Spoofing originalUrl of snapshots
6.7 MODERATE·GHSA-4724-7jwc-3fpw
Similar advisories
Grafana org admin can delete pending invites in different org
2.2 LOW·GHSA-66c4-2g2v-54qw
Similar advisories
Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto
9.1 CRITICAL·GHSA-v778-237x-gjrc
Similar advisories
Non-linear parsing of case-insensitive content in golang.org/x/net/html
HIGH·GHSA-w32m-9786-jp63
Email Validation Bypass And Preventing Sign Up From Email's Owner
5.4 MODERATE·GHSA-3hv4-r2fm-h27f
Authentication bypass for viewing and deletions of snapshots
7.3 HIGH·GHSA-69j6-29vr-p3j9
Grafana Cross-site Scripting vulnerability
5.4 MODERATE·GHSA-7phr-6cc9-4m5q
Grafana has Broken Access Control in Alert manager: Viewer can send test alerts
4.1 MODERATE·GHSA-cvm3-pp2j-chr3
Grafana privilege escalation vulnerability
6.7 MODERATE·GHSA-fw9c-75hh-89p6
Grafana vulnerable to Authentication Bypass by Spoofing
9.4 CRITICAL·GHSA-mpv3-g8m3-3fjc
Server Side Request Forgery in Grafana
5.8 MODERATE·GHSA-wc9w-wvq2-ffm9
Grafana Missing Synchronization vulnerability
7.5 HIGH·GHSA-x2w4-c67p-g44j
Grafana XSS Vulnerability
5.4 MODERATE·GHSA-x5fh-fvvr-892f
Grafana proxy Cross-site Scripting
6.8 MODERATE·GHSA-xc3p-28hw-q24g
Dependents
This package has no known dependents.
Package metadata as of .
Links
- Origin
- Repo
Projects
gjulianm/grafana
GitHub
The tool for beautiful monitoring and metric analytics & dashboards for Graphite, InfluxDB & Prometheus & More
call_split 0 forks
star 0 stars
OpenSSF scorecard
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
View information about checks and how to fix failures.
Score
3.8/10
Scorecard as of .
Code-Review
0/10
Determines if the project requires human code review before pull requests (aka merge requests) are merged.
Reasoning
Found 0/30 approved changesets -- score normalized to 0
Maintained
0/10
Determines if the project is "actively maintained".
Reasoning
0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0
Security-Policy
10/10
Determines if the project has published a security policy.
Reasoning
security policy file detected
CII-Best-Practices
0/10
Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.
Reasoning
no effort to earn an OpenSSF best practices badge detected
Dangerous-Workflow
10/10
Determines if the project's GitHub Action workflows avoid dangerous patterns.
Reasoning
no dangerous workflow patterns detected
Token-Permissions
0/10
Determines if the project's workflows follow the principle of least privilege.
Reasoning
detected GitHub workflow tokens with excessive permissions
License
10/10
Determines if the project has defined a license.
Reasoning
license file detected
Branch-Protection
0/10
Determines if the default and release branches are protected with GitHub's branch protection settings.
Reasoning
branch protection not enabled on development/release branches
SAST
10/10
Determines if the project uses static code analysis.
Reasoning
SAST tool detected: CodeQL
Binary-Artifacts
10/10
Determines if the project has generated executable (binary) artifacts in the source repository.
Reasoning
no binaries found in the repo
Fuzzing
0/10
Determines if the project uses fuzzing.
Reasoning
project is not fuzzed
Pinned-Dependencies
0/10
Determines if the project has declared and pinned the dependencies of its build process.
Reasoning
dependency not pinned by hash detected -- score normalized to 0
Vulnerabilities
0/10
Determines if the project has open, known unfixed vulnerabilities.
Reasoning
200 existing vulnerabilities detected
Project metadata as of .