[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":4,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":11,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":17,"vulnerability-12933":24},[],["Island",5],{"key":6,"params":7,"result":9},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":8},"{}",{"head":10},{},["Island",12],{"key":13,"params":14,"result":15},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":8},{"head":16},{},["Island",18],{"key":19,"params":20,"result":22},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":21},"{\"text-color\":\"gray\"}",{"head":23},{},{"id":25,"detectable_with":26,"vuln_details":33,"vuln_id":50,"name":51,"published":52,"updated":34},12933,{"tool":27,"engine":30},{"id":28,"name":29},1,"Network Scanner",{"id":31,"name":32},3,"OpenVAS",{"id":25,"codename":34,"description":34,"severity":35,"risk_description":36,"public_description":37,"public_recommendation":38,"recommendation":34,"references":39,"cvssv3":42,"epss_score":43,"epss_percentile":44,"cve":45,"in_cisa_catalog":48,"date":49,"software_type":34,"vendor":34,"product":34,"ptt_exploit_capabilities":34},null,"medium","The following vulnerabilities exist: - CVE-2022-39306: Vulnerability makes it possible to use the invitation link to sign up with an arbitrary username/email with a malicious intent - CVE-2022-39307: The impacted endpoint leaks information to unauthenticated users and introduces a security risk.","Grafana is prone to multiple vulnerabilities.","Update to version 8.5.15, 9.2.4 or later.",[40,41],"https://github.com/grafana/grafana/security/advisories/GHSA-2x6g-h2hg-rq84","https://github.com/grafana/grafana/security/advisories/GHSA-3p62-42x7-gxg5",5.3,0.00492,0.6565,[46,47],"CVE-2022-39306","CVE-2022-39307",false,"2022-11-09T00:00:00Z","NETSCAN-OPENVAS-1.3.6.1.4.1.25623.1.0.126208","Grafana \u003C 8.5.15, 9 \u003C 9.2.4 Multiple Vulnerabilities","2022-11-14T00:00:00Z"]