Search:
Image | Mirrored | Release | Binary/Package | Dependency | Vulnerability ID (CVE) | Severity | Status | Justification (for status not affected) | Type (language or OS) |
---|---|---|---|---|---|---|---|---|---|
ghcr.io/k8snetworkplumbingwg/whereabouts:v0.6.3 | false | Harvester v1.3.2 | ip-control-loop | golang.org/x/net@v0.19.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
ghcr.io/k8snetworkplumbingwg/whereabouts:v0.6.3 | false | Harvester v1.3.2 | ip-control-loop | stdlib@v1.20.12 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
ghcr.io/k8snetworkplumbingwg/whereabouts:v0.6.3 | false | Harvester v1.3.2 | ip-control-loop | stdlib@v1.20.12 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
ghcr.io/k8snetworkplumbingwg/whereabouts:v0.6.3 | false | Harvester v1.3.2 | ip-control-loop | stdlib@v1.20.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
ghcr.io/k8snetworkplumbingwg/whereabouts:v0.6.3 | false | Harvester v1.3.2 | whereabouts | golang.org/x/net@v0.19.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
ghcr.io/k8snetworkplumbingwg/whereabouts:v0.6.3 | false | Harvester v1.3.2 | whereabouts | stdlib@v1.20.12 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
ghcr.io/k8snetworkplumbingwg/whereabouts:v0.6.3 | false | Harvester v1.3.2 | whereabouts | stdlib@v1.20.12 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
ghcr.io/k8snetworkplumbingwg/whereabouts:v0.6.3 | false | Harvester v1.3.2 | whereabouts | stdlib@v1.20.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
ghcr.io/kube-vip/kube-vip-iptables:v0.6.0 | false | Harvester v1.3.2 | libcrypto1.1 | libcrypto1.1@1.1.1q-r0 | CVE-2022-4450 | HIGH | affected | alpine | |
ghcr.io/kube-vip/kube-vip-iptables:v0.6.0 | false | Harvester v1.3.2 | libcrypto1.1 | libcrypto1.1@1.1.1q-r0 | CVE-2023-0215 | HIGH | affected | alpine | |
ghcr.io/kube-vip/kube-vip-iptables:v0.6.0 | false | Harvester v1.3.2 | libcrypto1.1 | libcrypto1.1@1.1.1q-r0 | CVE-2023-0286 | HIGH | affected | alpine | |
ghcr.io/kube-vip/kube-vip-iptables:v0.6.0 | false | Harvester v1.3.2 | libcrypto1.1 | libcrypto1.1@1.1.1q-r0 | CVE-2023-0464 | HIGH | affected | alpine | |
ghcr.io/kube-vip/kube-vip-iptables:v0.6.0 | false | Harvester v1.3.2 | libssl1.1 | libssl1.1@1.1.1q-r0 | CVE-2022-4450 | HIGH | affected | alpine | |
ghcr.io/kube-vip/kube-vip-iptables:v0.6.0 | false | Harvester v1.3.2 | libssl1.1 | libssl1.1@1.1.1q-r0 | CVE-2023-0215 | HIGH | affected | alpine | |
ghcr.io/kube-vip/kube-vip-iptables:v0.6.0 | false | Harvester v1.3.2 | libssl1.1 | libssl1.1@1.1.1q-r0 | CVE-2023-0286 | HIGH | affected | alpine | |
ghcr.io/kube-vip/kube-vip-iptables:v0.6.0 | false | Harvester v1.3.2 | libssl1.1 | libssl1.1@1.1.1q-r0 | CVE-2023-0464 | HIGH | affected | alpine | |
ghcr.io/kube-vip/kube-vip-iptables:v0.6.0 | false | Harvester v1.3.2 | kube-vip | github.com/osrg/gobgp/v3@v3.12.0 | CVE-2023-46565 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
ghcr.io/kube-vip/kube-vip-iptables:v0.6.0 | false | Harvester v1.3.2 | kube-vip | google.golang.org/grpc@v1.51.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
ghcr.io/kube-vip/kube-vip-iptables:v0.6.0 | false | Harvester v1.3.2 | kube-vip | stdlib@v1.19.2 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
ghcr.io/kube-vip/kube-vip-iptables:v0.6.0 | false | Harvester v1.3.2 | kube-vip | stdlib@v1.19.2 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
ghcr.io/kube-vip/kube-vip-iptables:v0.6.0 | false | Harvester v1.3.2 | kube-vip | stdlib@v1.19.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
ghcr.io/kube-vip/kube-vip-iptables:v0.6.0 | false | Harvester v1.3.2 | kube-vip | stdlib@v1.19.2 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
ghcr.io/kube-vip/kube-vip-iptables:v0.6.0 | false | Harvester v1.3.2 | kube-vip | stdlib@v1.19.2 | CVE-2022-41720 | HIGH | affected | gobinary | |
ghcr.io/kube-vip/kube-vip-iptables:v0.6.0 | false | Harvester v1.3.2 | kube-vip | stdlib@v1.19.2 | CVE-2022-41722 | HIGH | affected | gobinary | |
ghcr.io/kube-vip/kube-vip-iptables:v0.6.0 | false | Harvester v1.3.2 | kube-vip | stdlib@v1.19.2 | CVE-2022-41723 | HIGH | affected | gobinary | |
ghcr.io/kube-vip/kube-vip-iptables:v0.6.0 | false | Harvester v1.3.2 | kube-vip | stdlib@v1.19.2 | CVE-2022-41724 | HIGH | affected | gobinary | |
ghcr.io/kube-vip/kube-vip-iptables:v0.6.0 | false | Harvester v1.3.2 | kube-vip | stdlib@v1.19.2 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
ghcr.io/kube-vip/kube-vip-iptables:v0.6.0 | false | Harvester v1.3.2 | kube-vip | stdlib@v1.19.2 | CVE-2023-24534 | HIGH | affected | gobinary | |
ghcr.io/kube-vip/kube-vip-iptables:v0.6.0 | false | Harvester v1.3.2 | kube-vip | stdlib@v1.19.2 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
ghcr.io/kube-vip/kube-vip-iptables:v0.6.0 | false | Harvester v1.3.2 | kube-vip | stdlib@v1.19.2 | CVE-2023-24537 | HIGH | affected | gobinary | |
ghcr.io/kube-vip/kube-vip-iptables:v0.6.0 | false | Harvester v1.3.2 | kube-vip | stdlib@v1.19.2 | CVE-2023-24539 | HIGH | affected | gobinary | |
ghcr.io/kube-vip/kube-vip-iptables:v0.6.0 | false | Harvester v1.3.2 | kube-vip | stdlib@v1.19.2 | CVE-2023-29400 | HIGH | affected | gobinary | |
ghcr.io/kube-vip/kube-vip-iptables:v0.6.0 | false | Harvester v1.3.2 | kube-vip | stdlib@v1.19.2 | CVE-2023-29403 | HIGH | affected | gobinary | |
ghcr.io/kube-vip/kube-vip-iptables:v0.6.0 | false | Harvester v1.3.2 | kube-vip | stdlib@v1.19.2 | CVE-2023-39325 | HIGH | affected | gobinary | |
ghcr.io/kube-vip/kube-vip-iptables:v0.6.0 | false | Harvester v1.3.2 | kube-vip | stdlib@v1.19.2 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
ghcr.io/kube-vip/kube-vip-iptables:v0.6.0 | false | Harvester v1.3.2 | kube-vip | stdlib@v1.19.2 | CVE-2023-45287 | HIGH | affected | gobinary | |
ghcr.io/kube-vip/kube-vip-iptables:v0.6.0 | false | Harvester v1.3.2 | kube-vip | stdlib@v1.19.2 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
ghcr.io/kube-vip/kube-vip-iptables:v0.6.0 | false | Harvester v1.3.2 | kube-vip | stdlib@v1.19.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/backing-image-manager:v1.6.2 | false | Harvester v1.3.2 | glibc | glibc@2.31-150300.74.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
longhornio/backing-image-manager:v1.6.2 | false | Harvester v1.3.2 | glibc-devel | glibc-devel@2.31-150300.74.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
longhornio/backing-image-manager:v1.6.2 | false | Harvester v1.3.2 | krb5 | krb5@1.20.1-150500.3.6.1 | SUSE-SU-2024:2302-1 | HIGH | affected | sles | |
longhornio/backing-image-manager:v1.6.2 | false | Harvester v1.3.2 | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.8.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
longhornio/backing-image-manager:v1.6.2 | false | Harvester v1.3.2 | libgmodule-2_0-0 | libgmodule-2_0-0@2.70.5-150400.3.8.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
longhornio/backing-image-manager:v1.6.2 | false | Harvester v1.3.2 | libopenssl1_1 | libopenssl1_1@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
longhornio/backing-image-manager:v1.6.2 | false | Harvester v1.3.2 | libopenssl1_1-hmac | libopenssl1_1-hmac@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
longhornio/backing-image-manager:v1.6.2 | false | Harvester v1.3.2 | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150400.9.6.1 | SUSE-SU-2024:3747-1 | HIGH | affected | sles | |
longhornio/backing-image-manager:v1.6.2 | false | Harvester v1.3.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
longhornio/backing-image-manager:v1.6.2 | false | Harvester v1.3.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
longhornio/backing-image-manager:v1.6.2 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
longhornio/backing-image-manager:v1.6.2 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
longhornio/backing-image-manager:v1.6.2 | false | Harvester v1.3.2 | openssl-1_1 | openssl-1_1@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
longhornio/backing-image-manager:v1.6.2 | false | Harvester v1.3.2 | perl | perl@5.26.1-150300.17.14.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
longhornio/backing-image-manager:v1.6.2 | false | Harvester v1.3.2 | perl-base | perl-base@5.26.1-150300.17.14.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
longhornio/backing-image-manager:v1.6.2 | false | Harvester v1.3.2 | qemu-tools | qemu-tools@7.1.0-150500.49.15.1 | SUSE-SU-2024:3077-1 | HIGH | affected | sles | |
longhornio/backing-image-manager:v1.6.2 | false | Harvester v1.3.2 | qemu-tools | qemu-tools@7.1.0-150500.49.15.1 | SUSE-SU-2024:3948-1 | HIGH | affected | sles | |
longhornio/backing-image-manager:v1.6.2 | false | Harvester v1.3.2 | usr/local/bin/backing-image-manager | stdlib@v1.21.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/backing-image-manager:v1.6.2 | false | Harvester v1.3.2 | usr/local/bin/backing-image-manager | stdlib@v1.21.3 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/backing-image-manager:v1.6.2 | false | Harvester v1.3.2 | usr/local/bin/backing-image-manager | stdlib@v1.21.3 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/backing-image-manager:v1.6.2 | false | Harvester v1.3.2 | usr/local/bin/backing-image-manager | stdlib@v1.21.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/csi-attacher:v4.5.1 | false | Harvester v1.3.2 | csi-attacher | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.44.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
longhornio/csi-attacher:v4.5.1 | false | Harvester v1.3.2 | csi-attacher | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/csi-attacher:v4.5.1 | false | Harvester v1.3.2 | csi-attacher | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/csi-attacher:v4.5.1 | false | Harvester v1.3.2 | csi-attacher | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/csi-node-driver-registrar:v2.9.2 | false | Harvester v1.3.2 | csi-node-driver-registrar | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/csi-node-driver-registrar:v2.9.2 | false | Harvester v1.3.2 | csi-node-driver-registrar | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
longhornio/csi-node-driver-registrar:v2.9.2 | false | Harvester v1.3.2 | csi-node-driver-registrar | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/csi-node-driver-registrar:v2.9.2 | false | Harvester v1.3.2 | csi-node-driver-registrar | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/csi-node-driver-registrar:v2.9.2 | false | Harvester v1.3.2 | csi-node-driver-registrar | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/csi-provisioner:v3.6.4 | false | Harvester v1.3.2 | csi-provisioner | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/csi-provisioner:v3.6.4 | false | Harvester v1.3.2 | csi-provisioner | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/csi-provisioner:v3.6.4 | false | Harvester v1.3.2 | csi-provisioner | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/csi-resizer:v1.10.1 | false | Harvester v1.3.2 | csi-resizer | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.44.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
longhornio/csi-resizer:v1.10.1 | false | Harvester v1.3.2 | csi-resizer | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/csi-resizer:v1.10.1 | false | Harvester v1.3.2 | csi-resizer | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/csi-resizer:v1.10.1 | false | Harvester v1.3.2 | csi-resizer | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/csi-snapshotter:v6.3.4 | false | Harvester v1.3.2 | csi-snapshotter | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/csi-snapshotter:v6.3.4 | false | Harvester v1.3.2 | csi-snapshotter | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
longhornio/csi-snapshotter:v6.3.4 | false | Harvester v1.3.2 | csi-snapshotter | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/csi-snapshotter:v6.3.4 | false | Harvester v1.3.2 | csi-snapshotter | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/csi-snapshotter:v6.3.4 | false | Harvester v1.3.2 | csi-snapshotter | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/livenessprobe:v2.12.0 | false | Harvester v1.3.2 | livenessprobe | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/livenessprobe:v2.12.0 | false | Harvester v1.3.2 | livenessprobe | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/livenessprobe:v2.12.0 | false | Harvester v1.3.2 | livenessprobe | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/longhorn-engine:v1.6.2 | false | Harvester v1.3.2 | glibc | glibc@2.31-150300.74.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
longhornio/longhorn-engine:v1.6.2 | false | Harvester v1.3.2 | krb5 | krb5@1.20.1-150500.3.6.1 | SUSE-SU-2024:2302-1 | HIGH | affected | sles | |
longhornio/longhorn-engine:v1.6.2 | false | Harvester v1.3.2 | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.8.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
longhornio/longhorn-engine:v1.6.2 | false | Harvester v1.3.2 | libgmodule-2_0-0 | libgmodule-2_0-0@2.70.5-150400.3.8.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
longhornio/longhorn-engine:v1.6.2 | false | Harvester v1.3.2 | libopenssl1_1 | libopenssl1_1@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
longhornio/longhorn-engine:v1.6.2 | false | Harvester v1.3.2 | libopenssl1_1-hmac | libopenssl1_1-hmac@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
longhornio/longhorn-engine:v1.6.2 | false | Harvester v1.3.2 | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150400.9.6.1 | SUSE-SU-2024:3747-1 | HIGH | affected | sles | |
longhornio/longhorn-engine:v1.6.2 | false | Harvester v1.3.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
longhornio/longhorn-engine:v1.6.2 | false | Harvester v1.3.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
longhornio/longhorn-engine:v1.6.2 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
longhornio/longhorn-engine:v1.6.2 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
longhornio/longhorn-engine:v1.6.2 | false | Harvester v1.3.2 | openssl-1_1 | openssl-1_1@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
longhornio/longhorn-engine:v1.6.2 | false | Harvester v1.3.2 | perl-base | perl-base@5.26.1-150300.17.14.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
longhornio/longhorn-engine:v1.6.2 | false | Harvester v1.3.2 | qemu-tools | qemu-tools@7.1.0-150500.49.15.1 | SUSE-SU-2024:3077-1 | HIGH | affected | sles | |
longhornio/longhorn-engine:v1.6.2 | false | Harvester v1.3.2 | qemu-tools | qemu-tools@7.1.0-150500.49.15.1 | SUSE-SU-2024:3948-1 | HIGH | affected | sles | |
longhornio/longhorn-engine:v1.6.2 | false | Harvester v1.3.2 | usr/local/bin/grpc_health_probe | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/longhorn-engine:v1.6.2 | false | Harvester v1.3.2 | usr/local/bin/grpc_health_probe | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/longhorn-engine:v1.6.2 | false | Harvester v1.3.2 | usr/local/bin/grpc_health_probe | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/longhorn-engine:v1.6.2 | false | Harvester v1.3.2 | usr/local/bin/longhorn | github.com/moby/moby@v23.0.11+incompatible | CVE-2024-36621 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/longhorn-engine:v1.6.2 | false | Harvester v1.3.2 | usr/local/bin/longhorn | github.com/moby/moby@v23.0.11+incompatible | CVE-2024-36623 | HIGH | affected | gobinary | |
longhornio/longhorn-engine:v1.6.2 | false | Harvester v1.3.2 | usr/local/bin/longhorn | stdlib@v1.22.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/longhorn-engine:v1.6.2 | false | Harvester v1.3.2 | usr/local/bin/longhorn | stdlib@v1.22.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/longhorn-engine:v1.6.2 | false | Harvester v1.3.2 | usr/local/bin/longhorn-instance-manager | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/longhorn-engine:v1.6.2 | false | Harvester v1.3.2 | usr/local/bin/longhorn-instance-manager | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/longhorn-engine:v1.6.2 | false | Harvester v1.3.2 | usr/local/bin/longhorn-instance-manager | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/longhorn-instance-manager:v1.6.2 | false | Harvester v1.3.2 | glibc | glibc@2.31-150300.74.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
longhornio/longhorn-instance-manager:v1.6.2 | false | Harvester v1.3.2 | glibc-devel | glibc-devel@2.31-150300.74.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
longhornio/longhorn-instance-manager:v1.6.2 | false | Harvester v1.3.2 | krb5 | krb5@1.20.1-150500.3.6.1 | SUSE-SU-2024:2302-1 | HIGH | affected | sles | |
longhornio/longhorn-instance-manager:v1.6.2 | false | Harvester v1.3.2 | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.8.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
longhornio/longhorn-instance-manager:v1.6.2 | false | Harvester v1.3.2 | libgmodule-2_0-0 | libgmodule-2_0-0@2.70.5-150400.3.8.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
longhornio/longhorn-instance-manager:v1.6.2 | false | Harvester v1.3.2 | libopenssl1_1 | libopenssl1_1@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
longhornio/longhorn-instance-manager:v1.6.2 | false | Harvester v1.3.2 | libopenssl1_1-hmac | libopenssl1_1-hmac@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
longhornio/longhorn-instance-manager:v1.6.2 | false | Harvester v1.3.2 | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150400.9.6.1 | SUSE-SU-2024:3747-1 | HIGH | affected | sles | |
longhornio/longhorn-instance-manager:v1.6.2 | false | Harvester v1.3.2 | libpython3_6m1_0 | libpython3_6m1_0@3.6.15-lp155.23.1 | SUSE-SU-2023:3828-1 | HIGH | affected | sles | |
longhornio/longhorn-instance-manager:v1.6.2 | false | Harvester v1.3.2 | libpython3_6m1_0 | libpython3_6m1_0@3.6.15-lp155.23.1 | SUSE-SU-2024:0901-1 | HIGH | affected | sles | |
longhornio/longhorn-instance-manager:v1.6.2 | false | Harvester v1.3.2 | libpython3_6m1_0 | libpython3_6m1_0@3.6.15-lp155.23.1 | SUSE-SU-2024:3470-1 | HIGH | affected | sles | |
longhornio/longhorn-instance-manager:v1.6.2 | false | Harvester v1.3.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
longhornio/longhorn-instance-manager:v1.6.2 | false | Harvester v1.3.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
longhornio/longhorn-instance-manager:v1.6.2 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
longhornio/longhorn-instance-manager:v1.6.2 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
longhornio/longhorn-instance-manager:v1.6.2 | false | Harvester v1.3.2 | openssl-1_1 | openssl-1_1@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
longhornio/longhorn-instance-manager:v1.6.2 | false | Harvester v1.3.2 | perl | perl@5.26.1-150300.17.14.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
longhornio/longhorn-instance-manager:v1.6.2 | false | Harvester v1.3.2 | perl-base | perl-base@5.26.1-150300.17.14.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
longhornio/longhorn-instance-manager:v1.6.2 | false | Harvester v1.3.2 | python3-base | python3-base@3.6.15-lp155.23.1 | SUSE-SU-2023:3828-1 | HIGH | affected | sles | |
longhornio/longhorn-instance-manager:v1.6.2 | false | Harvester v1.3.2 | python3-base | python3-base@3.6.15-lp155.23.1 | SUSE-SU-2024:0901-1 | HIGH | affected | sles | |
longhornio/longhorn-instance-manager:v1.6.2 | false | Harvester v1.3.2 | python3-base | python3-base@3.6.15-lp155.23.1 | SUSE-SU-2024:3470-1 | HIGH | affected | sles | |
longhornio/longhorn-instance-manager:v1.6.2 | false | Harvester v1.3.2 | qemu-tools | qemu-tools@7.1.0-150500.49.15.1 | SUSE-SU-2024:3077-1 | HIGH | affected | sles | |
longhornio/longhorn-instance-manager:v1.6.2 | false | Harvester v1.3.2 | qemu-tools | qemu-tools@7.1.0-150500.49.15.1 | SUSE-SU-2024:3948-1 | HIGH | affected | sles | |
longhornio/longhorn-instance-manager:v1.6.2 | false | Harvester v1.3.2 | usr/local/bin/go-spdk-helper | stdlib@v1.22.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/longhorn-instance-manager:v1.6.2 | false | Harvester v1.3.2 | usr/local/bin/go-spdk-helper | stdlib@v1.22.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/longhorn-instance-manager:v1.6.2 | false | Harvester v1.3.2 | usr/local/bin/grpc_health_probe | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/longhorn-instance-manager:v1.6.2 | false | Harvester v1.3.2 | usr/local/bin/grpc_health_probe | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/longhorn-instance-manager:v1.6.2 | false | Harvester v1.3.2 | usr/local/bin/grpc_health_probe | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/longhorn-instance-manager:v1.6.2 | false | Harvester v1.3.2 | usr/local/bin/longhorn-instance-manager | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/longhorn-instance-manager:v1.6.2 | false | Harvester v1.3.2 | usr/local/bin/longhorn-instance-manager | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/longhorn-instance-manager:v1.6.2 | false | Harvester v1.3.2 | usr/local/bin/longhorn-instance-manager | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/longhorn-manager:v1.6.2 | false | Harvester v1.3.2 | bind-utils | bind-utils@9.16.48-150500.8.16.1 | SUSE-SU-2024:2862-1 | HIGH | affected | sles | |
longhornio/longhorn-manager:v1.6.2 | false | Harvester v1.3.2 | bind-utils | bind-utils@9.16.48-150500.8.16.1 | SUSE-SU-2025:0359-1 | HIGH | affected | sles | |
longhornio/longhorn-manager:v1.6.2 | false | Harvester v1.3.2 | glibc | glibc@2.31-150300.74.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
longhornio/longhorn-manager:v1.6.2 | false | Harvester v1.3.2 | krb5 | krb5@1.20.1-150500.3.6.1 | SUSE-SU-2024:2302-1 | HIGH | affected | sles | |
longhornio/longhorn-manager:v1.6.2 | false | Harvester v1.3.2 | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.8.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
longhornio/longhorn-manager:v1.6.2 | false | Harvester v1.3.2 | libopenssl1_1 | libopenssl1_1@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
longhornio/longhorn-manager:v1.6.2 | false | Harvester v1.3.2 | libopenssl1_1-hmac | libopenssl1_1-hmac@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
longhornio/longhorn-manager:v1.6.2 | false | Harvester v1.3.2 | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150400.9.6.1 | SUSE-SU-2024:3747-1 | HIGH | affected | sles | |
longhornio/longhorn-manager:v1.6.2 | false | Harvester v1.3.2 | libpython3_6m1_0 | libpython3_6m1_0@3.6.15-150300.10.60.1 | SUSE-SU-2024:3470-1 | HIGH | affected | sles | |
longhornio/longhorn-manager:v1.6.2 | false | Harvester v1.3.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
longhornio/longhorn-manager:v1.6.2 | false | Harvester v1.3.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
longhornio/longhorn-manager:v1.6.2 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
longhornio/longhorn-manager:v1.6.2 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
longhornio/longhorn-manager:v1.6.2 | false | Harvester v1.3.2 | openssl-1_1 | openssl-1_1@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
longhornio/longhorn-manager:v1.6.2 | false | Harvester v1.3.2 | perl-base | perl-base@5.26.1-150300.17.14.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
longhornio/longhorn-manager:v1.6.2 | false | Harvester v1.3.2 | python3 | python3@3.6.15-150300.10.60.1 | SUSE-SU-2024:3470-1 | HIGH | affected | sles | |
longhornio/longhorn-manager:v1.6.2 | false | Harvester v1.3.2 | python3-base | python3-base@3.6.15-150300.10.60.1 | SUSE-SU-2024:3470-1 | HIGH | affected | sles | |
longhornio/longhorn-manager:v1.6.2 | false | Harvester v1.3.2 | python3-bind | python3-bind@9.16.48-150500.8.16.1 | SUSE-SU-2024:2862-1 | HIGH | affected | sles | |
longhornio/longhorn-manager:v1.6.2 | false | Harvester v1.3.2 | python3-bind | python3-bind@9.16.48-150500.8.16.1 | SUSE-SU-2025:0359-1 | HIGH | affected | sles | |
longhornio/longhorn-manager:v1.6.2 | false | Harvester v1.3.2 | usr/local/sbin/longhorn-manager | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
longhornio/longhorn-manager:v1.6.2 | false | Harvester v1.3.2 | usr/local/sbin/longhorn-manager | k8s.io/kubernetes@v1.28.5 | CVE-2024-5321 | HIGH | affected | gobinary | |
longhornio/longhorn-manager:v1.6.2 | false | Harvester v1.3.2 | usr/local/sbin/longhorn-manager | stdlib@v1.22.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/longhorn-manager:v1.6.2 | false | Harvester v1.3.2 | usr/local/sbin/longhorn-manager | stdlib@v1.22.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/longhorn-share-manager:v1.6.2 | false | Harvester v1.3.2 | glibc | glibc@2.31-150300.74.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
longhornio/longhorn-share-manager:v1.6.2 | false | Harvester v1.3.2 | krb5 | krb5@1.20.1-150500.3.6.1 | SUSE-SU-2024:2302-1 | HIGH | affected | sles | |
longhornio/longhorn-share-manager:v1.6.2 | false | Harvester v1.3.2 | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.8.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
longhornio/longhorn-share-manager:v1.6.2 | false | Harvester v1.3.2 | libopenssl1_1 | libopenssl1_1@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
longhornio/longhorn-share-manager:v1.6.2 | false | Harvester v1.3.2 | libopenssl1_1-hmac | libopenssl1_1-hmac@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
longhornio/longhorn-share-manager:v1.6.2 | false | Harvester v1.3.2 | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150400.9.6.1 | SUSE-SU-2024:3747-1 | HIGH | affected | sles | |
longhornio/longhorn-share-manager:v1.6.2 | false | Harvester v1.3.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
longhornio/longhorn-share-manager:v1.6.2 | false | Harvester v1.3.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
longhornio/longhorn-share-manager:v1.6.2 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
longhornio/longhorn-share-manager:v1.6.2 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
longhornio/longhorn-share-manager:v1.6.2 | false | Harvester v1.3.2 | openssl-1_1 | openssl-1_1@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
longhornio/longhorn-share-manager:v1.6.2 | false | Harvester v1.3.2 | perl-base | perl-base@5.26.1-150300.17.14.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
longhornio/longhorn-share-manager:v1.6.2 | false | Harvester v1.3.2 | longhorn-share-manager | k8s.io/kubernetes@v1.28.5 | CVE-2024-5321 | HIGH | affected | gobinary | |
longhornio/longhorn-share-manager:v1.6.2 | false | Harvester v1.3.2 | longhorn-share-manager | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/longhorn-share-manager:v1.6.2 | false | Harvester v1.3.2 | longhorn-share-manager | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/longhorn-share-manager:v1.6.2 | false | Harvester v1.3.2 | longhorn-share-manager | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/longhorn-ui:v1.6.2 | false | Harvester v1.3.2 | glibc | glibc@2.31-150300.74.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
longhornio/longhorn-ui:v1.6.2 | false | Harvester v1.3.2 | krb5 | krb5@1.20.1-150500.3.6.1 | SUSE-SU-2024:2302-1 | HIGH | affected | sles | |
longhornio/longhorn-ui:v1.6.2 | false | Harvester v1.3.2 | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.8.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
longhornio/longhorn-ui:v1.6.2 | false | Harvester v1.3.2 | libopenssl1_1 | libopenssl1_1@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
longhornio/longhorn-ui:v1.6.2 | false | Harvester v1.3.2 | libopenssl1_1-hmac | libopenssl1_1-hmac@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
longhornio/longhorn-ui:v1.6.2 | false | Harvester v1.3.2 | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150400.9.6.1 | SUSE-SU-2024:3747-1 | HIGH | affected | sles | |
longhornio/longhorn-ui:v1.6.2 | false | Harvester v1.3.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
longhornio/longhorn-ui:v1.6.2 | false | Harvester v1.3.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
longhornio/longhorn-ui:v1.6.2 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
longhornio/longhorn-ui:v1.6.2 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
longhornio/longhorn-ui:v1.6.2 | false | Harvester v1.3.2 | libxml2-tools | libxml2-tools@2.10.3-150500.5.14.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
longhornio/longhorn-ui:v1.6.2 | false | Harvester v1.3.2 | libxml2-tools | libxml2-tools@2.10.3-150500.5.14.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
longhornio/longhorn-ui:v1.6.2 | false | Harvester v1.3.2 | nginx | nginx@1.21.5-150400.3.3.1 | SUSE-SU-2025:0282-1 | HIGH | affected | sles | |
longhornio/longhorn-ui:v1.6.2 | false | Harvester v1.3.2 | openssl-1_1 | openssl-1_1@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
longhornio/longhorn-ui:v1.6.2 | false | Harvester v1.3.2 | perl | perl@5.26.1-150300.17.14.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
longhornio/longhorn-ui:v1.6.2 | false | Harvester v1.3.2 | perl-base | perl-base@5.26.1-150300.17.14.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
longhornio/support-bundle-kit:v0.0.37 | false | Harvester v1.3.2 | glibc | glibc@2.31-150300.71.1 | SUSE-SU-2024:1375-1 | HIGH | affected | sles | |
longhornio/support-bundle-kit:v0.0.37 | false | Harvester v1.3.2 | glibc | glibc@2.31-150300.71.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
longhornio/support-bundle-kit:v0.0.37 | false | Harvester v1.3.2 | krb5 | krb5@1.20.1-150500.3.6.1 | SUSE-SU-2024:2302-1 | HIGH | affected | sles | |
longhornio/support-bundle-kit:v0.0.37 | false | Harvester v1.3.2 | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.8.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
longhornio/support-bundle-kit:v0.0.37 | false | Harvester v1.3.2 | libopenssl1_1 | libopenssl1_1@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
longhornio/support-bundle-kit:v0.0.37 | false | Harvester v1.3.2 | libopenssl1_1-hmac | libopenssl1_1-hmac@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
longhornio/support-bundle-kit:v0.0.37 | false | Harvester v1.3.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
longhornio/support-bundle-kit:v0.0.37 | false | Harvester v1.3.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
longhornio/support-bundle-kit:v0.0.37 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
longhornio/support-bundle-kit:v0.0.37 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
longhornio/support-bundle-kit:v0.0.37 | false | Harvester v1.3.2 | openssl-1_1 | openssl-1_1@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
longhornio/support-bundle-kit:v0.0.37 | false | Harvester v1.3.2 | perl-base | perl-base@5.26.1-150300.17.14.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
longhornio/support-bundle-kit:v0.0.37 | false | Harvester v1.3.2 | usr/bin/support-bundle-kit | stdlib@v1.20.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/support-bundle-kit:v0.0.37 | false | Harvester v1.3.2 | usr/bin/support-bundle-kit | stdlib@v1.20.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/support-bundle-kit:v0.0.37 | false | Harvester v1.3.2 | usr/bin/support-bundle-kit | stdlib@v1.20.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/support-bundle-kit:v0.0.37 | false | Harvester v1.3.2 | usr/bin/yq | stdlib@v1.22.1 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/support-bundle-kit:v0.0.37 | false | Harvester v1.3.2 | usr/bin/yq | stdlib@v1.22.1 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/support-bundle-kit:v0.0.37 | false | Harvester v1.3.2 | usr/bin/yq | stdlib@v1.22.1 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
longhornio/support-bundle-kit:v0.0.37 | false | Harvester v1.3.2 | usr/bin/yq | stdlib@v1.22.1 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/fleet-agent:v0.9.5 | false | Harvester v1.3.2 | git-core | git-core@2.35.3-150300.10.39.1 | SUSE-SU-2024:2656-1 | HIGH | affected | sles | |
rancher/fleet-agent:v0.9.5 | false | Harvester v1.3.2 | krb5 | krb5@1.20.1-150500.3.6.1 | SUSE-SU-2024:2302-1 | HIGH | affected | sles | |
rancher/fleet-agent:v0.9.5 | false | Harvester v1.3.2 | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.11.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
rancher/fleet-agent:v0.9.5 | false | Harvester v1.3.2 | libopenssl1_1 | libopenssl1_1@1.1.1l-150500.17.28.2 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/fleet-agent:v0.9.5 | false | Harvester v1.3.2 | libopenssl1_1-hmac | libopenssl1_1-hmac@1.1.1l-150500.17.28.2 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/fleet-agent:v0.9.5 | false | Harvester v1.3.2 | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150400.9.6.1 | SUSE-SU-2024:3747-1 | HIGH | affected | sles | |
rancher/fleet-agent:v0.9.5 | false | Harvester v1.3.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/fleet-agent:v0.9.5 | false | Harvester v1.3.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/fleet-agent:v0.9.5 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/fleet-agent:v0.9.5 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/fleet-agent:v0.9.5 | false | Harvester v1.3.2 | openssl-1_1 | openssl-1_1@1.1.1l-150500.17.28.2 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/fleet-agent:v0.9.5 | false | Harvester v1.3.2 | usr/bin/fleet | github.com/hashicorp/go-getter@v1.7.4 | CVE-2024-6257 | HIGH | affected | gobinary | |
rancher/fleet-agent:v0.9.5 | false | Harvester v1.3.2 | usr/bin/fleet | stdlib@v1.21.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/fleet-agent:v0.9.5 | false | Harvester v1.3.2 | usr/bin/fleet | stdlib@v1.21.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/fleet-agent:v0.9.5 | false | Harvester v1.3.2 | usr/bin/fleetagent | github.com/hashicorp/go-getter@v1.7.4 | CVE-2024-6257 | HIGH | affected | gobinary | |
rancher/fleet-agent:v0.9.5 | false | Harvester v1.3.2 | usr/bin/fleetagent | k8s.io/kubernetes@v1.28.8 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/fleet-agent:v0.9.5 | false | Harvester v1.3.2 | usr/bin/fleetagent | stdlib@v1.21.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/fleet-agent:v0.9.5 | false | Harvester v1.3.2 | usr/bin/fleetagent | stdlib@v1.21.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/fleet:v0.9.5 | false | Harvester v1.3.2 | git-core | git-core@2.35.3-150300.10.39.1 | SUSE-SU-2024:2656-1 | HIGH | affected | sles | |
rancher/fleet:v0.9.5 | false | Harvester v1.3.2 | krb5 | krb5@1.20.1-150500.3.6.1 | SUSE-SU-2024:2302-1 | HIGH | affected | sles | |
rancher/fleet:v0.9.5 | false | Harvester v1.3.2 | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.11.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
rancher/fleet:v0.9.5 | false | Harvester v1.3.2 | libopenssl1_1 | libopenssl1_1@1.1.1l-150500.17.28.2 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/fleet:v0.9.5 | false | Harvester v1.3.2 | libopenssl1_1-hmac | libopenssl1_1-hmac@1.1.1l-150500.17.28.2 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/fleet:v0.9.5 | false | Harvester v1.3.2 | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150400.9.6.1 | SUSE-SU-2024:3747-1 | HIGH | affected | sles | |
rancher/fleet:v0.9.5 | false | Harvester v1.3.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/fleet:v0.9.5 | false | Harvester v1.3.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/fleet:v0.9.5 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/fleet:v0.9.5 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/fleet:v0.9.5 | false | Harvester v1.3.2 | openssl-1_1 | openssl-1_1@1.1.1l-150500.17.28.2 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/fleet:v0.9.5 | false | Harvester v1.3.2 | usr/bin/fleetcontroller | github.com/go-git/go-git/v5@v5.11.0 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/fleet:v0.9.5 | false | Harvester v1.3.2 | usr/bin/fleetcontroller | github.com/go-git/go-git/v5@v5.11.0 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/fleet:v0.9.5 | false | Harvester v1.3.2 | usr/bin/fleetcontroller | github.com/hashicorp/go-getter@v1.7.4 | CVE-2024-6257 | HIGH | affected | gobinary | |
rancher/fleet:v0.9.5 | false | Harvester v1.3.2 | usr/bin/fleetcontroller | stdlib@v1.21.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/fleet:v0.9.5 | false | Harvester v1.3.2 | usr/bin/fleetcontroller | stdlib@v1.21.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/gitjob:v0.9.8 | false | Harvester v1.3.2 | git-core | git-core@2.35.3-150300.10.39.1 | SUSE-SU-2024:2656-1 | HIGH | affected | sles | |
rancher/gitjob:v0.9.8 | false | Harvester v1.3.2 | glibc | glibc@2.31-150300.74.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
rancher/gitjob:v0.9.8 | false | Harvester v1.3.2 | krb5 | krb5@1.20.1-150500.3.6.1 | SUSE-SU-2024:2302-1 | HIGH | affected | sles | |
rancher/gitjob:v0.9.8 | false | Harvester v1.3.2 | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.11.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
rancher/gitjob:v0.9.8 | false | Harvester v1.3.2 | libopenssl1_1 | libopenssl1_1@1.1.1l-150500.17.28.2 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/gitjob:v0.9.8 | false | Harvester v1.3.2 | libopenssl1_1-hmac | libopenssl1_1-hmac@1.1.1l-150500.17.28.2 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/gitjob:v0.9.8 | false | Harvester v1.3.2 | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150400.9.6.1 | SUSE-SU-2024:3747-1 | HIGH | affected | sles | |
rancher/gitjob:v0.9.8 | false | Harvester v1.3.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/gitjob:v0.9.8 | false | Harvester v1.3.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/gitjob:v0.9.8 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/gitjob:v0.9.8 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/gitjob:v0.9.8 | false | Harvester v1.3.2 | openssl-1_1 | openssl-1_1@1.1.1l-150500.17.28.2 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/gitjob:v0.9.8 | false | Harvester v1.3.2 | usr/bin/gitcloner | github.com/go-git/go-git/v5@v5.11.0 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/gitjob:v0.9.8 | false | Harvester v1.3.2 | usr/bin/gitcloner | github.com/go-git/go-git/v5@v5.11.0 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/gitjob:v0.9.8 | false | Harvester v1.3.2 | usr/bin/gitcloner | stdlib@v1.21.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/gitjob:v0.9.8 | false | Harvester v1.3.2 | usr/bin/gitcloner | stdlib@v1.21.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/gitjob:v0.9.8 | false | Harvester v1.3.2 | usr/bin/gitjob | github.com/go-git/go-git/v5@v5.11.0 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/gitjob:v0.9.8 | false | Harvester v1.3.2 | usr/bin/gitjob | github.com/go-git/go-git/v5@v5.11.0 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/gitjob:v0.9.8 | false | Harvester v1.3.2 | usr/bin/gitjob | stdlib@v1.21.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/gitjob:v0.9.8 | false | Harvester v1.3.2 | usr/bin/gitjob | stdlib@v1.21.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-addon-resizer:1.8.20-build20240410 | false | Harvester v1.3.2 | pod_nanny | golang.org/x/net@v0.17.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-addon-resizer:1.8.20-build20240410 | false | Harvester v1.3.2 | pod_nanny | stdlib@v1.20.14 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-addon-resizer:1.8.20-build20240410 | false | Harvester v1.3.2 | pod_nanny | stdlib@v1.20.14 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-addon-resizer:1.8.20-build20240410 | false | Harvester v1.3.2 | pod_nanny | stdlib@v1.20.14 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cluster-autoscaler:v1.8.10-build20240124 | false | Harvester v1.3.2 | cluster-proportional-autoscaler | stdlib@v1.20.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cluster-autoscaler:v1.8.10-build20240124 | false | Harvester v1.3.2 | cluster-proportional-autoscaler | stdlib@v1.20.7 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/hardened-cluster-autoscaler:v1.8.10-build20240124 | false | Harvester v1.3.2 | cluster-proportional-autoscaler | stdlib@v1.20.7 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cluster-autoscaler:v1.8.10-build20240124 | false | Harvester v1.3.2 | cluster-proportional-autoscaler | stdlib@v1.20.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cluster-autoscaler:v1.8.10-build20240124 | false | Harvester v1.3.2 | cluster-proportional-autoscaler | stdlib@v1.20.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-coredns:v1.11.1-build20240305 | false | Harvester v1.3.2 | glibc | glibc@2.31-150300.63.1 | SUSE-SU-2024:1375-1 | HIGH | affected | sles | |
rancher/hardened-coredns:v1.11.1-build20240305 | false | Harvester v1.3.2 | glibc | glibc@2.31-150300.63.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
rancher/hardened-coredns:v1.11.1-build20240305 | false | Harvester v1.3.2 | coredns | github.com/quic-go/quic-go@v0.37.4 | CVE-2024-22189 | HIGH | affected | gobinary | |
rancher/hardened-coredns:v1.11.1-build20240305 | false | Harvester v1.3.2 | coredns | google.golang.org/grpc@v1.57.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/hardened-coredns:v1.11.1-build20240305 | false | Harvester v1.3.2 | coredns | stdlib@v1.20.14 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-coredns:v1.11.1-build20240305 | false | Harvester v1.3.2 | coredns | stdlib@v1.20.14 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-coredns:v1.11.1-build20240305 | false | Harvester v1.3.2 | coredns | stdlib@v1.20.14 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-dns-node-cache:1.22.28-build20240125 | false | Harvester v1.3.2 | glibc | glibc@2.31-150300.63.1 | SUSE-SU-2024:1375-1 | HIGH | affected | sles | |
rancher/hardened-dns-node-cache:1.22.28-build20240125 | false | Harvester v1.3.2 | glibc | glibc@2.31-150300.63.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
rancher/hardened-dns-node-cache:1.22.28-build20240125 | false | Harvester v1.3.2 | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2023-5528 | HIGH | affected | gobinary | |
rancher/hardened-dns-node-cache:1.22.28-build20240125 | false | Harvester v1.3.2 | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2024-0793 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-dns-node-cache:1.22.28-build20240125 | false | Harvester v1.3.2 | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/hardened-dns-node-cache:1.22.28-build20240125 | false | Harvester v1.3.2 | node-cache | stdlib@v1.20.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-dns-node-cache:1.22.28-build20240125 | false | Harvester v1.3.2 | node-cache | stdlib@v1.20.7 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/hardened-dns-node-cache:1.22.28-build20240125 | false | Harvester v1.3.2 | node-cache | stdlib@v1.20.7 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-dns-node-cache:1.22.28-build20240125 | false | Harvester v1.3.2 | node-cache | stdlib@v1.20.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-dns-node-cache:1.22.28-build20240125 | false | Harvester v1.3.2 | node-cache | stdlib@v1.20.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-etcd:v3.5.13-k3s1-build20240531 | false | Harvester v1.3.2 | usr/local/bin/etcd | stdlib@v1.20.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-etcd:v3.5.13-k3s1-build20240531 | false | Harvester v1.3.2 | usr/local/bin/etcd | stdlib@v1.20.7 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/hardened-etcd:v3.5.13-k3s1-build20240531 | false | Harvester v1.3.2 | usr/local/bin/etcd | stdlib@v1.20.7 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-etcd:v3.5.13-k3s1-build20240531 | false | Harvester v1.3.2 | usr/local/bin/etcd | stdlib@v1.20.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-etcd:v3.5.13-k3s1-build20240531 | false | Harvester v1.3.2 | usr/local/bin/etcd | stdlib@v1.20.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-etcd:v3.5.13-k3s1-build20240531 | false | Harvester v1.3.2 | usr/local/bin/etcdctl | stdlib@v1.20.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-etcd:v3.5.13-k3s1-build20240531 | false | Harvester v1.3.2 | usr/local/bin/etcdctl | stdlib@v1.20.7 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/hardened-etcd:v3.5.13-k3s1-build20240531 | false | Harvester v1.3.2 | usr/local/bin/etcdctl | stdlib@v1.20.7 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-etcd:v3.5.13-k3s1-build20240531 | false | Harvester v1.3.2 | usr/local/bin/etcdctl | stdlib@v1.20.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-etcd:v3.5.13-k3s1-build20240531 | false | Harvester v1.3.2 | usr/local/bin/etcdctl | stdlib@v1.20.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-k8s-metrics-server:v0.7.1-build20240401 | false | Harvester v1.3.2 | metrics-server | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-k8s-metrics-server:v0.7.1-build20240401 | false | Harvester v1.3.2 | metrics-server | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-k8s-metrics-server:v0.7.1-build20240401 | false | Harvester v1.3.2 | metrics-server | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.28.12-rke2r1-build20240717 | false | Harvester v1.3.2 | usr/local/bin/kube-apiserver | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.28.12-rke2r1-build20240717 | false | Harvester v1.3.2 | usr/local/bin/kube-controller-manager | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.28.12-rke2r1-build20240717 | false | Harvester v1.3.2 | usr/local/bin/kube-proxy | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.28.12-rke2r1-build20240717 | false | Harvester v1.3.2 | usr/local/bin/kube-scheduler | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.28.12-rke2r1-build20240717 | false | Harvester v1.3.2 | usr/local/bin/kubeadm | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.28.12-rke2r1-build20240717 | false | Harvester v1.3.2 | usr/local/bin/kubectl | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.28.12-rke2r1-build20240717 | false | Harvester v1.3.2 | usr/local/bin/kubelet | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.0.2-build20240612 | false | Harvester v1.3.2 | thin_entrypoint | stdlib@v1.21.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.0.2-build20240612 | false | Harvester v1.3.2 | thin_entrypoint | stdlib@v1.21.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.0.2-build20240612 | false | Harvester v1.3.2 | usr/src/multus-cni/bin/multus | stdlib@v1.21.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.0.2-build20240612 | false | Harvester v1.3.2 | usr/src/multus-cni/bin/multus | stdlib@v1.21.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-cluster-repo:v1.3.2 | false | Harvester v1.3.2 | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.14.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
rancher/harvester-cluster-repo:v1.3.2 | false | Harvester v1.3.2 | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150500.12.2.2 | SUSE-SU-2024:3747-1 | HIGH | affected | sles | |
rancher/harvester-cluster-repo:v1.3.2 | false | Harvester v1.3.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-cluster-repo:v1.3.2 | false | Harvester v1.3.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-cluster-repo:v1.3.2 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/harvester-cluster-repo:v1.3.2 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/harvester-cluster-repo:v1.3.2 | false | Harvester v1.3.2 | nginx | nginx@1.21.5-150400.3.3.1 | SUSE-SU-2025:0282-1 | HIGH | affected | sles | |
rancher/harvester-eventrouter:v0.2.0 | false | Harvester v1.3.2 | usr/bin/eventrouter | stdlib@v1.21.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-eventrouter:v0.2.0 | false | Harvester v1.3.2 | usr/bin/eventrouter | stdlib@v1.21.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-load-balancer-webhook:v0.3.0 | false | Harvester v1.3.2 | usr/bin/harvester-load-balancer-webhook | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2019-12274 | HIGH | affected | gobinary | |
rancher/harvester-load-balancer-webhook:v0.3.0 | false | Harvester v1.3.2 | usr/bin/harvester-load-balancer-webhook | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2021-36775 | HIGH | affected | gobinary | |
rancher/harvester-load-balancer-webhook:v0.3.0 | false | Harvester v1.3.2 | usr/bin/harvester-load-balancer-webhook | github.com/rancher/steve@v0.0.0-20221209194631-acf9d31ce0dd | CVE-2024-52280 | HIGH | affected | gobinary | |
rancher/harvester-load-balancer-webhook:v0.3.0 | false | Harvester v1.3.2 | usr/bin/harvester-load-balancer-webhook | golang.org/x/crypto@v0.18.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-load-balancer-webhook:v0.3.0 | false | Harvester v1.3.2 | usr/bin/harvester-load-balancer-webhook | golang.org/x/net@v0.20.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-load-balancer-webhook:v0.3.0 | false | Harvester v1.3.2 | usr/bin/harvester-load-balancer-webhook | stdlib@v1.21.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-load-balancer-webhook:v0.3.0 | false | Harvester v1.3.2 | usr/bin/harvester-load-balancer-webhook | stdlib@v1.21.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-load-balancer:v0.3.0 | false | Harvester v1.3.2 | usr/bin/harvester-load-balancer | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2019-12274 | HIGH | affected | gobinary | |
rancher/harvester-load-balancer:v0.3.0 | false | Harvester v1.3.2 | usr/bin/harvester-load-balancer | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2021-36775 | HIGH | affected | gobinary | |
rancher/harvester-load-balancer:v0.3.0 | false | Harvester v1.3.2 | usr/bin/harvester-load-balancer | github.com/rancher/steve@v0.0.0-20221209194631-acf9d31ce0dd | CVE-2024-52280 | HIGH | affected | gobinary | |
rancher/harvester-load-balancer:v0.3.0 | false | Harvester v1.3.2 | usr/bin/harvester-load-balancer | golang.org/x/crypto@v0.18.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-load-balancer:v0.3.0 | false | Harvester v1.3.2 | usr/bin/harvester-load-balancer | golang.org/x/net@v0.20.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-load-balancer:v0.3.0 | false | Harvester v1.3.2 | usr/bin/harvester-load-balancer | stdlib@v1.21.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-load-balancer:v0.3.0 | false | Harvester v1.3.2 | usr/bin/harvester-load-balancer | stdlib@v1.21.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-network-controller:v0.4.1 | false | Harvester v1.3.2 | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.11.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
rancher/harvester-network-controller:v0.4.1 | false | Harvester v1.3.2 | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150500.12.2.2 | SUSE-SU-2024:3747-1 | HIGH | affected | sles | |
rancher/harvester-network-controller:v0.4.1 | false | Harvester v1.3.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-network-controller:v0.4.1 | false | Harvester v1.3.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-network-controller:v0.4.1 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/harvester-network-controller:v0.4.1 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/harvester-network-controller:v0.4.1 | false | Harvester v1.3.2 | usr/bin/harvester-network-controller | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2019-12274 | HIGH | affected | gobinary | |
rancher/harvester-network-controller:v0.4.1 | false | Harvester v1.3.2 | usr/bin/harvester-network-controller | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2021-36775 | HIGH | affected | gobinary | |
rancher/harvester-network-controller:v0.4.1 | false | Harvester v1.3.2 | usr/bin/harvester-network-controller | github.com/rancher/steve@v0.0.0-20221209194631-acf9d31ce0dd | CVE-2024-52280 | HIGH | affected | gobinary | |
rancher/harvester-network-controller:v0.4.1 | false | Harvester v1.3.2 | usr/bin/harvester-network-controller | kubevirt.io/kubevirt@v0.54.0 | CVE-2023-26484 | HIGH | affected | gobinary | |
rancher/harvester-network-controller:v0.4.1 | false | Harvester v1.3.2 | usr/bin/harvester-network-controller | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-network-helper:v0.4.1 | false | Harvester v1.3.2 | usr/bin/harvester-network-helper | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2019-12274 | HIGH | affected | gobinary | |
rancher/harvester-network-helper:v0.4.1 | false | Harvester v1.3.2 | usr/bin/harvester-network-helper | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2021-36775 | HIGH | affected | gobinary | |
rancher/harvester-network-helper:v0.4.1 | false | Harvester v1.3.2 | usr/bin/harvester-network-helper | github.com/rancher/steve@v0.0.0-20221209194631-acf9d31ce0dd | CVE-2024-52280 | HIGH | affected | gobinary | |
rancher/harvester-network-helper:v0.4.1 | false | Harvester v1.3.2 | usr/bin/harvester-network-helper | kubevirt.io/kubevirt@v0.54.0 | CVE-2023-26484 | HIGH | affected | gobinary | |
rancher/harvester-network-helper:v0.4.1 | false | Harvester v1.3.2 | usr/bin/harvester-network-helper | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-network-webhook:v0.4.1 | false | Harvester v1.3.2 | usr/bin/harvester-network-webhook | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2019-12274 | HIGH | affected | gobinary | |
rancher/harvester-network-webhook:v0.4.1 | false | Harvester v1.3.2 | usr/bin/harvester-network-webhook | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2021-36775 | HIGH | affected | gobinary | |
rancher/harvester-network-webhook:v0.4.1 | false | Harvester v1.3.2 | usr/bin/harvester-network-webhook | github.com/rancher/steve@v0.0.0-20221209194631-acf9d31ce0dd | CVE-2024-52280 | HIGH | affected | gobinary | |
rancher/harvester-network-webhook:v0.4.1 | false | Harvester v1.3.2 | usr/bin/harvester-network-webhook | kubevirt.io/kubevirt@v0.54.0 | CVE-2023-26484 | HIGH | affected | gobinary | |
rancher/harvester-network-webhook:v0.4.1 | false | Harvester v1.3.2 | usr/bin/harvester-network-webhook | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-node-disk-manager:v0.6.4 | false | Harvester v1.3.2 | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.11.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
rancher/harvester-node-disk-manager:v0.6.4 | false | Harvester v1.3.2 | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150500.12.2.2 | SUSE-SU-2024:3747-1 | HIGH | affected | sles | |
rancher/harvester-node-disk-manager:v0.6.4 | false | Harvester v1.3.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-node-disk-manager:v0.6.4 | false | Harvester v1.3.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-node-disk-manager:v0.6.4 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/harvester-node-disk-manager:v0.6.4 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/harvester-node-disk-manager:v0.6.4 | false | Harvester v1.3.2 | usr/bin/node-disk-manager | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-node-manager-webhook:v0.2.1 | false | Harvester v1.3.2 | glibc | glibc@2.31-150300.63.1 | SUSE-SU-2024:1375-1 | HIGH | affected | sles | |
rancher/harvester-node-manager-webhook:v0.2.1 | false | Harvester v1.3.2 | glibc | glibc@2.31-150300.63.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
rancher/harvester-node-manager-webhook:v0.2.1 | false | Harvester v1.3.2 | krb5 | krb5@1.20.1-150500.3.3.1 | SUSE-SU-2024:0997-1 | HIGH | affected | sles | |
rancher/harvester-node-manager-webhook:v0.2.1 | false | Harvester v1.3.2 | krb5 | krb5@1.20.1-150500.3.3.1 | SUSE-SU-2024:2302-1 | HIGH | affected | sles | |
rancher/harvester-node-manager-webhook:v0.2.1 | false | Harvester v1.3.2 | libblkid1 | libblkid1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/harvester-node-manager-webhook:v0.2.1 | false | Harvester v1.3.2 | libfdisk1 | libfdisk1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/harvester-node-manager-webhook:v0.2.1 | false | Harvester v1.3.2 | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.8.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
rancher/harvester-node-manager-webhook:v0.2.1 | false | Harvester v1.3.2 | libmount1 | libmount1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/harvester-node-manager-webhook:v0.2.1 | false | Harvester v1.3.2 | libnghttp2-14 | libnghttp2-14@1.40.0-150200.12.1 | SUSE-SU-2024:1167-1 | HIGH | affected | sles | |
rancher/harvester-node-manager-webhook:v0.2.1 | false | Harvester v1.3.2 | libopenssl1_1 | libopenssl1_1@1.1.1l-150500.17.22.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/harvester-node-manager-webhook:v0.2.1 | false | Harvester v1.3.2 | libopenssl1_1-hmac | libopenssl1_1-hmac@1.1.1l-150500.17.22.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/harvester-node-manager-webhook:v0.2.1 | false | Harvester v1.3.2 | libsmartcols1 | libsmartcols1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/harvester-node-manager-webhook:v0.2.1 | false | Harvester v1.3.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-node-manager-webhook:v0.2.1 | false | Harvester v1.3.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-node-manager-webhook:v0.2.1 | false | Harvester v1.3.2 | libuuid1 | libuuid1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/harvester-node-manager-webhook:v0.2.1 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.11.1 | SUSE-SU-2024:0555-1 | HIGH | affected | sles | |
rancher/harvester-node-manager-webhook:v0.2.1 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.11.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/harvester-node-manager-webhook:v0.2.1 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.11.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/harvester-node-manager-webhook:v0.2.1 | false | Harvester v1.3.2 | openssl-1_1 | openssl-1_1@1.1.1l-150500.17.22.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/harvester-node-manager-webhook:v0.2.1 | false | Harvester v1.3.2 | perl-base | perl-base@5.26.1-150300.17.14.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
rancher/harvester-node-manager-webhook:v0.2.1 | false | Harvester v1.3.2 | util-linux | util-linux@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/harvester-node-manager-webhook:v0.2.1 | false | Harvester v1.3.2 | usr/bin/harvester-node-manager-webhook | stdlib@v1.20.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-node-manager-webhook:v0.2.1 | false | Harvester v1.3.2 | usr/bin/harvester-node-manager-webhook | stdlib@v1.20.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-node-manager-webhook:v0.2.1 | false | Harvester v1.3.2 | usr/bin/harvester-node-manager-webhook | stdlib@v1.20.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-node-manager:v0.2.1 | false | Harvester v1.3.2 | glibc | glibc@2.31-150300.63.1 | SUSE-SU-2024:1375-1 | HIGH | affected | sles | |
rancher/harvester-node-manager:v0.2.1 | false | Harvester v1.3.2 | glibc | glibc@2.31-150300.63.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
rancher/harvester-node-manager:v0.2.1 | false | Harvester v1.3.2 | krb5 | krb5@1.20.1-150500.3.3.1 | SUSE-SU-2024:0997-1 | HIGH | affected | sles | |
rancher/harvester-node-manager:v0.2.1 | false | Harvester v1.3.2 | krb5 | krb5@1.20.1-150500.3.3.1 | SUSE-SU-2024:2302-1 | HIGH | affected | sles | |
rancher/harvester-node-manager:v0.2.1 | false | Harvester v1.3.2 | libblkid1 | libblkid1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/harvester-node-manager:v0.2.1 | false | Harvester v1.3.2 | libfdisk1 | libfdisk1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/harvester-node-manager:v0.2.1 | false | Harvester v1.3.2 | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.8.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
rancher/harvester-node-manager:v0.2.1 | false | Harvester v1.3.2 | libmount1 | libmount1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/harvester-node-manager:v0.2.1 | false | Harvester v1.3.2 | libnghttp2-14 | libnghttp2-14@1.40.0-150200.12.1 | SUSE-SU-2024:1167-1 | HIGH | affected | sles | |
rancher/harvester-node-manager:v0.2.1 | false | Harvester v1.3.2 | libopenssl1_1 | libopenssl1_1@1.1.1l-150500.17.22.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/harvester-node-manager:v0.2.1 | false | Harvester v1.3.2 | libopenssl1_1-hmac | libopenssl1_1-hmac@1.1.1l-150500.17.22.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/harvester-node-manager:v0.2.1 | false | Harvester v1.3.2 | libsmartcols1 | libsmartcols1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/harvester-node-manager:v0.2.1 | false | Harvester v1.3.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-node-manager:v0.2.1 | false | Harvester v1.3.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-node-manager:v0.2.1 | false | Harvester v1.3.2 | libuuid1 | libuuid1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/harvester-node-manager:v0.2.1 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.11.1 | SUSE-SU-2024:0555-1 | HIGH | affected | sles | |
rancher/harvester-node-manager:v0.2.1 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.11.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/harvester-node-manager:v0.2.1 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.11.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/harvester-node-manager:v0.2.1 | false | Harvester v1.3.2 | openssl-1_1 | openssl-1_1@1.1.1l-150500.17.22.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/harvester-node-manager:v0.2.1 | false | Harvester v1.3.2 | perl-base | perl-base@5.26.1-150300.17.14.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
rancher/harvester-node-manager:v0.2.1 | false | Harvester v1.3.2 | util-linux | util-linux@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/harvester-node-manager:v0.2.1 | false | Harvester v1.3.2 | usr/bin/harvester-node-manager | stdlib@v1.20.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-node-manager:v0.2.1 | false | Harvester v1.3.2 | usr/bin/harvester-node-manager | stdlib@v1.20.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-node-manager:v0.2.1 | false | Harvester v1.3.2 | usr/bin/harvester-node-manager | stdlib@v1.20.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-pcidevices:v0.3.3 | false | Harvester v1.3.2 | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.11.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
rancher/harvester-pcidevices:v0.3.3 | false | Harvester v1.3.2 | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150500.12.2.2 | SUSE-SU-2024:3747-1 | HIGH | affected | sles | |
rancher/harvester-pcidevices:v0.3.3 | false | Harvester v1.3.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-pcidevices:v0.3.3 | false | Harvester v1.3.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-pcidevices:v0.3.3 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/harvester-pcidevices:v0.3.3 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/harvester-pcidevices:v0.3.3 | false | Harvester v1.3.2 | bin/pcidevices | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-seeder:v0.3.2 | false | Harvester v1.3.2 | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.11.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
rancher/harvester-seeder:v0.3.2 | false | Harvester v1.3.2 | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150500.12.2.2 | SUSE-SU-2024:3747-1 | HIGH | affected | sles | |
rancher/harvester-seeder:v0.3.2 | false | Harvester v1.3.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-seeder:v0.3.2 | false | Harvester v1.3.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-seeder:v0.3.2 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/harvester-seeder:v0.3.2 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/harvester-seeder:v0.3.2 | false | Harvester v1.3.2 | bin/manager | stdlib@v1.21.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-upgrade:v1.3.2 | false | Harvester v1.3.2 | helm | helm@3.13.3-150000.1.32.1 | SUSE-SU-2025:0602-1 | HIGH | affected | sles | |
rancher/harvester-upgrade:v1.3.2 | false | Harvester v1.3.2 | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.14.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
rancher/harvester-upgrade:v1.3.2 | false | Harvester v1.3.2 | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150500.12.2.2 | SUSE-SU-2024:3747-1 | HIGH | affected | sles | |
rancher/harvester-upgrade:v1.3.2 | false | Harvester v1.3.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-upgrade:v1.3.2 | false | Harvester v1.3.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-upgrade:v1.3.2 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/harvester-upgrade:v1.3.2 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/harvester-upgrade:v1.3.2 | false | Harvester v1.3.2 | nginx | nginx@1.21.5-150400.3.3.1 | SUSE-SU-2025:0282-1 | HIGH | affected | sles | |
rancher/harvester-upgrade:v1.3.2 | false | Harvester v1.3.2 | rsync | rsync@3.2.3-150400.3.8.1 | SUSE-SU-2025:0165-1 | HIGH | affected | sles | |
rancher/harvester-upgrade:v1.3.2 | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.19.6 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-upgrade:v1.3.2 | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.19.6 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-upgrade:v1.3.2 | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.19.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-upgrade:v1.3.2 | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.19.6 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/harvester-upgrade:v1.3.2 | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.19.6 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-upgrade:v1.3.2 | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.19.6 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/harvester-upgrade:v1.3.2 | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.19.6 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/harvester-upgrade:v1.3.2 | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.19.6 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/harvester-upgrade:v1.3.2 | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.19.6 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/harvester-upgrade:v1.3.2 | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.19.6 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/harvester-upgrade:v1.3.2 | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.19.6 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-upgrade:v1.3.2 | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.19.6 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/harvester-upgrade:v1.3.2 | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.19.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-upgrade:v1.3.2 | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.19.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-upgrade:v1.3.2 | false | Harvester v1.3.2 | usr/bin/virtctl | stdlib@v1.19.9 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-upgrade:v1.3.2 | false | Harvester v1.3.2 | usr/bin/virtctl | stdlib@v1.19.9 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/harvester-upgrade:v1.3.2 | false | Harvester v1.3.2 | usr/bin/virtctl | stdlib@v1.19.9 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/harvester-upgrade:v1.3.2 | false | Harvester v1.3.2 | usr/bin/virtctl | stdlib@v1.19.9 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-upgrade:v1.3.2 | false | Harvester v1.3.2 | usr/bin/virtctl | stdlib@v1.19.9 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/harvester-upgrade:v1.3.2 | false | Harvester v1.3.2 | usr/bin/virtctl | stdlib@v1.19.9 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-upgrade:v1.3.2 | false | Harvester v1.3.2 | usr/bin/virtctl | stdlib@v1.19.9 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-upgrade:v1.3.2 | false | Harvester v1.3.2 | usr/bin/wharfie | github.com/docker/docker@v20.10.27+incompatible | CVE-2024-41110 | CRITICAL | affected | gobinary | |
rancher/harvester-upgrade:v1.3.2 | false | Harvester v1.3.2 | usr/bin/wharfie | golang.org/x/net@v0.17.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-upgrade:v1.3.2 | false | Harvester v1.3.2 | usr/bin/wharfie | stdlib@v1.20.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-upgrade:v1.3.2 | false | Harvester v1.3.2 | usr/bin/wharfie | stdlib@v1.20.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-upgrade:v1.3.2 | false | Harvester v1.3.2 | usr/bin/wharfie | stdlib@v1.20.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-upgrade:v1.3.2 | false | Harvester v1.3.2 | usr/bin/yq | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-upgrade:v1.3.2 | false | Harvester v1.3.2 | usr/local/bin/upgrade-helper | stdlib@v1.21.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-vm-import-controller:v0.3.2 | false | Harvester v1.3.2 | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.11.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
rancher/harvester-vm-import-controller:v0.3.2 | false | Harvester v1.3.2 | libgmodule-2_0-0 | libgmodule-2_0-0@2.70.5-150400.3.11.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
rancher/harvester-vm-import-controller:v0.3.2 | false | Harvester v1.3.2 | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150500.12.2.2 | SUSE-SU-2024:3747-1 | HIGH | affected | sles | |
rancher/harvester-vm-import-controller:v0.3.2 | false | Harvester v1.3.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-vm-import-controller:v0.3.2 | false | Harvester v1.3.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-vm-import-controller:v0.3.2 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/harvester-vm-import-controller:v0.3.2 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/harvester-vm-import-controller:v0.3.2 | false | Harvester v1.3.2 | qemu-tools | qemu-tools@7.1.0-150500.49.15.1 | SUSE-SU-2024:3077-1 | HIGH | affected | sles | |
rancher/harvester-vm-import-controller:v0.3.2 | false | Harvester v1.3.2 | qemu-tools | qemu-tools@7.1.0-150500.49.15.1 | SUSE-SU-2024:3948-1 | HIGH | affected | sles | |
rancher/harvester-vm-import-controller:v0.3.2 | false | Harvester v1.3.2 | usr/bin/vm-import-controller | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-webhook:v1.3.2 | false | Harvester v1.3.2 | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.14.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
rancher/harvester-webhook:v1.3.2 | false | Harvester v1.3.2 | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150500.12.2.2 | SUSE-SU-2024:3747-1 | HIGH | affected | sles | |
rancher/harvester-webhook:v1.3.2 | false | Harvester v1.3.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-webhook:v1.3.2 | false | Harvester v1.3.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-webhook:v1.3.2 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/harvester-webhook:v1.3.2 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/harvester-webhook:v1.3.2 | false | Harvester v1.3.2 | usr/bin/harvester-webhook | stdlib@v1.21.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester:v1.3.2 | false | Harvester v1.3.2 | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.14.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
rancher/harvester:v1.3.2 | false | Harvester v1.3.2 | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150500.12.2.2 | SUSE-SU-2024:3747-1 | HIGH | affected | sles | |
rancher/harvester:v1.3.2 | false | Harvester v1.3.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester:v1.3.2 | false | Harvester v1.3.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester:v1.3.2 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/harvester:v1.3.2 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/harvester:v1.3.2 | false | Harvester v1.3.2 | usr/bin/harvester | stdlib@v1.21.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | github.com/docker/docker@v23.0.1+incompatible | CVE-2023-28840 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | stdlib@v1.22.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | stdlib@v1.22.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | github.com/docker/docker@v23.0.1+incompatible | CVE-2023-28840 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | stdlib@v1.22.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | stdlib@v1.22.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2020-28362 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2021-27918 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2021-33195 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2021-33196 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2021-33198 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2021-39293 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v3 | stdlib@v1.22.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v3 | stdlib@v1.22.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2020-28362 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2021-27918 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2021-33195 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2021-33196 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2021-33198 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2021-39293 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/tiller | stdlib@v1.14.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2021-27918 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2021-33195 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2021-33196 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2021-33198 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2021-39293 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.15.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.16.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | curl | curl@7.79.1-r1 | CVE-2022-32207 | CRITICAL | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | curl | curl@7.79.1-r1 | CVE-2023-23914 | CRITICAL | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | curl | curl@7.79.1-r1 | CVE-2022-27781 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | curl | curl@7.79.1-r1 | CVE-2022-27782 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | curl | curl@7.79.1-r1 | CVE-2022-43551 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | curl | curl@7.79.1-r1 | CVE-2023-27533 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | curl | curl@7.79.1-r1 | CVE-2023-27534 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | libcrypto1.1 | libcrypto1.1@1.1.1n-r0 | CVE-2022-4450 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | libcrypto1.1 | libcrypto1.1@1.1.1n-r0 | CVE-2023-0215 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | libcrypto1.1 | libcrypto1.1@1.1.1n-r0 | CVE-2023-0286 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | libcrypto1.1 | libcrypto1.1@1.1.1n-r0 | CVE-2023-0464 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | libcurl | libcurl@7.79.1-r1 | CVE-2022-32207 | CRITICAL | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | libcurl | libcurl@7.79.1-r1 | CVE-2023-23914 | CRITICAL | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | libcurl | libcurl@7.79.1-r1 | CVE-2022-27781 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | libcurl | libcurl@7.79.1-r1 | CVE-2022-27782 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | libcurl | libcurl@7.79.1-r1 | CVE-2022-43551 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | libcurl | libcurl@7.79.1-r1 | CVE-2023-27533 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | libcurl | libcurl@7.79.1-r1 | CVE-2023-27534 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | libssl1.1 | libssl1.1@1.1.1n-r0 | CVE-2022-4450 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | libssl1.1 | libssl1.1@1.1.1n-r0 | CVE-2023-0215 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | libssl1.1 | libssl1.1@1.1.1n-r0 | CVE-2023-0286 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | libssl1.1 | libssl1.1@1.1.1n-r0 | CVE-2023-0464 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | ncurses-libs | ncurses-libs@6.2_p20210612-r0 | CVE-2022-29458 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | ncurses-terminfo-base | ncurses-terminfo-base@6.2_p20210612-r0 | CVE-2022-29458 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | ruby | ruby@2.7.6-r0 | CVE-2021-33621 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | ruby-etc | ruby-etc@2.7.6-r0 | CVE-2021-33621 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | ruby-io-console | ruby-io-console@2.7.6-r0 | CVE-2021-33621 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | ruby-irb | ruby-irb@2.7.6-r0 | CVE-2021-33621 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | ruby-libs | ruby-libs@2.7.6-r0 | CVE-2021-33621 | HIGH | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | zlib | zlib@1.2.12-r1 | CVE-2022-37434 | CRITICAL | affected | alpine | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | Ruby | activesupport@7.0.3 | CVE-2023-22796 | HIGH | affected | gemspec | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | Ruby | google-protobuf@3.20.1 | CVE-2024-7254 | HIGH | affected | gemspec | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | Ruby | kubeclient@4.9.1 | CVE-2022-0759 | HIGH | affected | gemspec | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | Ruby | opensearch-ruby@1.0.0 | CVE-2022-31115 | HIGH | affected | gemspec | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | Ruby | rack@2.2.3 | CVE-2022-30123 | CRITICAL | affected | gemspec | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | Ruby | rack@2.2.3 | CVE-2022-30122 | HIGH | affected | gemspec | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | Ruby | rack@2.2.3 | CVE-2022-44570 | HIGH | affected | gemspec | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | Ruby | rack@2.2.3 | CVE-2022-44571 | HIGH | affected | gemspec | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | Ruby | rack@2.2.3 | CVE-2022-44572 | HIGH | affected | gemspec | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | Ruby | rack@2.2.3 | CVE-2023-27530 | HIGH | affected | gemspec | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | Ruby | rack@2.2.3 | CVE-2024-26141 | HIGH | affected | gemspec | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | Ruby | rack@2.2.3 | CVE-2024-26146 | HIGH | affected | gemspec | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | Ruby | rack@2.2.3 | CVE-2025-27610 | HIGH | affected | gemspec | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | Ruby | tzinfo@1.2.7 | CVE-2022-31163 | HIGH | affected | gemspec | |
rancher/mirrored-banzaicloud-fluentd:v1.14.6-alpine-5 | true | Harvester v1.3.2 | Ruby | webrick@1.7.0 | CVE-2024-47220 | HIGH | affected | gemspec | |
rancher/mirrored-banzaicloud-logging-operator:3.17.10 | true | Harvester v1.3.2 | manager | github.com/prometheus/client_golang@v1.11.0 | CVE-2022-21698 | HIGH | affected | gobinary | |
rancher/mirrored-banzaicloud-logging-operator:3.17.10 | true | Harvester v1.3.2 | manager | golang.org/x/crypto@v0.0.0-20210817164053-32db794688a5 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-banzaicloud-logging-operator:3.17.10 | true | Harvester v1.3.2 | manager | golang.org/x/crypto@v0.0.0-20210817164053-32db794688a5 | CVE-2021-43565 | HIGH | affected | gobinary | |
rancher/mirrored-banzaicloud-logging-operator:3.17.10 | true | Harvester v1.3.2 | manager | golang.org/x/crypto@v0.0.0-20210817164053-32db794688a5 | CVE-2022-27191 | HIGH | affected | gobinary | |
rancher/mirrored-banzaicloud-logging-operator:3.17.10 | true | Harvester v1.3.2 | manager | golang.org/x/net@v0.0.0-20220114011407-0dd24b26b47d | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-banzaicloud-logging-operator:3.17.10 | true | Harvester v1.3.2 | manager | golang.org/x/net@v0.0.0-20220114011407-0dd24b26b47d | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-banzaicloud-logging-operator:3.17.10 | true | Harvester v1.3.2 | manager | golang.org/x/net@v0.0.0-20220114011407-0dd24b26b47d | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-banzaicloud-logging-operator:3.17.10 | true | Harvester v1.3.2 | manager | golang.org/x/net@v0.0.0-20220114011407-0dd24b26b47d | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-banzaicloud-logging-operator:3.17.10 | true | Harvester v1.3.2 | manager | golang.org/x/text@v0.3.7 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/mirrored-banzaicloud-logging-operator:3.17.10 | true | Harvester v1.3.2 | manager | stdlib@v1.17.13 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-banzaicloud-logging-operator:3.17.10 | true | Harvester v1.3.2 | manager | stdlib@v1.17.13 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-banzaicloud-logging-operator:3.17.10 | true | Harvester v1.3.2 | manager | stdlib@v1.17.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-banzaicloud-logging-operator:3.17.10 | true | Harvester v1.3.2 | manager | stdlib@v1.17.13 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-banzaicloud-logging-operator:3.17.10 | true | Harvester v1.3.2 | manager | stdlib@v1.17.13 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-banzaicloud-logging-operator:3.17.10 | true | Harvester v1.3.2 | manager | stdlib@v1.17.13 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-banzaicloud-logging-operator:3.17.10 | true | Harvester v1.3.2 | manager | stdlib@v1.17.13 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-banzaicloud-logging-operator:3.17.10 | true | Harvester v1.3.2 | manager | stdlib@v1.17.13 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-banzaicloud-logging-operator:3.17.10 | true | Harvester v1.3.2 | manager | stdlib@v1.17.13 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-banzaicloud-logging-operator:3.17.10 | true | Harvester v1.3.2 | manager | stdlib@v1.17.13 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-banzaicloud-logging-operator:3.17.10 | true | Harvester v1.3.2 | manager | stdlib@v1.17.13 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-banzaicloud-logging-operator:3.17.10 | true | Harvester v1.3.2 | manager | stdlib@v1.17.13 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-banzaicloud-logging-operator:3.17.10 | true | Harvester v1.3.2 | manager | stdlib@v1.17.13 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-banzaicloud-logging-operator:3.17.10 | true | Harvester v1.3.2 | manager | stdlib@v1.17.13 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-banzaicloud-logging-operator:3.17.10 | true | Harvester v1.3.2 | manager | stdlib@v1.17.13 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-banzaicloud-logging-operator:3.17.10 | true | Harvester v1.3.2 | manager | stdlib@v1.17.13 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-banzaicloud-logging-operator:3.17.10 | true | Harvester v1.3.2 | manager | stdlib@v1.17.13 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-banzaicloud-logging-operator:3.17.10 | true | Harvester v1.3.2 | manager | stdlib@v1.17.13 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-banzaicloud-logging-operator:3.17.10 | true | Harvester v1.3.2 | manager | stdlib@v1.17.13 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-banzaicloud-logging-operator:3.17.10 | true | Harvester v1.3.2 | manager | stdlib@v1.17.13 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-banzaicloud-logging-operator:3.17.10 | true | Harvester v1.3.2 | manager | stdlib@v1.17.13 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-banzaicloud-logging-operator:3.17.10 | true | Harvester v1.3.2 | manager | stdlib@v1.17.13 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-banzaicloud-logging-operator:3.17.10 | true | Harvester v1.3.2 | manager | stdlib@v1.17.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-banzaicloud-logging-operator:3.17.10 | true | Harvester v1.3.2 | manager | stdlib@v1.17.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cluster-api-controller:v1.4.4 | true | Harvester v1.3.2 | manager | golang.org/x/net@v0.8.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-cluster-api-controller:v1.4.4 | true | Harvester v1.3.2 | manager | stdlib@v1.19.6 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cluster-api-controller:v1.4.4 | true | Harvester v1.3.2 | manager | stdlib@v1.19.6 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cluster-api-controller:v1.4.4 | true | Harvester v1.3.2 | manager | stdlib@v1.19.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cluster-api-controller:v1.4.4 | true | Harvester v1.3.2 | manager | stdlib@v1.19.6 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-cluster-api-controller:v1.4.4 | true | Harvester v1.3.2 | manager | stdlib@v1.19.6 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cluster-api-controller:v1.4.4 | true | Harvester v1.3.2 | manager | stdlib@v1.19.6 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-cluster-api-controller:v1.4.4 | true | Harvester v1.3.2 | manager | stdlib@v1.19.6 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-cluster-api-controller:v1.4.4 | true | Harvester v1.3.2 | manager | stdlib@v1.19.6 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-cluster-api-controller:v1.4.4 | true | Harvester v1.3.2 | manager | stdlib@v1.19.6 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-cluster-api-controller:v1.4.4 | true | Harvester v1.3.2 | manager | stdlib@v1.19.6 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-cluster-api-controller:v1.4.4 | true | Harvester v1.3.2 | manager | stdlib@v1.19.6 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cluster-api-controller:v1.4.4 | true | Harvester v1.3.2 | manager | stdlib@v1.19.6 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-cluster-api-controller:v1.4.4 | true | Harvester v1.3.2 | manager | stdlib@v1.19.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cluster-api-controller:v1.4.4 | true | Harvester v1.3.2 | manager | stdlib@v1.19.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.3.2 | libc6 | libc6@2.31-13+deb11u7 | CVE-2024-2961 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.3.2 | libc6 | libc6@2.31-13+deb11u7 | CVE-2024-33599 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.3.2 | libcom-err2 | libcom-err2@1.46.2-2 | CVE-2022-1304 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.3.2 | libgcrypt20 | libgcrypt20@1.8.7-6 | CVE-2021-33560 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.3.2 | libgnutls30 | libgnutls30@3.7.1-5+deb11u3 | CVE-2024-0553 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.3.2 | libgnutls30 | libgnutls30@3.7.1-5+deb11u3 | CVE-2024-0567 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.3.2 | libgssapi-krb5-2 | libgssapi-krb5-2@1.18.3-6+deb11u4 | CVE-2024-37371 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.3.2 | libgssapi-krb5-2 | libgssapi-krb5-2@1.18.3-6+deb11u4 | CVE-2024-37370 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.3.2 | libk5crypto3 | libk5crypto3@1.18.3-6+deb11u4 | CVE-2024-37371 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.3.2 | libk5crypto3 | libk5crypto3@1.18.3-6+deb11u4 | CVE-2024-37370 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.3.2 | libkrb5-3 | libkrb5-3@1.18.3-6+deb11u4 | CVE-2024-37371 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.3.2 | libkrb5-3 | libkrb5-3@1.18.3-6+deb11u4 | CVE-2024-37370 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.3.2 | libkrb5support0 | libkrb5support0@1.18.3-6+deb11u4 | CVE-2024-37371 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.3.2 | libkrb5support0 | libkrb5support0@1.18.3-6+deb11u4 | CVE-2024-37370 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.3.2 | libldap-2.4-2 | libldap-2.4-2@2.4.57+dfsg-3+deb11u1 | CVE-2023-2953 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.3.2 | libpq5 | libpq5@13.11-0+deb11u1 | CVE-2023-39417 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.3.2 | libpq5 | libpq5@13.11-0+deb11u1 | CVE-2023-5869 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.3.2 | libpq5 | libpq5@13.11-0+deb11u1 | CVE-2024-0985 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.3.2 | libpq5 | libpq5@13.11-0+deb11u1 | CVE-2024-10979 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.3.2 | libpq5 | libpq5@13.11-0+deb11u1 | CVE-2024-7348 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.3.2 | libpq5 | libpq5@13.11-0+deb11u1 | CVE-2025-1094 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.3.2 | libzstd1 | libzstd1@1.4.8+dfsg-2.1 | CVE-2022-4899 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:2.2.0 | true | Harvester v1.3.2 | zlib1g | zlib1g@1:1.2.11.dfsg-2+deb11u2 | CVE-2023-45853 | CRITICAL | affected | debian | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | libcrypto1.1 | libcrypto1.1@1.1.1q-r0 | CVE-2022-4450 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | libcrypto1.1 | libcrypto1.1@1.1.1q-r0 | CVE-2023-0215 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | libcrypto1.1 | libcrypto1.1@1.1.1q-r0 | CVE-2023-0286 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | libcrypto1.1 | libcrypto1.1@1.1.1q-r0 | CVE-2023-0464 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | libssl1.1 | libssl1.1@1.1.1q-r0 | CVE-2022-4450 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | libssl1.1 | libssl1.1@1.1.1q-r0 | CVE-2023-0215 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | libssl1.1 | libssl1.1@1.1.1q-r0 | CVE-2023-0286 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | libssl1.1 | libssl1.1@1.1.1q-r0 | CVE-2023-0464 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | ncurses-libs | ncurses-libs@6.3_p20211120-r1 | CVE-2023-29491 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | ncurses-terminfo-base | ncurses-terminfo-base@6.3_p20211120-r1 | CVE-2023-29491 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-cli | github.com/elazarl/goproxy@v0.0.0-20220115173737-adb46da277ac | CVE-2023-37788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-cli | github.com/grafana/grafana-plugin-sdk-go@v0.139.0 | CVE-2024-8986 | CRITICAL | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-cli | golang.org/x/crypto@v0.0.0-20220622213112-05595931fe9d | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-cli | golang.org/x/net@v0.0.0-20220615171555-694bf12d69de | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-cli | golang.org/x/net@v0.0.0-20220615171555-694bf12d69de | CVE-2022-41721 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-cli | golang.org/x/net@v0.0.0-20220615171555-694bf12d69de | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-cli | golang.org/x/net@v0.0.0-20220615171555-694bf12d69de | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-cli | golang.org/x/net@v0.0.0-20220615171555-694bf12d69de | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-cli | golang.org/x/text@v0.3.7 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-cli | google.golang.org/grpc@v1.45.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-cli | stdlib@v1.17.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | github.com/elazarl/goproxy@v0.0.0-20220115173737-adb46da277ac | CVE-2023-37788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | github.com/go-git/go-git/v5@v5.4.2 | CVE-2023-49569 | CRITICAL | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | github.com/go-git/go-git/v5@v5.4.2 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | github.com/go-git/go-git/v5@v5.4.2 | CVE-2023-49568 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | github.com/go-git/go-git/v5@v5.4.2 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | github.com/grafana/grafana-plugin-sdk-go@v0.139.0 | CVE-2024-8986 | CRITICAL | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | golang.org/x/crypto@v0.0.0-20220622213112-05595931fe9d | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | golang.org/x/net@v0.0.0-20220615171555-694bf12d69de | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | golang.org/x/net@v0.0.0-20220615171555-694bf12d69de | CVE-2022-41721 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | golang.org/x/net@v0.0.0-20220615171555-694bf12d69de | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | golang.org/x/net@v0.0.0-20220615171555-694bf12d69de | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | golang.org/x/net@v0.0.0-20220615171555-694bf12d69de | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | golang.org/x/text@v0.3.7 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | google.golang.org/grpc@v1.45.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:9.1.5 | true | Harvester v1.3.2 | usr/share/grafana/bin/grafana-server | stdlib@v1.17.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.3.2 | kube-webhook-certgen | golang.org/x/net@v0.1.0 | CVE-2022-41721 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.3.2 | kube-webhook-certgen | golang.org/x/net@v0.1.0 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.3.2 | kube-webhook-certgen | golang.org/x/net@v0.1.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.3.2 | kube-webhook-certgen | golang.org/x/net@v0.1.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.3.2 | kube-webhook-certgen | stdlib@v1.19.4 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.3.2 | kube-webhook-certgen | stdlib@v1.19.4 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.3.2 | kube-webhook-certgen | stdlib@v1.19.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.3.2 | kube-webhook-certgen | stdlib@v1.19.4 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.3.2 | kube-webhook-certgen | stdlib@v1.19.4 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.3.2 | kube-webhook-certgen | stdlib@v1.19.4 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.3.2 | kube-webhook-certgen | stdlib@v1.19.4 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.3.2 | kube-webhook-certgen | stdlib@v1.19.4 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.3.2 | kube-webhook-certgen | stdlib@v1.19.4 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.3.2 | kube-webhook-certgen | stdlib@v1.19.4 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.3.2 | kube-webhook-certgen | stdlib@v1.19.4 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.3.2 | kube-webhook-certgen | stdlib@v1.19.4 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.3.2 | kube-webhook-certgen | stdlib@v1.19.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.3.2 | kube-webhook-certgen | stdlib@v1.19.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.3.2 | kube-webhook-certgen | stdlib@v1.19.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.3.2 | kube-webhook-certgen | stdlib@v1.19.4 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.3.2 | kube-webhook-certgen | stdlib@v1.19.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6 | true | Harvester v1.3.2 | kube-webhook-certgen | stdlib@v1.19.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20230312-helm-chart-4.5.2-28-g66a760794 | true | Harvester v1.3.2 | kube-webhook-certgen | golang.org/x/net@v0.7.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20230312-helm-chart-4.5.2-28-g66a760794 | true | Harvester v1.3.2 | kube-webhook-certgen | golang.org/x/net@v0.7.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20230312-helm-chart-4.5.2-28-g66a760794 | true | Harvester v1.3.2 | kube-webhook-certgen | stdlib@v1.20.1 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20230312-helm-chart-4.5.2-28-g66a760794 | true | Harvester v1.3.2 | kube-webhook-certgen | stdlib@v1.20.1 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20230312-helm-chart-4.5.2-28-g66a760794 | true | Harvester v1.3.2 | kube-webhook-certgen | stdlib@v1.20.1 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20230312-helm-chart-4.5.2-28-g66a760794 | true | Harvester v1.3.2 | kube-webhook-certgen | stdlib@v1.20.1 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20230312-helm-chart-4.5.2-28-g66a760794 | true | Harvester v1.3.2 | kube-webhook-certgen | stdlib@v1.20.1 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20230312-helm-chart-4.5.2-28-g66a760794 | true | Harvester v1.3.2 | kube-webhook-certgen | stdlib@v1.20.1 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20230312-helm-chart-4.5.2-28-g66a760794 | true | Harvester v1.3.2 | kube-webhook-certgen | stdlib@v1.20.1 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20230312-helm-chart-4.5.2-28-g66a760794 | true | Harvester v1.3.2 | kube-webhook-certgen | stdlib@v1.20.1 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20230312-helm-chart-4.5.2-28-g66a760794 | true | Harvester v1.3.2 | kube-webhook-certgen | stdlib@v1.20.1 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20230312-helm-chart-4.5.2-28-g66a760794 | true | Harvester v1.3.2 | kube-webhook-certgen | stdlib@v1.20.1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20230312-helm-chart-4.5.2-28-g66a760794 | true | Harvester v1.3.2 | kube-webhook-certgen | stdlib@v1.20.1 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20230312-helm-chart-4.5.2-28-g66a760794 | true | Harvester v1.3.2 | kube-webhook-certgen | stdlib@v1.20.1 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20230312-helm-chart-4.5.2-28-g66a760794 | true | Harvester v1.3.2 | kube-webhook-certgen | stdlib@v1.20.1 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | github.com/prometheus/client_golang@v1.7.0 | CVE-2022-21698 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2020-16845 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2020-28362 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2021-27918 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2021-33195 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2021-33196 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2021-33198 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2021-39293 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.4.0 | true | Harvester v1.3.2 | configmap-reload | stdlib@v1.14.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.24.6 | true | Harvester v1.3.2 | busybox | busybox@1.36.1-r0 | CVE-2022-48174 | CRITICAL | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.24.6 | true | Harvester v1.3.2 | busybox-binsh | busybox-binsh@1.36.1-r0 | CVE-2022-48174 | CRITICAL | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.24.6 | true | Harvester v1.3.2 | krb5-libs | krb5-libs@1.20.1-r1 | CVE-2024-37371 | CRITICAL | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.24.6 | true | Harvester v1.3.2 | krb5-libs | krb5-libs@1.20.1-r1 | CVE-2024-37370 | HIGH | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.24.6 | true | Harvester v1.3.2 | libcrypto3 | libcrypto3@3.1.1-r1 | CVE-2023-5363 | HIGH | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.24.6 | true | Harvester v1.3.2 | libexpat | libexpat@2.5.0-r1 | CVE-2024-45491 | CRITICAL | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.24.6 | true | Harvester v1.3.2 | libexpat | libexpat@2.5.0-r1 | CVE-2024-45492 | CRITICAL | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.24.6 | true | Harvester v1.3.2 | libexpat | libexpat@2.5.0-r1 | CVE-2023-52425 | HIGH | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.24.6 | true | Harvester v1.3.2 | libexpat | libexpat@2.5.0-r1 | CVE-2024-28757 | HIGH | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.24.6 | true | Harvester v1.3.2 | libexpat | libexpat@2.5.0-r1 | CVE-2024-45490 | HIGH | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.24.6 | true | Harvester v1.3.2 | libssl3 | libssl3@3.1.1-r1 | CVE-2023-5363 | HIGH | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.24.6 | true | Harvester v1.3.2 | sqlite-libs | sqlite-libs@3.41.2-r2 | CVE-2023-7104 | HIGH | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.24.6 | true | Harvester v1.3.2 | ssl_client | ssl_client@1.36.1-r0 | CVE-2022-48174 | CRITICAL | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.24.6 | true | Harvester v1.3.2 | Python | certifi@2023.5.7 | CVE-2023-37920 | HIGH | affected | python-pkg | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.24.6 | true | Harvester v1.3.2 | Python | setuptools@65.5.1 | CVE-2024-6345 | HIGH | affected | python-pkg | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.24.6 | true | Harvester v1.3.2 | Python | setuptools@68.0.0 | CVE-2024-6345 | HIGH | affected | python-pkg | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.24.6 | true | Harvester v1.3.2 | Python | urllib3@1.26.16 | CVE-2023-43804 | HIGH | affected | python-pkg | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.6.0 | true | Harvester v1.3.2 | kube-state-metrics | github.com/emicklei/go-restful@v2.9.5+incompatible | CVE-2022-1996 | CRITICAL | affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.6.0 | true | Harvester v1.3.2 | kube-state-metrics | golang.org/x/crypto@v0.0.0-20220315160706-3147a52a75dd | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.6.0 | true | Harvester v1.3.2 | kube-state-metrics | golang.org/x/net@v0.0.0-20220225172249-27dd8689420f | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.6.0 | true | Harvester v1.3.2 | kube-state-metrics | golang.org/x/net@v0.0.0-20220225172249-27dd8689420f | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.6.0 | true | Harvester v1.3.2 | kube-state-metrics | golang.org/x/net@v0.0.0-20220225172249-27dd8689420f | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.6.0 | true | Harvester v1.3.2 | kube-state-metrics | golang.org/x/net@v0.0.0-20220225172249-27dd8689420f | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.6.0 | true | Harvester v1.3.2 | kube-state-metrics | golang.org/x/text@v0.3.7 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.6.0 | true | Harvester v1.3.2 | kube-state-metrics | stdlib@v1.18.5 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.6.0 | true | Harvester v1.3.2 | kube-state-metrics | stdlib@v1.18.5 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.6.0 | true | Harvester v1.3.2 | kube-state-metrics | stdlib@v1.18.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.6.0 | true | Harvester v1.3.2 | kube-state-metrics | stdlib@v1.18.5 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.6.0 | true | Harvester v1.3.2 | kube-state-metrics | stdlib@v1.18.5 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.6.0 | true | Harvester v1.3.2 | kube-state-metrics | stdlib@v1.18.5 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.6.0 | true | Harvester v1.3.2 | kube-state-metrics | stdlib@v1.18.5 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.6.0 | true | Harvester v1.3.2 | kube-state-metrics | stdlib@v1.18.5 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.6.0 | true | Harvester v1.3.2 | kube-state-metrics | stdlib@v1.18.5 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.6.0 | true | Harvester v1.3.2 | kube-state-metrics | stdlib@v1.18.5 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.6.0 | true | Harvester v1.3.2 | kube-state-metrics | stdlib@v1.18.5 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.6.0 | true | Harvester v1.3.2 | kube-state-metrics | stdlib@v1.18.5 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.6.0 | true | Harvester v1.3.2 | kube-state-metrics | stdlib@v1.18.5 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.6.0 | true | Harvester v1.3.2 | kube-state-metrics | stdlib@v1.18.5 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.6.0 | true | Harvester v1.3.2 | kube-state-metrics | stdlib@v1.18.5 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.6.0 | true | Harvester v1.3.2 | kube-state-metrics | stdlib@v1.18.5 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.6.0 | true | Harvester v1.3.2 | kube-state-metrics | stdlib@v1.18.5 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.6.0 | true | Harvester v1.3.2 | kube-state-metrics | stdlib@v1.18.5 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.6.0 | true | Harvester v1.3.2 | kube-state-metrics | stdlib@v1.18.5 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.6.0 | true | Harvester v1.3.2 | kube-state-metrics | stdlib@v1.18.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.6.0 | true | Harvester v1.3.2 | kube-state-metrics | stdlib@v1.18.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.6.0 | true | Harvester v1.3.2 | kube-state-metrics | stdlib@v1.18.5 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.6.0 | true | Harvester v1.3.2 | kube-state-metrics | stdlib@v1.18.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.6.0 | true | Harvester v1.3.2 | kube-state-metrics | stdlib@v1.18.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-library-nginx:1.24.0-alpine | true | Harvester v1.3.2 | curl | curl@8.5.0-r0 | CVE-2024-2398 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.24.0-alpine | true | Harvester v1.3.2 | curl | curl@8.5.0-r0 | CVE-2024-6197 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.24.0-alpine | true | Harvester v1.3.2 | libcurl | libcurl@8.5.0-r0 | CVE-2024-2398 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.24.0-alpine | true | Harvester v1.3.2 | libcurl | libcurl@8.5.0-r0 | CVE-2024-6197 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.24.0-alpine | true | Harvester v1.3.2 | libexpat | libexpat@2.6.2-r0 | CVE-2024-45491 | CRITICAL | affected | alpine | |
rancher/mirrored-library-nginx:1.24.0-alpine | true | Harvester v1.3.2 | libexpat | libexpat@2.6.2-r0 | CVE-2024-45492 | CRITICAL | affected | alpine | |
rancher/mirrored-library-nginx:1.24.0-alpine | true | Harvester v1.3.2 | libexpat | libexpat@2.6.2-r0 | CVE-2024-45490 | HIGH | affected | alpine | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.3.2 | adapter | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.20.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.3.2 | adapter | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.20.0 | CVE-2023-45142 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.3.2 | adapter | golang.org/x/crypto@v0.0.0-20220214200702-86341886e292 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.3.2 | adapter | golang.org/x/crypto@v0.0.0-20220214200702-86341886e292 | CVE-2022-27191 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.3.2 | adapter | golang.org/x/net@v0.0.0-20220425223048-2871e0cb64e4 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.3.2 | adapter | golang.org/x/net@v0.0.0-20220425223048-2871e0cb64e4 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.3.2 | adapter | golang.org/x/net@v0.0.0-20220425223048-2871e0cb64e4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.3.2 | adapter | golang.org/x/net@v0.0.0-20220425223048-2871e0cb64e4 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.3.2 | adapter | golang.org/x/text@v0.3.7 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.3.2 | adapter | google.golang.org/grpc@v1.40.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.3.2 | adapter | stdlib@v1.18.5 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.3.2 | adapter | stdlib@v1.18.5 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.3.2 | adapter | stdlib@v1.18.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.3.2 | adapter | stdlib@v1.18.5 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.3.2 | adapter | stdlib@v1.18.5 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.3.2 | adapter | stdlib@v1.18.5 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.3.2 | adapter | stdlib@v1.18.5 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.3.2 | adapter | stdlib@v1.18.5 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.3.2 | adapter | stdlib@v1.18.5 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.3.2 | adapter | stdlib@v1.18.5 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.3.2 | adapter | stdlib@v1.18.5 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.3.2 | adapter | stdlib@v1.18.5 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.3.2 | adapter | stdlib@v1.18.5 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.3.2 | adapter | stdlib@v1.18.5 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.3.2 | adapter | stdlib@v1.18.5 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.3.2 | adapter | stdlib@v1.18.5 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.3.2 | adapter | stdlib@v1.18.5 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.3.2 | adapter | stdlib@v1.18.5 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.3.2 | adapter | stdlib@v1.18.5 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.3.2 | adapter | stdlib@v1.18.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.3.2 | adapter | stdlib@v1.18.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.3.2 | adapter | stdlib@v1.18.5 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.3.2 | adapter | stdlib@v1.18.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.10.0 | true | Harvester v1.3.2 | adapter | stdlib@v1.18.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/alertmanager | golang.org/x/net@v0.4.0 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/alertmanager | stdlib@v1.19.4 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/alertmanager | stdlib@v1.19.4 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/alertmanager | stdlib@v1.19.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/alertmanager | stdlib@v1.19.4 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/alertmanager | stdlib@v1.19.4 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/alertmanager | stdlib@v1.19.4 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/alertmanager | stdlib@v1.19.4 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/alertmanager | stdlib@v1.19.4 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/alertmanager | stdlib@v1.19.4 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/alertmanager | stdlib@v1.19.4 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/alertmanager | stdlib@v1.19.4 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/alertmanager | stdlib@v1.19.4 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/alertmanager | stdlib@v1.19.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/alertmanager | stdlib@v1.19.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/alertmanager | stdlib@v1.19.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/alertmanager | stdlib@v1.19.4 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/alertmanager | stdlib@v1.19.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/alertmanager | stdlib@v1.19.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/amtool | golang.org/x/net@v0.4.0 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/amtool | stdlib@v1.19.4 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/amtool | stdlib@v1.19.4 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/amtool | stdlib@v1.19.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/amtool | stdlib@v1.19.4 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/amtool | stdlib@v1.19.4 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/amtool | stdlib@v1.19.4 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/amtool | stdlib@v1.19.4 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/amtool | stdlib@v1.19.4 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/amtool | stdlib@v1.19.4 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/amtool | stdlib@v1.19.4 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/amtool | stdlib@v1.19.4 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/amtool | stdlib@v1.19.4 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/amtool | stdlib@v1.19.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/amtool | stdlib@v1.19.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/amtool | stdlib@v1.19.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/amtool | stdlib@v1.19.4 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/amtool | stdlib@v1.19.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/amtool | stdlib@v1.19.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | github.com/prometheus/client_golang@v1.11.0 | CVE-2022-21698 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | golang.org/x/crypto@v0.0.0-20210616213533-5ff15b29337e | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | golang.org/x/crypto@v0.0.0-20210616213533-5ff15b29337e | CVE-2021-43565 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | golang.org/x/crypto@v0.0.0-20210616213533-5ff15b29337e | CVE-2022-27191 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | golang.org/x/net@v0.0.0-20210525063256-abc453219eb5 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | golang.org/x/net@v0.0.0-20210525063256-abc453219eb5 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | golang.org/x/net@v0.0.0-20210525063256-abc453219eb5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | golang.org/x/net@v0.0.0-20210525063256-abc453219eb5 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | golang.org/x/text@v0.3.6 | CVE-2021-38561 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | golang.org/x/text@v0.3.6 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Harvester v1.3.2 | bin/node_exporter | stdlib@v1.17.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-config-reloader:v0.65.1 | true | Harvester v1.3.2 | bin/prometheus-config-reloader | stdlib@v1.20.3 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-config-reloader:v0.65.1 | true | Harvester v1.3.2 | bin/prometheus-config-reloader | stdlib@v1.20.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-config-reloader:v0.65.1 | true | Harvester v1.3.2 | bin/prometheus-config-reloader | stdlib@v1.20.3 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-config-reloader:v0.65.1 | true | Harvester v1.3.2 | bin/prometheus-config-reloader | stdlib@v1.20.3 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-config-reloader:v0.65.1 | true | Harvester v1.3.2 | bin/prometheus-config-reloader | stdlib@v1.20.3 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-config-reloader:v0.65.1 | true | Harvester v1.3.2 | bin/prometheus-config-reloader | stdlib@v1.20.3 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-config-reloader:v0.65.1 | true | Harvester v1.3.2 | bin/prometheus-config-reloader | stdlib@v1.20.3 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-config-reloader:v0.65.1 | true | Harvester v1.3.2 | bin/prometheus-config-reloader | stdlib@v1.20.3 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-config-reloader:v0.65.1 | true | Harvester v1.3.2 | bin/prometheus-config-reloader | stdlib@v1.20.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-operator:v0.65.1 | true | Harvester v1.3.2 | bin/operator | github.com/docker/distribution@v2.8.1+incompatible | CVE-2023-2253 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-operator:v0.65.1 | true | Harvester v1.3.2 | bin/operator | golang.org/x/net@v0.9.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-operator:v0.65.1 | true | Harvester v1.3.2 | bin/operator | golang.org/x/net@v0.9.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-operator:v0.65.1 | true | Harvester v1.3.2 | bin/operator | google.golang.org/grpc@v1.53.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-operator:v0.65.1 | true | Harvester v1.3.2 | bin/operator | stdlib@v1.20.3 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-operator:v0.65.1 | true | Harvester v1.3.2 | bin/operator | stdlib@v1.20.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-operator:v0.65.1 | true | Harvester v1.3.2 | bin/operator | stdlib@v1.20.3 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-operator:v0.65.1 | true | Harvester v1.3.2 | bin/operator | stdlib@v1.20.3 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-operator:v0.65.1 | true | Harvester v1.3.2 | bin/operator | stdlib@v1.20.3 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-operator:v0.65.1 | true | Harvester v1.3.2 | bin/operator | stdlib@v1.20.3 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-operator:v0.65.1 | true | Harvester v1.3.2 | bin/operator | stdlib@v1.20.3 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-operator:v0.65.1 | true | Harvester v1.3.2 | bin/operator | stdlib@v1.20.3 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-operator:v0.65.1 | true | Harvester v1.3.2 | bin/operator | stdlib@v1.20.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/prometheus | github.com/docker/distribution@v2.8.1+incompatible | CVE-2023-2253 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/prometheus | github.com/docker/docker@v20.10.23+incompatible | CVE-2023-28840 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/prometheus | golang.org/x/net@v0.5.0 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/prometheus | google.golang.org/grpc@v1.52.1 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/prometheus | stdlib@v1.19.5 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/prometheus | stdlib@v1.19.5 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/prometheus | stdlib@v1.19.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/prometheus | stdlib@v1.19.5 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/prometheus | stdlib@v1.19.5 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/prometheus | stdlib@v1.19.5 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/prometheus | stdlib@v1.19.5 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/prometheus | stdlib@v1.19.5 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/prometheus | stdlib@v1.19.5 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/prometheus | stdlib@v1.19.5 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/prometheus | stdlib@v1.19.5 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/prometheus | stdlib@v1.19.5 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/prometheus | stdlib@v1.19.5 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/prometheus | stdlib@v1.19.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/prometheus | stdlib@v1.19.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/prometheus | stdlib@v1.19.5 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/prometheus | stdlib@v1.19.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/prometheus | stdlib@v1.19.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/promtool | github.com/docker/distribution@v2.8.1+incompatible | CVE-2023-2253 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/promtool | github.com/docker/docker@v20.10.23+incompatible | CVE-2023-28840 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/promtool | golang.org/x/net@v0.5.0 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/promtool | google.golang.org/grpc@v1.52.1 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/promtool | stdlib@v1.19.5 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/promtool | stdlib@v1.19.5 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/promtool | stdlib@v1.19.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/promtool | stdlib@v1.19.5 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/promtool | stdlib@v1.19.5 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/promtool | stdlib@v1.19.5 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/promtool | stdlib@v1.19.5 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/promtool | stdlib@v1.19.5 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/promtool | stdlib@v1.19.5 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/promtool | stdlib@v1.19.5 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/promtool | stdlib@v1.19.5 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/promtool | stdlib@v1.19.5 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/promtool | stdlib@v1.19.5 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/promtool | stdlib@v1.19.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/promtool | stdlib@v1.19.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/promtool | stdlib@v1.19.5 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/promtool | stdlib@v1.19.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/promtool | stdlib@v1.19.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Harvester v1.3.2 | snapshot-controller | golang.org/x/net@v0.4.0 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Harvester v1.3.2 | snapshot-controller | golang.org/x/net@v0.4.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Harvester v1.3.2 | snapshot-controller | stdlib@v1.19 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Harvester v1.3.2 | snapshot-controller | stdlib@v1.19 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Harvester v1.3.2 | snapshot-controller | stdlib@v1.19 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Harvester v1.3.2 | snapshot-controller | stdlib@v1.19 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Harvester v1.3.2 | snapshot-controller | stdlib@v1.19 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Harvester v1.3.2 | snapshot-controller | stdlib@v1.19 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Harvester v1.3.2 | snapshot-controller | stdlib@v1.19 | CVE-2022-32190 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Harvester v1.3.2 | snapshot-controller | stdlib@v1.19 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Harvester v1.3.2 | snapshot-controller | stdlib@v1.19 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Harvester v1.3.2 | snapshot-controller | stdlib@v1.19 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Harvester v1.3.2 | snapshot-controller | stdlib@v1.19 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Harvester v1.3.2 | snapshot-controller | stdlib@v1.19 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Harvester v1.3.2 | snapshot-controller | stdlib@v1.19 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Harvester v1.3.2 | snapshot-controller | stdlib@v1.19 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Harvester v1.3.2 | snapshot-controller | stdlib@v1.19 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Harvester v1.3.2 | snapshot-controller | stdlib@v1.19 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Harvester v1.3.2 | snapshot-controller | stdlib@v1.19 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Harvester v1.3.2 | snapshot-controller | stdlib@v1.19 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Harvester v1.3.2 | snapshot-controller | stdlib@v1.19 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Harvester v1.3.2 | snapshot-controller | stdlib@v1.19 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Harvester v1.3.2 | snapshot-controller | stdlib@v1.19 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Harvester v1.3.2 | snapshot-controller | stdlib@v1.19 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Harvester v1.3.2 | snapshot-controller | stdlib@v1.19 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Harvester v1.3.2 | snapshot-controller | stdlib@v1.19 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Harvester v1.3.2 | snapshot-controller | stdlib@v1.19 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Harvester v1.3.2 | snapshot-validation-webhook | golang.org/x/net@v0.8.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Harvester v1.3.2 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Harvester v1.3.2 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Harvester v1.3.2 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Harvester v1.3.2 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Harvester v1.3.2 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Harvester v1.3.2 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Harvester v1.3.2 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2022-32190 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Harvester v1.3.2 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Harvester v1.3.2 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Harvester v1.3.2 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Harvester v1.3.2 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Harvester v1.3.2 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Harvester v1.3.2 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Harvester v1.3.2 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Harvester v1.3.2 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Harvester v1.3.2 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Harvester v1.3.2 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Harvester v1.3.2 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Harvester v1.3.2 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Harvester v1.3.2 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Harvester v1.3.2 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Harvester v1.3.2 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Harvester v1.3.2 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Harvester v1.3.2 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Harvester v1.3.2 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher-webhook:v0.4.7 | false | Harvester v1.3.2 | usr/bin/webhook | k8s.io/kubernetes@v1.28.6 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/rancher-webhook:v0.4.7 | false | Harvester v1.3.2 | usr/bin/webhook | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | git-core | git-core@2.35.3-150300.10.39.1 | SUSE-SU-2024:2656-1 | HIGH | affected | sles | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | krb5 | krb5@1.20.1-150500.3.6.1 | SUSE-SU-2024:2302-1 | HIGH | affected | sles | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.11.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | libopenssl1_1 | libopenssl1_1@1.1.1l-150500.17.28.2 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | libopenssl1_1-hmac | libopenssl1_1-hmac@1.1.1l-150500.17.28.2 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150400.9.6.1 | SUSE-SU-2024:3747-1 | HIGH | affected | sles | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | openssl-1_1 | openssl-1_1@1.1.1l-150500.17.28.2 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | opt/drivers/management-state/bin/docker-machine-driver-harvester | github.com/docker/docker@v20.10.9+incompatible | CVE-2023-28840 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | opt/drivers/management-state/bin/docker-machine-driver-harvester | kubevirt.io/kubevirt@v0.54.0 | CVE-2023-26484 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | opt/drivers/management-state/bin/docker-machine-driver-harvester | kubevirt.io/kubevirt@v0.54.0 | GHSA-qv98-3369-g364 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | opt/drivers/management-state/bin/docker-machine-driver-harvester | stdlib@v1.20.12 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | opt/drivers/management-state/bin/docker-machine-driver-harvester | stdlib@v1.20.12 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | opt/drivers/management-state/bin/docker-machine-driver-harvester | stdlib@v1.20.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | opt/drivers/management-state/bin/docker-machine-driver-linode | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | opt/drivers/management-state/bin/docker-machine-driver-linode | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | opt/drivers/management-state/bin/docker-machine-driver-linode | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | opt/drivers/management-state/bin/docker-machine-driver-linode | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | opt/drivers/management-state/bin/docker-machine-driver-linode | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/bandwidth | stdlib@v1.20.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/bandwidth | stdlib@v1.20.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/bandwidth | stdlib@v1.20.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/cni | stdlib@v1.20.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/cni | stdlib@v1.20.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/cni | stdlib@v1.20.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/containerd | github.com/jackc/pgx/v5@v5.4.2 | CVE-2024-27304 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/containerd | github.com/quic-go/quic-go@v0.38.2 | CVE-2024-22189 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/containerd | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/containerd | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/containerd | stdlib@v1.20.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/containerd | stdlib@v1.20.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/containerd | stdlib@v1.20.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/containerd-shim-runc-v2 | stdlib@v1.20.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/containerd-shim-runc-v2 | stdlib@v1.20.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/containerd-shim-runc-v2 | stdlib@v1.20.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/etcdctl | stdlib@v1.19.9 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/etcdctl | stdlib@v1.19.9 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/etcdctl | stdlib@v1.19.9 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/etcdctl | stdlib@v1.19.9 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/etcdctl | stdlib@v1.19.9 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/etcdctl | stdlib@v1.19.9 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/etcdctl | stdlib@v1.19.9 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/firewall | stdlib@v1.20.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/firewall | stdlib@v1.20.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/firewall | stdlib@v1.20.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/helm_v3 | stdlib@v1.20.11 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/helm_v3 | stdlib@v1.20.11 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/helm_v3 | stdlib@v1.20.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/k3s | github.com/jackc/pgx/v5@v5.4.2 | CVE-2024-27304 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/k3s | github.com/quic-go/quic-go@v0.38.2 | CVE-2024-22189 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/k3s | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/k3s | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/k3s | stdlib@v1.20.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/k3s | stdlib@v1.20.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/k3s | stdlib@v1.20.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/kustomize | stdlib@v1.19.7 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/kustomize | stdlib@v1.19.7 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/kustomize | stdlib@v1.19.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/kustomize | stdlib@v1.19.7 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/kustomize | stdlib@v1.19.7 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/kustomize | stdlib@v1.19.7 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/kustomize | stdlib@v1.19.7 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/kustomize | stdlib@v1.19.7 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/kustomize | stdlib@v1.19.7 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/kustomize | stdlib@v1.19.7 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/kustomize | stdlib@v1.19.7 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/kustomize | stdlib@v1.19.7 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/kustomize | stdlib@v1.19.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/kustomize | stdlib@v1.19.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/loglevel | stdlib@v1.17.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/rancher | github.com/crewjam/saml@v0.4.13 | CVE-2023-45683 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/rancher | github.com/rancher/apiserver@v0.0.0-20240207153744-69b3c2b56f3f | CVE-2023-32192 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/rancher | github.com/rancher/norman@v0.0.0-20240206180703-6eda4bc94b4c | CVE-2023-32193 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/rancher | github.com/rancher/rancher@v2.8.5 | CVE-2023-32197 | CRITICAL | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/rancher | github.com/rancher/rancher@v2.8.5 | CVE-2024-22036 | CRITICAL | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/rancher | github.com/rancher/rancher@v2.8.5 | CVE-2022-45157 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/rancher | github.com/rancher/rancher@v2.8.5 | CVE-2024-22030 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/rancher | github.com/rancher/rancher@v2.8.5 | CVE-2025-23388 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/rancher | github.com/rancher/rancher@v2.8.5 | CVE-2025-23389 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/rancher | github.com/rancher/steve@v0.0.0-20240411162517-a80bf83f76b4 | CVE-2024-52280 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/rancher | k8s.io/kubernetes@v1.28.6 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/rancher | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/rancher-machine | stdlib@v1.20.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/rancher-machine | stdlib@v1.20.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/rancher-machine | stdlib@v1.20.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/runc | golang.org/x/net@v0.8.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/runc | stdlib@v1.20.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/runc | stdlib@v1.20.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/runc | stdlib@v1.20.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/telemetry | stdlib@v1.21.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/telemetry | stdlib@v1.21.3 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/telemetry | stdlib@v1.21.3 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/telemetry | stdlib@v1.21.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/docker-machine-driver-harvester | github.com/docker/docker@v20.10.9+incompatible | CVE-2023-28840 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/docker-machine-driver-harvester | kubevirt.io/kubevirt@v0.54.0 | CVE-2023-26484 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/docker-machine-driver-harvester | kubevirt.io/kubevirt@v0.54.0 | GHSA-qv98-3369-g364 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/docker-machine-driver-harvester | stdlib@v1.20.12 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/docker-machine-driver-harvester | stdlib@v1.20.12 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/docker-machine-driver-harvester | stdlib@v1.20.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/docker-machine-driver-linode | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/docker-machine-driver-linode | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/docker-machine-driver-linode | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/docker-machine-driver-linode | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/docker-machine-driver-linode | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/wins.exe | github.com/docker/docker@v20.10.24+incompatible | CVE-2024-41110 | CRITICAL | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/wins.exe | golang.org/x/net@v0.12.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/wins.exe | golang.org/x/net@v0.12.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/wins.exe | google.golang.org/grpc@v1.45.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/wins.exe | k8s.io/kubernetes@v1.24.16 | CVE-2023-3676 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/wins.exe | k8s.io/kubernetes@v1.24.16 | CVE-2023-3955 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/wins.exe | k8s.io/kubernetes@v1.24.16 | CVE-2023-5528 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/wins.exe | k8s.io/kubernetes@v1.24.16 | CVE-2024-0793 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/wins.exe | k8s.io/kubernetes@v1.24.16 | CVE-2024-10220 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/wins.exe | k8s.io/kubernetes@v1.24.16 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/wins.exe | stdlib@v1.18.10 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/wins.exe | stdlib@v1.18.10 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/wins.exe | stdlib@v1.18.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/wins.exe | stdlib@v1.18.10 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/wins.exe | stdlib@v1.18.10 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/wins.exe | stdlib@v1.18.10 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/wins.exe | stdlib@v1.18.10 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/wins.exe | stdlib@v1.18.10 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/wins.exe | stdlib@v1.18.10 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/wins.exe | stdlib@v1.18.10 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/wins.exe | stdlib@v1.18.10 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/wins.exe | stdlib@v1.18.10 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/wins.exe | stdlib@v1.18.10 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/wins.exe | stdlib@v1.18.10 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/wins.exe | stdlib@v1.18.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/wins.exe | stdlib@v1.18.10 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/wins.exe | stdlib@v1.18.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/wins.exe | stdlib@v1.18.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-cloud-provider:v1.29.3-build20240515 | false | Harvester v1.3.2 | usr/local/bin/rke2-cloud-provider | stdlib@v1.21.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-cloud-provider:v1.29.3-build20240515 | false | Harvester v1.3.2 | usr/local/bin/rke2-cloud-provider | stdlib@v1.21.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/containerd | stdlib@v1.22.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/containerd | stdlib@v1.22.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/containerd-shim | stdlib@v1.22.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/containerd-shim | stdlib@v1.22.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/containerd-shim-runc-v1 | stdlib@v1.22.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/containerd-shim-runc-v1 | stdlib@v1.22.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/containerd-shim-runc-v2 | stdlib@v1.22.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/containerd-shim-runc-v2 | stdlib@v1.22.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/crictl | github.com/docker/docker@v23.0.1+incompatible | CVE-2023-28840 | HIGH | affected | gobinary | |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/crictl | k8s.io/kubernetes@v1.26.0 | CVE-2023-5528 | HIGH | affected | gobinary | |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/crictl | k8s.io/kubernetes@v1.26.0 | CVE-2024-0793 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/crictl | k8s.io/kubernetes@v1.26.0 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/crictl | stdlib@v1.19.5 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/crictl | stdlib@v1.19.5 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/crictl | stdlib@v1.19.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/crictl | stdlib@v1.19.5 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/crictl | stdlib@v1.19.5 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/crictl | stdlib@v1.19.5 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/crictl | stdlib@v1.19.5 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/crictl | stdlib@v1.19.5 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/crictl | stdlib@v1.19.5 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/crictl | stdlib@v1.19.5 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/crictl | stdlib@v1.19.5 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/crictl | stdlib@v1.19.5 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/crictl | stdlib@v1.19.5 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/crictl | stdlib@v1.19.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/crictl | stdlib@v1.19.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/crictl | stdlib@v1.19.5 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/crictl | stdlib@v1.19.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/crictl | stdlib@v1.19.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/ctr | stdlib@v1.22.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/ctr | stdlib@v1.22.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/kubectl | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/kubelet | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/runc | golang.org/x/net@v0.8.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/runc | stdlib@v1.20.12 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/runc | stdlib@v1.20.12 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/runc | stdlib@v1.20.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.26 | false | Harvester v1.3.2 | curl | curl@8.6.0-150600.2.2 | SUSE-SU-2024:2784-1 | HIGH | affected | sles | |
rancher/shell:v0.1.26 | false | Harvester v1.3.2 | libcurl4 | libcurl4@8.6.0-150600.2.2 | SUSE-SU-2024:2784-1 | HIGH | affected | sles | |
rancher/shell:v0.1.26 | false | Harvester v1.3.2 | libopenssl3 | libopenssl3@3.1.4-150600.5.7.1 | SUSE-SU-2024:2635-1 | HIGH | affected | sles | |
rancher/shell:v0.1.26 | false | Harvester v1.3.2 | libopenssl3 | libopenssl3@3.1.4-150600.5.7.1 | SUSE-SU-2024:3106-1 | HIGH | affected | sles | |
rancher/shell:v0.1.26 | false | Harvester v1.3.2 | libopenssl3 | libopenssl3@3.1.4-150600.5.7.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/shell:v0.1.26 | false | Harvester v1.3.2 | usr/local/bin/helm | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.26 | false | Harvester v1.3.2 | usr/local/bin/k9s | github.com/go-git/go-git/v5@v5.12.0 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.26 | false | Harvester v1.3.2 | usr/local/bin/k9s | github.com/go-git/go-git/v5@v5.12.0 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/shell:v0.1.26 | false | Harvester v1.3.2 | usr/local/bin/k9s | github.com/hashicorp/go-getter@v1.7.4 | CVE-2024-6257 | HIGH | affected | gobinary | |
rancher/shell:v0.1.26 | false | Harvester v1.3.2 | usr/local/bin/k9s | stdlib@v1.22.0 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.26 | false | Harvester v1.3.2 | usr/local/bin/k9s | stdlib@v1.22.0 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.26 | false | Harvester v1.3.2 | usr/local/bin/k9s | stdlib@v1.22.0 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.26 | false | Harvester v1.3.2 | usr/local/bin/k9s | stdlib@v1.22.0 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.26 | false | Harvester v1.3.2 | usr/local/bin/kubectl | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.26 | false | Harvester v1.3.2 | usr/local/bin/kubectl | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.26 | false | Harvester v1.3.2 | usr/local/bin/kubectl | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.26 | false | Harvester v1.3.2 | usr/local/bin/kustomize | stdlib@v1.21.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.26 | false | Harvester v1.3.2 | usr/local/bin/kustomize | stdlib@v1.21.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/support-bundle-kit:v0.0.38 | false | Harvester v1.3.2 | glibc | glibc@2.31-150300.74.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
rancher/support-bundle-kit:v0.0.38 | false | Harvester v1.3.2 | krb5 | krb5@1.20.1-150500.3.6.1 | SUSE-SU-2024:2302-1 | HIGH | affected | sles | |
rancher/support-bundle-kit:v0.0.38 | false | Harvester v1.3.2 | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.8.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
rancher/support-bundle-kit:v0.0.38 | false | Harvester v1.3.2 | libopenssl1_1 | libopenssl1_1@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/support-bundle-kit:v0.0.38 | false | Harvester v1.3.2 | libopenssl1_1-hmac | libopenssl1_1-hmac@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/support-bundle-kit:v0.0.38 | false | Harvester v1.3.2 | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150400.9.6.1 | SUSE-SU-2024:3747-1 | HIGH | affected | sles | |
rancher/support-bundle-kit:v0.0.38 | false | Harvester v1.3.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/support-bundle-kit:v0.0.38 | false | Harvester v1.3.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/support-bundle-kit:v0.0.38 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/support-bundle-kit:v0.0.38 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/support-bundle-kit:v0.0.38 | false | Harvester v1.3.2 | openssl-1_1 | openssl-1_1@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/support-bundle-kit:v0.0.38 | false | Harvester v1.3.2 | usr/bin/support-bundle-kit | stdlib@v1.21.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/support-bundle-kit:v0.0.38 | false | Harvester v1.3.2 | usr/bin/support-bundle-kit | stdlib@v1.21.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/support-bundle-kit:v0.0.38 | false | Harvester v1.3.2 | usr/bin/yq | stdlib@v1.22.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/support-bundle-kit:v0.0.38 | false | Harvester v1.3.2 | usr/bin/yq | stdlib@v1.22.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-agent-installer-rancher:v2.8.5 | false | Harvester v1.3.2 | helm | stdlib@v1.20.11 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-agent-installer-rancher:v2.8.5 | false | Harvester v1.3.2 | helm | stdlib@v1.20.11 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-agent-installer-rancher:v2.8.5 | false | Harvester v1.3.2 | helm | stdlib@v1.20.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | libcrypto3 | libcrypto3@3.1.2-r0 | CVE-2023-5363 | HIGH | affected | alpine | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | libssl3 | libssl3@3.1.2-r0 | CVE-2023-5363 | HIGH | affected | alpine | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | opt/rancher-system-agent-suc/rancher-system-agent | k8s.io/kubernetes@v1.27.10 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | opt/rancher-system-agent-suc/rancher-system-agent | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | opt/rancher-system-agent-suc/rancher-system-agent | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | opt/rancher-system-agent-suc/rancher-system-agent | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.18.1 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.18.1 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.18.1 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.18.1 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.18.1 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.18.1 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.18.1 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.18.1 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.18.1 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.18.1 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.18.1 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.18.1 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.18.1 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.18.1 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.18.1 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.18.1 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.18.1 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.18.1 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.18.1 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.18.1 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.18.1 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.18.1 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.18.1 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.18.1 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.18.1 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.18.1 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.18.1 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.18.1 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.18.1 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.18.1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.18.1 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.18.1 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.18.1 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | usr/bin/kubectl | stdlib@v1.18.1 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-upgrade-controller:v0.13.1 | false | Harvester v1.3.2 | bin/system-upgrade-controller | stdlib@v1.19.12 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-upgrade-controller:v0.13.1 | false | Harvester v1.3.2 | bin/system-upgrade-controller | stdlib@v1.19.12 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/system-upgrade-controller:v0.13.1 | false | Harvester v1.3.2 | bin/system-upgrade-controller | stdlib@v1.19.12 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-upgrade-controller:v0.13.1 | false | Harvester v1.3.2 | bin/system-upgrade-controller | stdlib@v1.19.12 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/system-upgrade-controller:v0.13.1 | false | Harvester v1.3.2 | bin/system-upgrade-controller | stdlib@v1.19.12 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-upgrade-controller:v0.13.1 | false | Harvester v1.3.2 | bin/system-upgrade-controller | stdlib@v1.19.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
registry.k8s.io/sig-storage/snapshot-controller:v6.3.3 | false | Harvester v1.3.2 | snapshot-controller | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
registry.k8s.io/sig-storage/snapshot-controller:v6.3.3 | false | Harvester v1.3.2 | snapshot-controller | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
registry.k8s.io/sig-storage/snapshot-controller:v6.3.3 | false | Harvester v1.3.2 | snapshot-controller | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
registry.k8s.io/sig-storage/snapshot-controller:v6.3.3 | false | Harvester v1.3.2 | snapshot-controller | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
registry.k8s.io/sig-storage/snapshot-controller:v6.3.3 | false | Harvester v1.3.2 | snapshot-controller | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
registry.k8s.io/sig-storage/snapshot-validation-webhook:v6.3.3 | false | Harvester v1.3.2 | snapshot-validation-webhook | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
registry.k8s.io/sig-storage/snapshot-validation-webhook:v6.3.3 | false | Harvester v1.3.2 | snapshot-validation-webhook | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
registry.k8s.io/sig-storage/snapshot-validation-webhook:v6.3.3 | false | Harvester v1.3.2 | snapshot-validation-webhook | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
registry.k8s.io/sig-storage/snapshot-validation-webhook:v6.3.3 | false | Harvester v1.3.2 | snapshot-validation-webhook | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
registry.k8s.io/sig-storage/snapshot-validation-webhook:v6.3.3 | false | Harvester v1.3.2 | snapshot-validation-webhook | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
registry.suse.com/bci/bci-base:15.5 | false | Harvester v1.3.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
registry.suse.com/bci/bci-base:15.5 | false | Harvester v1.3.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
registry.suse.com/bci/bci-base:15.5 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
registry.suse.com/bci/bci-base:15.5 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/libguestfs-tools:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | glib2-tools | glib2-tools@2.70.5-150400.3.11.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/libguestfs-tools:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | krb5 | krb5@1.20.1-150500.3.6.1 | SUSE-SU-2024:2302-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/libguestfs-tools:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libgio-2_0-0 | libgio-2_0-0@2.70.5-150400.3.11.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/libguestfs-tools:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.11.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/libguestfs-tools:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libgmodule-2_0-0 | libgmodule-2_0-0@2.70.5-150400.3.11.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/libguestfs-tools:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libgobject-2_0-0 | libgobject-2_0-0@2.70.5-150400.3.11.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/libguestfs-tools:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150500.12.2.2 | SUSE-SU-2024:3747-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/libguestfs-tools:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/libguestfs-tools:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/libguestfs-tools:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/libguestfs-tools:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/libguestfs-tools:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | qemu-tools | qemu-tools@7.1.0-150500.49.15.1 | SUSE-SU-2024:3077-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/libguestfs-tools:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | qemu-tools | qemu-tools@7.1.0-150500.49.15.1 | SUSE-SU-2024:3948-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-api:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | krb5 | krb5@1.20.1-150500.3.6.1 | SUSE-SU-2024:2302-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-api:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.11.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-api:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150500.12.2.2 | SUSE-SU-2024:3747-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-api:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-api:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-api:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-api:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-controller:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | krb5 | krb5@1.20.1-150500.3.6.1 | SUSE-SU-2024:2302-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-controller:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.11.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-controller:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150500.12.2.2 | SUSE-SU-2024:3747-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-controller:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-controller:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-controller:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-controller:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-handler:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | krb5 | krb5@1.20.1-150500.3.6.1 | SUSE-SU-2024:2302-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-handler:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.11.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-handler:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libgmodule-2_0-0 | libgmodule-2_0-0@2.70.5-150400.3.11.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-handler:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150500.12.2.2 | SUSE-SU-2024:3747-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-handler:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-handler:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-handler:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-handler:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-handler:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | qemu-tools | qemu-tools@7.1.0-150500.49.15.1 | SUSE-SU-2024:3077-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-handler:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | qemu-tools | qemu-tools@7.1.0-150500.49.15.1 | SUSE-SU-2024:3948-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-launcher:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | glib2-tools | glib2-tools@2.70.5-150400.3.11.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-launcher:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | krb5 | krb5@1.20.1-150500.3.6.1 | SUSE-SU-2024:2302-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-launcher:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libgio-2_0-0 | libgio-2_0-0@2.70.5-150400.3.11.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-launcher:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.11.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-launcher:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libgmodule-2_0-0 | libgmodule-2_0-0@2.70.5-150400.3.11.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-launcher:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libgobject-2_0-0 | libgobject-2_0-0@2.70.5-150400.3.11.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-launcher:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150500.12.2.2 | SUSE-SU-2024:3747-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-launcher:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-launcher:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-launcher:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-launcher:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-launcher:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | qemu | qemu@7.1.0-150500.49.15.1 | SUSE-SU-2024:3077-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-launcher:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | qemu | qemu@7.1.0-150500.49.15.1 | SUSE-SU-2024:3948-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-launcher:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | qemu-accel-tcg-x86 | qemu-accel-tcg-x86@7.1.0-150500.49.15.1 | SUSE-SU-2024:3077-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-launcher:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | qemu-accel-tcg-x86 | qemu-accel-tcg-x86@7.1.0-150500.49.15.1 | SUSE-SU-2024:3948-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-launcher:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | qemu-hw-usb-host | qemu-hw-usb-host@7.1.0-150500.49.15.1 | SUSE-SU-2024:3077-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-launcher:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | qemu-hw-usb-host | qemu-hw-usb-host@7.1.0-150500.49.15.1 | SUSE-SU-2024:3948-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-launcher:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | qemu-hw-usb-redirect | qemu-hw-usb-redirect@7.1.0-150500.49.15.1 | SUSE-SU-2024:3077-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-launcher:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | qemu-hw-usb-redirect | qemu-hw-usb-redirect@7.1.0-150500.49.15.1 | SUSE-SU-2024:3948-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-launcher:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | qemu-ipxe | qemu-ipxe@1.0.0+-150500.49.15.1 | SUSE-SU-2024:3077-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-launcher:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | qemu-ipxe | qemu-ipxe@1.0.0+-150500.49.15.1 | SUSE-SU-2024:3948-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-launcher:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | qemu-ovmf-x86_64 | qemu-ovmf-x86_64@202208-150500.4.1 | SUSE-SU-2025:0407-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-launcher:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | qemu-seabios | qemu-seabios@1.16.0_0_gd239552-150500.49.15.1 | SUSE-SU-2024:3077-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-launcher:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | qemu-seabios | qemu-seabios@1.16.0_0_gd239552-150500.49.15.1 | SUSE-SU-2024:3948-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-launcher:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | qemu-sgabios | qemu-sgabios@8-150500.49.15.1 | SUSE-SU-2024:3077-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-launcher:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | qemu-sgabios | qemu-sgabios@8-150500.49.15.1 | SUSE-SU-2024:3948-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-launcher:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | qemu-tools | qemu-tools@7.1.0-150500.49.15.1 | SUSE-SU-2024:3077-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-launcher:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | qemu-tools | qemu-tools@7.1.0-150500.49.15.1 | SUSE-SU-2024:3948-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-launcher:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | qemu-vgabios | qemu-vgabios@1.16.0_0_gd239552-150500.49.15.1 | SUSE-SU-2024:3077-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-launcher:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | qemu-vgabios | qemu-vgabios@1.16.0_0_gd239552-150500.49.15.1 | SUSE-SU-2024:3948-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-launcher:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | qemu-x86 | qemu-x86@7.1.0-150500.49.15.1 | SUSE-SU-2024:3077-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-launcher:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | qemu-x86 | qemu-x86@7.1.0-150500.49.15.1 | SUSE-SU-2024:3948-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-launcher:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | xen-libs | xen-libs@4.17.4_02-150500.3.30.1 | SUSE-SU-2024:2654-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-launcher:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | xen-libs | xen-libs@4.17.4_02-150500.3.30.1 | SUSE-SU-2024:3075-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-launcher:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | xen-libs | xen-libs@4.17.4_02-150500.3.30.1 | SUSE-SU-2024:3980-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-operator:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | krb5 | krb5@1.20.1-150500.3.6.1 | SUSE-SU-2024:2302-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-operator:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.11.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-operator:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150500.12.2.2 | SUSE-SU-2024:3747-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-operator:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-operator:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-operator:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
registry.suse.com/suse/sles/15.5/virt-operator:1.1.1-150500.8.18.1 | false | Harvester v1.3.2 | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
ghcr.io/kube-vip/kube-vip-iptables:v0.6.0 | false | Harvester v1.3.2 | kube-vip | golang.org/x/crypto@v0.1.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
ghcr.io/kube-vip/kube-vip-iptables:v0.6.0 | false | Harvester v1.3.2 | kube-vip | golang.org/x/net@v0.8.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
ghcr.io/kube-vip/kube-vip-iptables:v0.6.0 | false | Harvester v1.3.2 | kube-vip | golang.org/x/net@v0.8.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
longhornio/backing-image-manager:v1.6.2 | false | Harvester v1.3.2 | usr/local/bin/backing-image-manager | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
longhornio/csi-attacher:v4.5.1 | false | Harvester v1.3.2 | csi-attacher | golang.org/x/net@v0.18.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
longhornio/csi-node-driver-registrar:v2.9.2 | false | Harvester v1.3.2 | csi-node-driver-registrar | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
longhornio/csi-provisioner:v3.6.4 | false | Harvester v1.3.2 | csi-provisioner | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
longhornio/csi-resizer:v1.10.1 | false | Harvester v1.3.2 | csi-resizer | golang.org/x/net@v0.18.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
longhornio/csi-snapshotter:v6.3.4 | false | Harvester v1.3.2 | csi-snapshotter | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
longhornio/livenessprobe:v2.12.0 | false | Harvester v1.3.2 | livenessprobe | golang.org/x/net@v0.18.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
longhornio/longhorn-engine:v1.6.2 | false | Harvester v1.3.2 | usr/local/bin/grpc_health_probe | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
longhornio/longhorn-engine:v1.6.2 | false | Harvester v1.3.2 | usr/local/bin/grpc_health_probe | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
longhornio/longhorn-engine:v1.6.2 | false | Harvester v1.3.2 | usr/local/bin/longhorn | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
longhornio/longhorn-engine:v1.6.2 | false | Harvester v1.3.2 | usr/local/bin/longhorn-instance-manager | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
longhornio/longhorn-instance-manager:v1.6.2 | false | Harvester v1.3.2 | usr/local/bin/grpc_health_probe | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
longhornio/longhorn-instance-manager:v1.6.2 | false | Harvester v1.3.2 | usr/local/bin/grpc_health_probe | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
longhornio/longhorn-instance-manager:v1.6.2 | false | Harvester v1.3.2 | usr/local/bin/longhorn-instance-manager | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
longhornio/longhorn-manager:v1.6.2 | false | Harvester v1.3.2 | usr/local/sbin/longhorn-manager | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
longhornio/longhorn-manager:v1.6.2 | false | Harvester v1.3.2 | usr/local/sbin/longhorn-manager | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
longhornio/longhorn-manager:v1.6.2 | false | Harvester v1.3.2 | usr/local/sbin/longhorn-manager | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
longhornio/longhorn-manager:v1.6.2 | false | Harvester v1.3.2 | usr/local/sbin/longhorn-manager | k8s.io/kubernetes@v1.28.5 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
longhornio/longhorn-share-manager:v1.6.2 | false | Harvester v1.3.2 | longhorn-share-manager | golang.org/x/net@v0.21.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
longhornio/longhorn-share-manager:v1.6.2 | false | Harvester v1.3.2 | longhorn-share-manager | k8s.io/kubernetes@v1.28.5 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
longhornio/support-bundle-kit:v0.0.37 | false | Harvester v1.3.2 | usr/bin/yq | golang.org/x/net@v0.22.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/fleet-agent:v0.9.5 | false | Harvester v1.3.2 | usr/bin/fleet | github.com/docker/docker@v23.0.11+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/fleet-agent:v0.9.5 | false | Harvester v1.3.2 | usr/bin/fleet | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/fleet-agent:v0.9.5 | false | Harvester v1.3.2 | usr/bin/fleet | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/fleet-agent:v0.9.5 | false | Harvester v1.3.2 | usr/bin/fleetagent | github.com/docker/docker@v23.0.11+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/fleet-agent:v0.9.5 | false | Harvester v1.3.2 | usr/bin/fleetagent | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/fleet-agent:v0.9.5 | false | Harvester v1.3.2 | usr/bin/fleetagent | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/fleet-agent:v0.9.5 | false | Harvester v1.3.2 | usr/bin/fleetagent | k8s.io/kubernetes@v1.28.8 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/fleet:v0.9.5 | false | Harvester v1.3.2 | usr/bin/fleetcontroller | github.com/docker/docker@v23.0.11+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/fleet:v0.9.5 | false | Harvester v1.3.2 | usr/bin/fleetcontroller | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/fleet:v0.9.5 | false | Harvester v1.3.2 | usr/bin/fleetcontroller | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/gitjob:v0.9.8 | false | Harvester v1.3.2 | usr/bin/gitcloner | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/gitjob:v0.9.8 | false | Harvester v1.3.2 | usr/bin/gitcloner | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/gitjob:v0.9.8 | false | Harvester v1.3.2 | usr/bin/gitjob | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/gitjob:v0.9.8 | false | Harvester v1.3.2 | usr/bin/gitjob | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-cluster-autoscaler:v1.8.10-build20240124 | false | Harvester v1.3.2 | cluster-proportional-autoscaler | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-coredns:v1.11.1-build20240305 | false | Harvester v1.3.2 | coredns | golang.org/x/crypto@v0.12.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-coredns:v1.11.1-build20240305 | false | Harvester v1.3.2 | coredns | golang.org/x/net@v0.14.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-coredns:v1.11.1-build20240305 | false | Harvester v1.3.2 | coredns | golang.org/x/net@v0.14.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-dns-node-cache:1.22.28-build20240125 | false | Harvester v1.3.2 | node-cache | github.com/coredns/coredns@v1.10.0 | CVE-2023-28452 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-dns-node-cache:1.22.28-build20240125 | false | Harvester v1.3.2 | node-cache | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-dns-node-cache:1.22.28-build20240125 | false | Harvester v1.3.2 | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.13-k3s1-build20240531 | false | Harvester v1.3.2 | usr/local/bin/etcd | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.13-k3s1-build20240531 | false | Harvester v1.3.2 | usr/local/bin/etcd | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.13-k3s1-build20240531 | false | Harvester v1.3.2 | usr/local/bin/etcdctl | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.13-k3s1-build20240531 | false | Harvester v1.3.2 | usr/local/bin/etcdctl | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-k8s-metrics-server:v0.7.1-build20240401 | false | Harvester v1.3.2 | metrics-server | golang.org/x/crypto@v0.18.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-k8s-metrics-server:v0.7.1-build20240401 | false | Harvester v1.3.2 | metrics-server | golang.org/x/net@v0.20.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.28.12-rke2r1-build20240717 | false | Harvester v1.3.2 | usr/local/bin/kube-apiserver | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.12-rke2r1-build20240717 | false | Harvester v1.3.2 | usr/local/bin/kube-apiserver | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.12-rke2r1-build20240717 | false | Harvester v1.3.2 | usr/local/bin/kube-apiserver | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.12-rke2r1-build20240717 | false | Harvester v1.3.2 | usr/local/bin/kube-apiserver | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.12-rke2r1-build20240717 | false | Harvester v1.3.2 | usr/local/bin/kube-controller-manager | github.com/opencontainers/runc@v1.1.7 | CVE-2024-21626 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.12-rke2r1-build20240717 | false | Harvester v1.3.2 | usr/local/bin/kube-controller-manager | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.12-rke2r1-build20240717 | false | Harvester v1.3.2 | usr/local/bin/kube-controller-manager | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.12-rke2r1-build20240717 | false | Harvester v1.3.2 | usr/local/bin/kube-controller-manager | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.12-rke2r1-build20240717 | false | Harvester v1.3.2 | usr/local/bin/kube-controller-manager | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.12-rke2r1-build20240717 | false | Harvester v1.3.2 | usr/local/bin/kube-proxy | github.com/opencontainers/runc@v1.1.7 | CVE-2024-21626 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.12-rke2r1-build20240717 | false | Harvester v1.3.2 | usr/local/bin/kube-proxy | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.12-rke2r1-build20240717 | false | Harvester v1.3.2 | usr/local/bin/kube-proxy | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.12-rke2r1-build20240717 | false | Harvester v1.3.2 | usr/local/bin/kube-proxy | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.12-rke2r1-build20240717 | false | Harvester v1.3.2 | usr/local/bin/kube-proxy | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.12-rke2r1-build20240717 | false | Harvester v1.3.2 | usr/local/bin/kube-scheduler | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.12-rke2r1-build20240717 | false | Harvester v1.3.2 | usr/local/bin/kube-scheduler | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.12-rke2r1-build20240717 | false | Harvester v1.3.2 | usr/local/bin/kube-scheduler | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.12-rke2r1-build20240717 | false | Harvester v1.3.2 | usr/local/bin/kube-scheduler | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.12-rke2r1-build20240717 | false | Harvester v1.3.2 | usr/local/bin/kubeadm | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.12-rke2r1-build20240717 | false | Harvester v1.3.2 | usr/local/bin/kubeadm | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.12-rke2r1-build20240717 | false | Harvester v1.3.2 | usr/local/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.12-rke2r1-build20240717 | false | Harvester v1.3.2 | usr/local/bin/kubelet | github.com/opencontainers/runc@v1.1.7 | CVE-2024-21626 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.12-rke2r1-build20240717 | false | Harvester v1.3.2 | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.35.0 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.12-rke2r1-build20240717 | false | Harvester v1.3.2 | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.12-rke2r1-build20240717 | false | Harvester v1.3.2 | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.12-rke2r1-build20240717 | false | Harvester v1.3.2 | usr/local/bin/kubelet | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.12-rke2r1-build20240717 | false | Harvester v1.3.2 | usr/local/bin/kubelet | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-multus-cni:v4.0.2-build20240612 | false | Harvester v1.3.2 | usr/src/multus-cni/bin/multus | golang.org/x/net@v0.7.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-multus-cni:v4.0.2-build20240612 | false | Harvester v1.3.2 | usr/src/multus-cni/bin/multus | golang.org/x/net@v0.7.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-multus-cni:v4.0.2-build20240612 | false | Harvester v1.3.2 | usr/src/multus-cni/bin/multus | google.golang.org/grpc@v1.40.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-eventrouter:v0.2.0 | false | Harvester v1.3.2 | usr/bin/eventrouter | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-eventrouter:v0.2.0 | false | Harvester v1.3.2 | usr/bin/eventrouter | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-load-balancer-webhook:v0.3.0 | false | Harvester v1.3.2 | usr/bin/harvester-load-balancer-webhook | github.com/rancher/apiserver@v0.0.0-20230120214941-e88c32739dc7 | CVE-2023-32192 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-load-balancer-webhook:v0.3.0 | false | Harvester v1.3.2 | usr/bin/harvester-load-balancer-webhook | github.com/rancher/norman@v0.0.0-20221205184727-32ef2e185b99 | CVE-2023-32193 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-load-balancer-webhook:v0.3.0 | false | Harvester v1.3.2 | usr/bin/harvester-load-balancer-webhook | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-load-balancer:v0.3.0 | false | Harvester v1.3.2 | usr/bin/harvester-load-balancer | github.com/rancher/apiserver@v0.0.0-20230120214941-e88c32739dc7 | CVE-2023-32192 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-load-balancer:v0.3.0 | false | Harvester v1.3.2 | usr/bin/harvester-load-balancer | github.com/rancher/norman@v0.0.0-20221205184727-32ef2e185b99 | CVE-2023-32193 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-load-balancer:v0.3.0 | false | Harvester v1.3.2 | usr/bin/harvester-load-balancer | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-network-controller:v0.4.1 | false | Harvester v1.3.2 | usr/bin/harvester-network-controller | github.com/rancher/apiserver@v0.0.0-20230120214941-e88c32739dc7 | CVE-2023-32192 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-network-controller:v0.4.1 | false | Harvester v1.3.2 | usr/bin/harvester-network-controller | github.com/rancher/norman@v0.0.0-20221205184727-32ef2e185b99 | CVE-2023-32193 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-network-controller:v0.4.1 | false | Harvester v1.3.2 | usr/bin/harvester-network-controller | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.20.0 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-network-controller:v0.4.1 | false | Harvester v1.3.2 | usr/bin/harvester-network-controller | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-network-controller:v0.4.1 | false | Harvester v1.3.2 | usr/bin/harvester-network-controller | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-network-controller:v0.4.1 | false | Harvester v1.3.2 | usr/bin/harvester-network-controller | kubevirt.io/kubevirt@v0.54.0 | GHSA-qv98-3369-g364 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-network-helper:v0.4.1 | false | Harvester v1.3.2 | usr/bin/harvester-network-helper | github.com/rancher/apiserver@v0.0.0-20230120214941-e88c32739dc7 | CVE-2023-32192 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-network-helper:v0.4.1 | false | Harvester v1.3.2 | usr/bin/harvester-network-helper | github.com/rancher/norman@v0.0.0-20221205184727-32ef2e185b99 | CVE-2023-32193 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-network-helper:v0.4.1 | false | Harvester v1.3.2 | usr/bin/harvester-network-helper | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.20.0 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-network-helper:v0.4.1 | false | Harvester v1.3.2 | usr/bin/harvester-network-helper | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-network-helper:v0.4.1 | false | Harvester v1.3.2 | usr/bin/harvester-network-helper | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-network-helper:v0.4.1 | false | Harvester v1.3.2 | usr/bin/harvester-network-helper | kubevirt.io/kubevirt@v0.54.0 | GHSA-qv98-3369-g364 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-network-webhook:v0.4.1 | false | Harvester v1.3.2 | usr/bin/harvester-network-webhook | github.com/rancher/apiserver@v0.0.0-20230120214941-e88c32739dc7 | CVE-2023-32192 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-network-webhook:v0.4.1 | false | Harvester v1.3.2 | usr/bin/harvester-network-webhook | github.com/rancher/norman@v0.0.0-20221205184727-32ef2e185b99 | CVE-2023-32193 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-network-webhook:v0.4.1 | false | Harvester v1.3.2 | usr/bin/harvester-network-webhook | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.20.0 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-network-webhook:v0.4.1 | false | Harvester v1.3.2 | usr/bin/harvester-network-webhook | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-network-webhook:v0.4.1 | false | Harvester v1.3.2 | usr/bin/harvester-network-webhook | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-network-webhook:v0.4.1 | false | Harvester v1.3.2 | usr/bin/harvester-network-webhook | kubevirt.io/kubevirt@v0.54.0 | GHSA-qv98-3369-g364 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-node-disk-manager:v0.6.4 | false | Harvester v1.3.2 | usr/bin/node-disk-manager | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-node-disk-manager:v0.6.4 | false | Harvester v1.3.2 | usr/bin/node-disk-manager | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-node-manager-webhook:v0.2.1 | false | Harvester v1.3.2 | usr/bin/harvester-node-manager-webhook | golang.org/x/crypto@v0.18.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-node-manager-webhook:v0.2.1 | false | Harvester v1.3.2 | usr/bin/harvester-node-manager-webhook | golang.org/x/net@v0.20.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-node-manager:v0.2.1 | false | Harvester v1.3.2 | usr/bin/harvester-node-manager | golang.org/x/net@v0.20.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-pcidevices:v0.3.3 | false | Harvester v1.3.2 | bin/pcidevices | golang.org/x/crypto@v0.18.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-pcidevices:v0.3.3 | false | Harvester v1.3.2 | bin/pcidevices | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-seeder:v0.3.2 | false | Harvester v1.3.2 | bin/manager | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-seeder:v0.3.2 | false | Harvester v1.3.2 | bin/manager | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-upgrade:v1.3.2 | false | Harvester v1.3.2 | usr/bin/yq | golang.org/x/net@v0.27.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-vm-import-controller:v0.3.2 | false | Harvester v1.3.2 | usr/bin/vm-import-controller | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | github.com/docker/docker@v23.0.1+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | golang.org/x/crypto@v0.11.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | google.golang.org/grpc@v1.53.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | helm.sh/helm/v3@v3.12.3 | CVE-2024-26147 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | github.com/docker/docker@v23.0.1+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | golang.org/x/crypto@v0.11.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | google.golang.org/grpc@v1.53.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | helm.sh/helm/v3@v3.12.3 | CVE-2024-26147 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v3 | github.com/docker/docker@v24.0.9+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v3 | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.8.4-build20240523 | false | Harvester v1.3.2 | usr/bin/helm_v3 | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cluster-api-controller:v1.4.4 | true | Harvester v1.3.2 | manager | golang.org/x/crypto@v0.3.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cluster-api-controller:v1.4.4 | true | Harvester v1.3.2 | manager | golang.org/x/net@v0.8.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/alertmanager | golang.org/x/crypto@v0.1.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/alertmanager | golang.org/x/net@v0.4.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/alertmanager | golang.org/x/net@v0.4.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/amtool | golang.org/x/crypto@v0.1.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/amtool | golang.org/x/net@v0.4.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-prometheus-alertmanager:v0.25.0 | true | Harvester v1.3.2 | bin/amtool | golang.org/x/net@v0.4.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/prometheus | github.com/docker/docker@v20.10.23+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/prometheus | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.37.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/prometheus | golang.org/x/crypto@v0.1.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/prometheus | golang.org/x/net@v0.5.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/prometheus | golang.org/x/net@v0.5.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/promtool | github.com/docker/docker@v20.10.23+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/promtool | golang.org/x/crypto@v0.1.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/promtool | golang.org/x/net@v0.5.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-prometheus-prometheus:v2.42.0 | true | Harvester v1.3.2 | bin/promtool | golang.org/x/net@v0.5.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Harvester v1.3.2 | snapshot-controller | golang.org/x/net@v0.4.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Harvester v1.3.2 | snapshot-validation-webhook | golang.org/x/net@v0.8.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher-webhook:v0.4.7 | false | Harvester v1.3.2 | usr/bin/webhook | github.com/rancher/norman@v0.0.0-20240206180703-6eda4bc94b4c | CVE-2023-32193 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher-webhook:v0.4.7 | false | Harvester v1.3.2 | usr/bin/webhook | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher-webhook:v0.4.7 | false | Harvester v1.3.2 | usr/bin/webhook | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher-webhook:v0.4.7 | false | Harvester v1.3.2 | usr/bin/webhook | golang.org/x/crypto@v0.19.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher-webhook:v0.4.7 | false | Harvester v1.3.2 | usr/bin/webhook | golang.org/x/net@v0.21.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher-webhook:v0.4.7 | false | Harvester v1.3.2 | usr/bin/webhook | k8s.io/kubernetes@v1.28.6 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | opt/drivers/management-state/bin/docker-machine-driver-harvester | github.com/docker/docker@v20.10.9+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | opt/drivers/management-state/bin/docker-machine-driver-harvester | github.com/rancher/norman@v0.0.0-20221205184727-32ef2e185b99 | CVE-2023-32193 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | opt/drivers/management-state/bin/docker-machine-driver-harvester | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | opt/drivers/management-state/bin/docker-machine-driver-harvester | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | opt/drivers/management-state/bin/docker-machine-driver-linode | github.com/docker/docker@v20.10.25+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | opt/drivers/management-state/bin/docker-machine-driver-linode | golang.org/x/crypto@v0.10.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | opt/drivers/management-state/bin/docker-machine-driver-linode | golang.org/x/net@v0.11.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | opt/drivers/management-state/bin/docker-machine-driver-linode | golang.org/x/net@v0.11.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/containerd | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.35.0 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/containerd | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/containerd | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/containerd-shim-runc-v2 | github.com/opencontainers/runc@v1.1.5 | CVE-2024-21626 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/containerd-shim-runc-v2 | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/etcdctl | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.25.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/etcdctl | golang.org/x/crypto@v0.0.0-20220411220226-7b82a4e95df4 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/etcdctl | golang.org/x/net@v0.7.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/etcdctl | golang.org/x/net@v0.7.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/etcdctl | google.golang.org/grpc@v1.41.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/helm_v3 | github.com/docker/docker@v24.0.7+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/helm_v3 | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/helm_v3 | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/k3s | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.35.0 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/k3s | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/k3s | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/rancher | github.com/docker/docker@v20.10.25+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/rancher | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/rancher | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/rancher | golang.org/x/crypto@v0.19.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/rancher | golang.org/x/net@v0.21.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/rancher | k8s.io/kubernetes@v1.28.6 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/rancher-machine | github.com/moby/moby@v1.4.2-0.20170731201646-1009e6a40b29 | CVE-2024-36621 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/rancher-machine | github.com/moby/moby@v1.4.2-0.20170731201646-1009e6a40b29 | CVE-2024-36623 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/rancher-machine | golang.org/x/crypto@v0.16.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/rancher-machine | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/rancher-machine | google.golang.org/grpc@v1.40.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/runc | golang.org/x/net@v0.8.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/telemetry | github.com/rancher/norman@v0.0.0-20210709145327-afd06f533ca3 | CVE-2023-32193 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/telemetry | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/bin/telemetry | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/docker-machine-driver-harvester | github.com/docker/docker@v20.10.9+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/docker-machine-driver-harvester | github.com/rancher/norman@v0.0.0-20221205184727-32ef2e185b99 | CVE-2023-32193 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/docker-machine-driver-harvester | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/docker-machine-driver-harvester | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/docker-machine-driver-linode | github.com/docker/docker@v20.10.25+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/docker-machine-driver-linode | golang.org/x/crypto@v0.10.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/docker-machine-driver-linode | golang.org/x/net@v0.11.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8.5 | false | Harvester v1.3.2 | usr/share/rancher/ui/assets/docker-machine-driver-linode | golang.org/x/net@v0.11.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-cloud-provider:v1.29.3-build20240515 | false | Harvester v1.3.2 | usr/local/bin/rke2-cloud-provider | github.com/docker/docker@v25.0.4+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-cloud-provider:v1.29.3-build20240515 | false | Harvester v1.3.2 | usr/local/bin/rke2-cloud-provider | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-cloud-provider:v1.29.3-build20240515 | false | Harvester v1.3.2 | usr/local/bin/rke2-cloud-provider | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-cloud-provider:v1.29.3-build20240515 | false | Harvester v1.3.2 | usr/local/bin/rke2-cloud-provider | golang.org/x/net@v0.21.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/containerd | github.com/docker/docker@v24.0.7+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/containerd | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.45.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/containerd | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/containerd | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/containerd-shim-runc-v2 | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/crictl | github.com/docker/docker@v23.0.1+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/crictl | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/crictl | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.0 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/crictl | golang.org/x/net@v0.8.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/crictl | golang.org/x/net@v0.8.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/crictl | google.golang.org/grpc@v1.51.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/crictl | k8s.io/kubernetes@v1.26.0 | CVE-2023-3676 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/crictl | k8s.io/kubernetes@v1.26.0 | CVE-2023-3955 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/crictl | k8s.io/kubernetes@v1.26.0 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/ctr | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/kubelet | github.com/opencontainers/runc@v1.1.7 | CVE-2024-21626 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.35.0 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/kubelet | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/kubelet | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/kubelet | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/kubelet | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.12-rke2r1 | false | Harvester v1.3.2 | bin/runc | golang.org/x/net@v0.8.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.1.26 | false | Harvester v1.3.2 | usr/local/bin/helm | github.com/docker/docker@v24.0.7+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.1.26 | false | Harvester v1.3.2 | usr/local/bin/helm | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.1.26 | false | Harvester v1.3.2 | usr/local/bin/helm | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.1.26 | false | Harvester v1.3.2 | usr/local/bin/k9s | github.com/docker/docker@v26.0.1+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.1.26 | false | Harvester v1.3.2 | usr/local/bin/k9s | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/shell:v0.1.26 | false | Harvester v1.3.2 | usr/local/bin/k9s | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/shell:v0.1.26 | false | Harvester v1.3.2 | usr/local/bin/kubectl | github.com/docker/distribution@v2.8.1+incompatible | CVE-2023-2253 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.1.26 | false | Harvester v1.3.2 | usr/local/bin/kubectl | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/support-bundle-kit:v0.0.38 | false | Harvester v1.3.2 | usr/bin/yq | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/system-agent-installer-rancher:v2.8.5 | false | Harvester v1.3.2 | helm | github.com/docker/docker@v24.0.7+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/system-agent-installer-rancher:v2.8.5 | false | Harvester v1.3.2 | helm | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/system-agent-installer-rancher:v2.8.5 | false | Harvester v1.3.2 | helm | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | opt/rancher-system-agent-suc/rancher-system-agent | github.com/docker/docker@v24.0.7+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | opt/rancher-system-agent-suc/rancher-system-agent | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | opt/rancher-system-agent-suc/rancher-system-agent | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/system-agent:v0.3.6-suc | false | Harvester v1.3.2 | opt/rancher-system-agent-suc/rancher-system-agent | k8s.io/kubernetes@v1.27.10 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/system-upgrade-controller:v0.13.1 | false | Harvester v1.3.2 | bin/system-upgrade-controller | golang.org/x/net@v0.9.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/system-upgrade-controller:v0.13.1 | false | Harvester v1.3.2 | bin/system-upgrade-controller | golang.org/x/net@v0.9.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
registry.k8s.io/sig-storage/snapshot-controller:v6.3.3 | false | Harvester v1.3.2 | snapshot-controller | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
registry.k8s.io/sig-storage/snapshot-validation-webhook:v6.3.3 | false | Harvester v1.3.2 | snapshot-validation-webhook | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |