Search:
Image | Mirrored | Release | Binary/Package | Dependency | Vulnerability ID (CVE) | Severity | Status | Justification (for status not affected) | Type (language or OS) |
---|---|---|---|---|---|---|---|---|---|
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/bandwidth | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/calico | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/calico-ipam | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/flannel | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/host-local | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/install | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/loopback | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/tuning | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.3-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.3-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.3-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.3-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.3-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.3-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.3-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.3-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.3-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.3-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.3-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.3-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.3-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.3-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.3-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.3-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.3-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.3-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.3-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.3-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.3-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.3-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.3-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.3-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.3-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.3-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.3-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.3-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.3-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.3-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.3-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.3-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.3-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.3-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.3-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.3-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/bridge | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/bridge | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/bridge | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/dhcp | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/dhcp | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/dhcp | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/flannel | stdlib@v1.21.9 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/flannel | stdlib@v1.21.9 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/host-local | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/host-local | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/host-local | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/ipvlan | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/ipvlan | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/ipvlan | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/loopback | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/loopback | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/loopback | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/macvlan | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/macvlan | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/macvlan | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/ptp | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/ptp | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/ptp | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/tuning | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/tuning | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/tuning | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/vlan | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/vlan | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/vlan | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.3-build20250408 | false | Rancher head | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.1.4-150600.5.24.1 | SUSE-SU-2025:1550-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.3-build20250408 | false | Rancher head | libopenssl3 | libopenssl3@3.1.4-150600.5.24.1 | SUSE-SU-2025:1550-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.3-build20250408 | false | Rancher head | libsqlite3-0 | libsqlite3-0@3.44.0-150000.3.23.1 | SUSE-SU-2025:1456-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.3-build20250408 | false | Rancher head | openssl-3 | openssl-3@3.1.4-150600.5.24.1 | SUSE-SU-2025:1550-1 | HIGH | affected | sles | |
rancher/hardened-cni-plugins:v1.6.2-build20250306 | false | Rancher head | glibc | glibc@2.38-150600.14.23.1 | SUSE-SU-2025:01702-1 | HIGH | affected | sles | |
rancher/hardened-dns-node-cache:1.25.0-build20250127 | false | Rancher head | node-cache | github.com/coredns/coredns@v1.11.3 | CVE-2025-47950 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-flannel:v0.26.6-build20250414 | false | Rancher head | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.1.4-150600.5.24.1 | SUSE-SU-2025:1550-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.6-build20250414 | false | Rancher head | libopenssl3 | libopenssl3@3.1.4-150600.5.24.1 | SUSE-SU-2025:1550-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.6-build20250414 | false | Rancher head | libsoup-2_4-1 | libsoup-2_4-1@2.74.3-150600.4.3.1 | SUSE-SU-2025:01802-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.6-build20250414 | false | Rancher head | libsoup-2_4-1 | libsoup-2_4-1@2.74.3-150600.4.3.1 | SUSE-SU-2025:1503-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.6-build20250414 | false | Rancher head | libsqlite3-0 | libsqlite3-0@3.44.0-150000.3.23.1 | SUSE-SU-2025:1456-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.6-build20250414 | false | Rancher head | openssl-3 | openssl-3@3.1.4-150600.5.24.1 | SUSE-SU-2025:1550-1 | HIGH | affected | sles | |
rancher/hardened-multus-cni:v4.2.0-build20250326 | false | Rancher head | cert-approver | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.2.0-build20250326 | false | Rancher head | install_multus | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.2.0-build20250326 | false | Rancher head | kubeconfig_generator | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.2.0-build20250326 | false | Rancher head | thin_entrypoint | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.2.0-build20250326 | false | Rancher head | usr/src/multus-cni/bin/multus | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-whereabouts:v0.9.0-build20250403 | false | Rancher head | glibc | glibc@2.38-150600.14.23.1 | SUSE-SU-2025:01702-1 | HIGH | affected | sles | |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher head | glibc | glibc@2.38-150600.14.17.2 | SUSE-SU-2025:01702-1 | HIGH | affected | sles | |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher head | usr/bin/harvester-cloud-provider | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2023-22651 | CRITICAL | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher head | usr/bin/harvester-cloud-provider | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2019-12274 | HIGH | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher head | usr/bin/harvester-cloud-provider | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2021-36775 | HIGH | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher head | usr/bin/harvester-cloud-provider | github.com/rancher/steve@v0.0.0-20221209194631-acf9d31ce0dd | CVE-2024-52280 | HIGH | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher head | usr/bin/harvester-cloud-provider | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | glibc | glibc@2.38-150600.14.14.2 | SUSE-SU-2025:01702-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | libexpat1 | libexpat1@2.4.4-150400.3.22.1 | SUSE-SU-2025:1201-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | liblzma5 | liblzma5@5.4.1-150600.1.2 | SUSE-SU-2025:1137-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.1.4-150600.5.21.1 | SUSE-SU-2025:1550-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | libopenssl3 | libopenssl3@3.1.4-150600.5.21.1 | SUSE-SU-2025:1550-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | libsqlite3-0 | libsqlite3-0@3.44.0-150000.3.23.1 | SUSE-SU-2025:1456-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | openssl-3 | openssl-3@3.1.4-150600.5.21.1 | SUSE-SU-2025:1550-1 | HIGH | affected | sles | |
rancher/kube-api-auth:v0.2.4 | false | Rancher head | glibc | glibc@2.38-150600.14.20.3 | SUSE-SU-2025:01702-1 | HIGH | affected | sles | |
rancher/mirrored-bci-busybox:15.6.24.2 | true | Rancher head | glibc | glibc@2.38-150600.14.5.1 | SUSE-SU-2025:01702-1 | HIGH | affected | sles | |
rancher/mirrored-bci-micro:15.6.24.2 | true | Rancher head | glibc | glibc@2.38-150600.14.5.1 | SUSE-SU-2025:01702-1 | HIGH | affected | sles | |
rancher/mirrored-calico-ctl:v3.28.1 | true | Rancher head | usr/bin/calicoctl | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.28.1 | true | Rancher head | usr/bin/calicoctl | golang.org/x/crypto@v0.22.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-calico-ctl:v3.28.1 | true | Rancher head | usr/bin/calicoctl | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.28.1 | true | Rancher head | usr/bin/check-status | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.28.1 | true | Rancher head | usr/bin/kube-controllers | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.28.1 | true | Rancher head | usr/bin/calico-node | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.28.1 | true | Rancher head | usr/bin/calico-node | golang.org/x/crypto@v0.22.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-calico-node:v3.28.1 | true | Rancher head | usr/bin/calico-node | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.28.1 | true | Rancher head | usr/bin/mountns | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-pod2daemon-flexvol:v3.28.1 | true | Rancher head | usr/local/bin/flexvol | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-certgen:v0.2.1 | true | Rancher head | usr/bin/cilium-certgen | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-certgen:v0.2.1 | true | Rancher head | usr/bin/cilium-certgen | golang.org/x/crypto@v0.22.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-certgen:v0.2.1 | true | Rancher head | usr/bin/cilium-certgen | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | github.com/golang-jwt/jwt/v4@v4.5.0 | CVE-2025-30204 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.41.1 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.41.1 | CVE-2023-45142 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.8.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/net@v0.10.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | github.com/golang-jwt/jwt/v4@v4.5.0 | CVE-2025-30204 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.41.1 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.41.1 | CVE-2023-45142 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.11.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.11.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/net@v0.13.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.7 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.7 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.29.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | github.com/golang-jwt/jwt/v4@v4.5.0 | CVE-2025-30204 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.29.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.29.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.29.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.14.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.29.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.21.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.29.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.21.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.29.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.21.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.30.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | github.com/golang-jwt/jwt/v4@v4.5.0 | CVE-2025-30204 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.30.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.30.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.30.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.21.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.30.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.22.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.30.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.22.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | curl | curl@8.1.2-7.ph4 | CVE-2024-2398 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | curl | curl@8.1.2-7.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | curl-libs | curl-libs@8.1.2-7.ph4 | CVE-2024-2398 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | curl-libs | curl-libs@8.1.2-7.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | elfutils | elfutils@0.181-7.ph4 | CVE-2025-1372 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | elfutils | elfutils@0.181-7.ph4 | CVE-2025-1377 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | elfutils-libelf | elfutils-libelf@0.181-7.ph4 | CVE-2025-1372 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | elfutils-libelf | elfutils-libelf@0.181-7.ph4 | CVE-2025-1377 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | expat | expat@2.2.9-11.ph4 | CVE-2024-45491 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | expat | expat@2.2.9-11.ph4 | CVE-2024-45492 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | expat | expat@2.2.9-11.ph4 | CVE-2023-52425 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | expat | expat@2.2.9-11.ph4 | CVE-2024-28757 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | expat | expat@2.2.9-11.ph4 | CVE-2024-45490 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | expat | expat@2.2.9-11.ph4 | CVE-2024-8176 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-45491 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-45492 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2023-52425 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-28757 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-45490 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-8176 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | glib | glib@2.68.4-1.ph4 | CVE-2024-52533 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | glibc | glibc@2.32-15.ph4 | CVE-2024-2961 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | glibc | glibc@2.32-15.ph4 | CVE-2024-33599 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | glibc | glibc@2.32-15.ph4 | CVE-2024-33601 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | glibc | glibc@2.32-15.ph4 | CVE-2024-33602 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | glibc-iconv | glibc-iconv@2.32-15.ph4 | CVE-2024-2961 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | glibc-iconv | glibc-iconv@2.32-15.ph4 | CVE-2024-33599 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | glibc-iconv | glibc-iconv@2.32-15.ph4 | CVE-2024-33601 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | glibc-iconv | glibc-iconv@2.32-15.ph4 | CVE-2024-33602 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | krb5 | krb5@1.17-10.ph4 | CVE-2024-37371 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | krb5 | krb5@1.17-10.ph4 | CVE-2024-26461 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | krb5 | krb5@1.17-10.ph4 | CVE-2024-37370 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2024-34459 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2024-56171 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2025-24928 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | nss-libs | nss-libs@3.72-4.ph4 | CVE-2024-0743 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | openssl | openssl@3.0.13-2.ph4 | CVE-2024-5535 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | openssl | openssl@3.0.13-2.ph4 | CVE-2024-4741 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | openssl | openssl@3.0.13-2.ph4 | CVE-2024-6119 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | python3 | python3@3.10.11-7.ph4 | CVE-2023-6597 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | python3 | python3@3.10.11-7.ph4 | CVE-2024-6232 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | python3 | python3@3.10.11-7.ph4 | cve-2024-7592 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | python3-libs | python3-libs@3.10.11-7.ph4 | CVE-2023-6597 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | python3-libs | python3-libs@3.10.11-7.ph4 | CVE-2024-6232 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | python3-libs | python3-libs@3.10.11-7.ph4 | cve-2024-7592 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | usr/bin/vsphere-csi | k8s.io/kubernetes@v1.26.10 | CVE-2023-5528 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | usr/bin/vsphere-csi | k8s.io/kubernetes@v1.26.10 | CVE-2024-0793 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | usr/bin/vsphere-csi | k8s.io/kubernetes@v1.26.10 | CVE-2024-10220 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | usr/bin/vsphere-csi | k8s.io/kubernetes@v1.26.10 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | usr/bin/vsphere-csi | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | usr/bin/vsphere-csi | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | usr/bin/vsphere-csi | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | curl | curl@8.7.1-1.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | curl-libs | curl-libs@8.7.1-1.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | elfutils | elfutils@0.181-7.ph4 | CVE-2025-1372 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | elfutils | elfutils@0.181-7.ph4 | CVE-2025-1377 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | elfutils-libelf | elfutils-libelf@0.181-7.ph4 | CVE-2025-1372 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | elfutils-libelf | elfutils-libelf@0.181-7.ph4 | CVE-2025-1377 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | expat | expat@2.4.9-2.ph4 | CVE-2024-45491 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | expat | expat@2.4.9-2.ph4 | CVE-2024-45492 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | expat | expat@2.4.9-2.ph4 | CVE-2024-45490 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | expat | expat@2.4.9-2.ph4 | CVE-2024-8176 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | expat-libs | expat-libs@2.4.9-2.ph4 | CVE-2024-45491 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | expat-libs | expat-libs@2.4.9-2.ph4 | CVE-2024-45492 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | expat-libs | expat-libs@2.4.9-2.ph4 | CVE-2024-45490 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | expat-libs | expat-libs@2.4.9-2.ph4 | CVE-2024-8176 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | glib | glib@2.68.4-2.ph4 | CVE-2024-52533 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | krb5 | krb5@1.17-11.ph4 | CVE-2024-37371 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | krb5 | krb5@1.17-11.ph4 | CVE-2024-37370 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | libxml2 | libxml2@2.9.12-14.ph4 | CVE-2024-56171 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | libxml2 | libxml2@2.9.12-14.ph4 | CVE-2025-24928 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | nss-libs | nss-libs@3.72-5.ph4 | CVE-2024-0743 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | openssl | openssl@3.0.14-2.ph4 | CVE-2024-6119 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | python3 | python3@3.10.11-8.ph4 | CVE-2023-6597 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | python3 | python3@3.10.11-8.ph4 | CVE-2024-6232 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | python3 | python3@3.10.11-8.ph4 | cve-2024-7592 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | python3-libs | python3-libs@3.10.11-8.ph4 | CVE-2023-6597 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | python3-libs | python3-libs@3.10.11-8.ph4 | CVE-2024-6232 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | python3-libs | python3-libs@3.10.11-8.ph4 | cve-2024-7592 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | usr/bin/vsphere-csi | k8s.io/kubernetes@v1.27.10 | CVE-2024-10220 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | usr/bin/vsphere-csi | k8s.io/kubernetes@v1.27.10 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | usr/bin/vsphere-csi | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | curl | curl@8.1.2-7.ph4 | CVE-2024-2398 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | curl | curl@8.1.2-7.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | curl-libs | curl-libs@8.1.2-7.ph4 | CVE-2024-2398 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | curl-libs | curl-libs@8.1.2-7.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | elfutils-libelf | elfutils-libelf@0.181-7.ph4 | CVE-2025-1372 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | elfutils-libelf | elfutils-libelf@0.181-7.ph4 | CVE-2025-1377 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-45491 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-45492 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2023-52425 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-28757 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-45490 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-8176 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | glibc | glibc@2.32-15.ph4 | CVE-2024-2961 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | glibc | glibc@2.32-15.ph4 | CVE-2024-33599 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | glibc | glibc@2.32-15.ph4 | CVE-2024-33601 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | glibc | glibc@2.32-15.ph4 | CVE-2024-33602 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | krb5 | krb5@1.17-10.ph4 | CVE-2024-37371 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | krb5 | krb5@1.17-10.ph4 | CVE-2024-26461 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | krb5 | krb5@1.17-10.ph4 | CVE-2024-37370 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2024-34459 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2024-56171 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2025-24928 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | nss-libs | nss-libs@3.72-4.ph4 | CVE-2024-0743 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | openssl | openssl@3.0.13-2.ph4 | CVE-2024-5535 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | openssl | openssl@3.0.13-2.ph4 | CVE-2024-4741 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | openssl | openssl@3.0.13-2.ph4 | CVE-2024-6119 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | usr/bin/vsphere-syncer | k8s.io/kubernetes@v1.26.10 | CVE-2023-5528 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | usr/bin/vsphere-syncer | k8s.io/kubernetes@v1.26.10 | CVE-2024-0793 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | usr/bin/vsphere-syncer | k8s.io/kubernetes@v1.26.10 | CVE-2024-10220 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | usr/bin/vsphere-syncer | k8s.io/kubernetes@v1.26.10 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | usr/bin/vsphere-syncer | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | usr/bin/vsphere-syncer | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | usr/bin/vsphere-syncer | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | curl | curl@8.7.1-1.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | curl-libs | curl-libs@8.7.1-1.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | elfutils-libelf | elfutils-libelf@0.181-7.ph4 | CVE-2025-1372 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | elfutils-libelf | elfutils-libelf@0.181-7.ph4 | CVE-2025-1377 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | expat-libs | expat-libs@2.4.9-2.ph4 | CVE-2024-45491 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | expat-libs | expat-libs@2.4.9-2.ph4 | CVE-2024-45492 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | expat-libs | expat-libs@2.4.9-2.ph4 | CVE-2024-45490 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | expat-libs | expat-libs@2.4.9-2.ph4 | CVE-2024-8176 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | krb5 | krb5@1.17-11.ph4 | CVE-2024-37371 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | krb5 | krb5@1.17-11.ph4 | CVE-2024-37370 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | libxml2 | libxml2@2.9.12-14.ph4 | CVE-2024-56171 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | libxml2 | libxml2@2.9.12-14.ph4 | CVE-2025-24928 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | nss-libs | nss-libs@3.72-5.ph4 | CVE-2024-0743 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | openssl | openssl@3.0.14-2.ph4 | CVE-2024-6119 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | usr/bin/vsphere-syncer | k8s.io/kubernetes@v1.27.10 | CVE-2024-10220 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | usr/bin/vsphere-syncer | k8s.io/kubernetes@v1.27.10 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | usr/bin/vsphere-syncer | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.31.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | github.com/golang-jwt/jwt/v4@v4.5.0 | CVE-2025-30204 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.31.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.31.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.24.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.31.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.22.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.31.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | github.com/golang-jwt/jwt/v4@v4.5.0 | CVE-2025-30204 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.31.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.31.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.24.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.32.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | github.com/golang-jwt/jwt/v4@v4.5.0 | CVE-2025-30204 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.32.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.30.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.32.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.30.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.32.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.23.0 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.32.2 | true | Rancher head | bin/vsphere-cloud-controller-manager | github.com/golang-jwt/jwt/v4@v4.5.1 | CVE-2025-30204 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.32.2 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.31.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.32.2 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.23.0 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.11.1 | true | Rancher head | coredns | github.com/quic-go/quic-go@v0.37.4 | CVE-2024-22189 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.11.1 | true | Rancher head | coredns | google.golang.org/grpc@v1.57.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.11.1 | true | Rancher head | coredns | stdlib@v1.20.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.11.1 | true | Rancher head | coredns | stdlib@v1.20.7 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.11.1 | true | Rancher head | coredns | stdlib@v1.20.7 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.11.1 | true | Rancher head | coredns | stdlib@v1.20.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.11.1 | true | Rancher head | coredns | stdlib@v1.20.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.11.3 | true | Rancher head | coredns | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.12.1 | true | Rancher head | coredns | github.com/coredns/coredns@v0.0.0-20250331195236-707c7c10acd5 | CVE-2023-28452 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.12.1 | true | Rancher head | coredns | github.com/coredns/coredns@v0.0.0-20250331195236-707c7c10acd5 | CVE-2025-47950 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher head | usr/local/bin/etcd | stdlib@v1.20.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher head | usr/local/bin/etcd | stdlib@v1.20.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher head | usr/local/bin/etcd | stdlib@v1.20.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher head | usr/local/bin/etcdctl | stdlib@v1.20.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher head | usr/local/bin/etcdctl | stdlib@v1.20.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher head | usr/local/bin/etcdctl | stdlib@v1.20.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher head | usr/local/bin/etcdutl | stdlib@v1.20.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher head | usr/local/bin/etcdutl | stdlib@v1.20.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher head | usr/local/bin/etcdutl | stdlib@v1.20.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.15 | true | Rancher head | usr/local/bin/etcd | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.15 | true | Rancher head | usr/local/bin/etcdctl | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.15 | true | Rancher head | usr/local/bin/etcdutl | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.25.1 | true | Rancher head | c-ares | c-ares@1.28.1-r0 | CVE-2025-31498 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.25.1 | true | Rancher head | libcrypto3 | libcrypto3@3.2.1-r2 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.25.1 | true | Rancher head | libcrypto3 | libcrypto3@3.2.1-r2 | CVE-2024-6119 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.25.1 | true | Rancher head | libcurl | libcurl@8.7.1-r0 | CVE-2024-6197 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.25.1 | true | Rancher head | libssl3 | libssl3@3.2.1-r2 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.25.1 | true | Rancher head | libssl3 | libssl3@3.2.1-r2 | CVE-2024-6119 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.25.1 | true | Rancher head | opt/bin/flanneld | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.25.1 | true | Rancher head | opt/bin/flanneld | golang.org/x/crypto@v0.21.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.25.1 | true | Rancher head | opt/bin/flanneld | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.25.1 | true | Rancher head | opt/bin/flanneld | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.25.1 | true | Rancher head | opt/bin/flanneld | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.25.1 | true | Rancher head | sbin/iptables-wrapper | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.25.1 | true | Rancher head | sbin/iptables-wrapper | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.25.1 | true | Rancher head | sbin/iptables-wrapper | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.26.4 | true | Rancher head | c-ares | c-ares@1.34.4-r0 | CVE-2025-31498 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.26.4 | true | Rancher head | libcrypto3 | libcrypto3@3.3.2-r4 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.26.4 | true | Rancher head | libssl3 | libssl3@3.3.2-r4 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-fluent-fluent-bit:3.1.8 | true | Rancher head | libc6 | libc6@2.36-9+deb12u8 | CVE-2025-4802 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8 | true | Rancher head | libldap-2.5-0 | libldap-2.5-0@2.5.13+dfsg-5 | CVE-2023-2953 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8 | true | Rancher head | liblzma5 | liblzma5@5.4.1-0.2 | CVE-2025-31115 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8 | true | Rancher head | libpq5 | libpq5@15.8-0+deb12u1 | CVE-2024-10979 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8 | true | Rancher head | libpq5 | libpq5@15.8-0+deb12u1 | CVE-2025-1094 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8 | true | Rancher head | zlib1g | zlib1g@1:1.2.13.dfsg-1 | CVE-2023-45853 | CRITICAL | affected | debian | |
rancher/mirrored-k8s-dns-dnsmasq-nanny:1.23.0 | true | Rancher head | libc6 | libc6@2.31-13+deb11u7 | CVE-2024-2961 | HIGH | affected | debian | |
rancher/mirrored-k8s-dns-dnsmasq-nanny:1.23.0 | true | Rancher head | libc6 | libc6@2.31-13+deb11u7 | CVE-2024-33599 | HIGH | affected | debian | |
rancher/mirrored-k8s-dns-dnsmasq-nanny:1.23.0 | true | Rancher head | libc6 | libc6@2.31-13+deb11u7 | CVE-2025-4802 | HIGH | affected | debian | |
rancher/mirrored-k8s-dns-dnsmasq-nanny:1.23.0 | true | Rancher head | dnsmasq-nanny | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-dnsmasq-nanny:1.23.0 | true | Rancher head | dnsmasq-nanny | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-dnsmasq-nanny:1.23.0 | true | Rancher head | dnsmasq-nanny | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-kube-dns:1.23.0 | true | Rancher head | kube-dns | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-kube-dns:1.23.0 | true | Rancher head | kube-dns | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-kube-dns:1.23.0 | true | Rancher head | kube-dns | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | libc6 | libc6@2.36-9+deb12u3 | CVE-2023-6246 | HIGH | affected | debian | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | libc6 | libc6@2.36-9+deb12u3 | CVE-2023-6779 | HIGH | affected | debian | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | libc6 | libc6@2.36-9+deb12u3 | CVE-2024-2961 | HIGH | affected | debian | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | libc6 | libc6@2.36-9+deb12u3 | CVE-2024-33599 | HIGH | affected | debian | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | libc6 | libc6@2.36-9+deb12u3 | CVE-2025-4802 | HIGH | affected | debian | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | libssl3 | libssl3@3.0.11-1~deb12u1 | CVE-2023-5363 | HIGH | affected | debian | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | libssl3 | libssl3@3.0.11-1~deb12u1 | CVE-2024-6119 | HIGH | affected | debian | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | go-runner | stdlib@v1.21.1 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | go-runner | stdlib@v1.21.1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | go-runner | stdlib@v1.21.1 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | go-runner | stdlib@v1.21.1 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | go-runner | stdlib@v1.21.1 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2023-5528 | HIGH | affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2024-0793 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | node-cache | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | node-cache | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | node-cache | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-sidecar:1.23.0 | true | Rancher head | sidecar | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-sidecar:1.23.0 | true | Rancher head | sidecar | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-sidecar:1.23.0 | true | Rancher head | sidecar | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-logging-fluentd:v1.16-4.10-full | true | Rancher head | ruby | ruby@3.3.6-r0 | CVE-2025-27219 | HIGH | affected | alpine | |
rancher/mirrored-kube-logging-fluentd:v1.16-4.10-full | true | Rancher head | ruby-libs | ruby-libs@3.3.6-r0 | CVE-2025-27219 | HIGH | affected | alpine | |
rancher/mirrored-kube-logging-fluentd:v1.16-4.10-full | true | Rancher head | Ruby | google-protobuf@3.21.12 | CVE-2024-7254 | HIGH | affected | gemspec | |
rancher/mirrored-kube-logging-fluentd:v1.16-4.10-full | true | Rancher head | Ruby | net-imap@0.3.4.1 | CVE-2025-43857 | HIGH | affected | gemspec | |
rancher/mirrored-kube-logging-fluentd:v1.16-4.10-full | true | Rancher head | Ruby | net-imap@0.4.19 | CVE-2025-43857 | HIGH | affected | gemspec | |
rancher/mirrored-kube-logging-fluentd:v1.16-4.10-full | true | Rancher head | Ruby | rack@3.0.14 | CVE-2025-46727 | HIGH | affected | gemspec | |
rancher/mirrored-kube-logging-fluentd:v1.16-4.10-full | true | Rancher head | Ruby | rexml@3.2.6 | CVE-2024-49761 | HIGH | affected | gemspec | |
rancher/mirrored-kube-logging-fluentd:v1.16-4.10-full | true | Rancher head | Ruby | rexml@3.3.2 | CVE-2024-49761 | HIGH | affected | gemspec | |
rancher/mirrored-kube-logging-fluentd:v1.16-4.10-full | true | Rancher head | Ruby | webrick@1.8.1 | CVE-2024-47220 | HIGH | affected | gemspec | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.8.7 | true | Rancher head | libcrypto3 | libcrypto3@3.3.2-r1 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.8.7 | true | Rancher head | libssl3 | libssl3@3.3.2-r1 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.8.7 | true | Rancher head | kube-vip | github.com/osrg/gobgp/v3@v3.27.0 | CVE-2025-43971 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | github.com/prometheus/client_golang@v1.9.0 | CVE-2022-21698 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | golang.org/x/net@v0.0.0-20210410081132-afb366fc7cd1 | CVE-2021-33194 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | golang.org/x/net@v0.0.0-20210410081132-afb366fc7cd1 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | golang.org/x/net@v0.0.0-20210410081132-afb366fc7cd1 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | golang.org/x/net@v0.0.0-20210410081132-afb366fc7cd1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | golang.org/x/text@v0.3.6 | CVE-2021-38561 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | golang.org/x/text@v0.3.6 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | google.golang.org/grpc@v1.36.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | gopkg.in/yaml.v3@v3.0.0-20210107192922-496545a6307b | CVE-2022-28948 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2021-27918 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2021-33195 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2021-33196 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2021-33198 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2021-39293 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | github.com/prometheus/client_golang@v1.11.0 | CVE-2022-21698 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | golang.org/x/net@v0.0.0-20210520170846-37e1c6afe023 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | golang.org/x/net@v0.0.0-20210520170846-37e1c6afe023 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | golang.org/x/net@v0.0.0-20210520170846-37e1c6afe023 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | golang.org/x/text@v0.3.6 | CVE-2021-38561 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | golang.org/x/text@v0.3.6 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | google.golang.org/grpc@v1.38.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-33195 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-33196 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-33198 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-39293 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | github.com/gogo/protobuf@v1.3.1 | CVE-2021-3121 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | github.com/prometheus/client_golang@v1.8.0 | CVE-2022-21698 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | golang.org/x/crypto@v0.0.0-20201208171446-5f87f3452ae9 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | golang.org/x/crypto@v0.0.0-20201208171446-5f87f3452ae9 | CVE-2020-29652 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | golang.org/x/crypto@v0.0.0-20201208171446-5f87f3452ae9 | CVE-2021-43565 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | golang.org/x/crypto@v0.0.0-20201208171446-5f87f3452ae9 | CVE-2022-27191 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | golang.org/x/crypto@v0.0.0-20201208171446-5f87f3452ae9 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | golang.org/x/net@v0.0.0-20201209123823-ac852fbbde11 | CVE-2021-33194 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | golang.org/x/net@v0.0.0-20201209123823-ac852fbbde11 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | golang.org/x/net@v0.0.0-20201209123823-ac852fbbde11 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | golang.org/x/net@v0.0.0-20201209123823-ac852fbbde11 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | golang.org/x/text@v0.3.4 | CVE-2021-38561 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | golang.org/x/text@v0.3.4 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | google.golang.org/grpc@v1.34.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | gopkg.in/yaml.v3@v3.0.0-20200615113413-eeeca48fe776 | CVE-2022-28948 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2020-28362 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2021-27918 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2021-33195 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2021-33196 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2021-33198 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2021-39293 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | github.com/prometheus/client_golang@v1.9.0 | CVE-2022-21698 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | golang.org/x/net@v0.0.0-20210316092652-d523dce5a7f4 | CVE-2021-33194 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | golang.org/x/net@v0.0.0-20210316092652-d523dce5a7f4 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | golang.org/x/net@v0.0.0-20210316092652-d523dce5a7f4 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | golang.org/x/net@v0.0.0-20210316092652-d523dce5a7f4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | golang.org/x/text@v0.3.5 | CVE-2021-38561 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | golang.org/x/text@v0.3.5 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | google.golang.org/grpc@v1.36.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | gopkg.in/yaml.v3@v3.0.0-20210107192922-496545a6307b | CVE-2022-28948 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2021-27918 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2021-33195 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2021-33196 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2021-33198 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2021-39293 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.7.1 | true | Rancher head | metrics-server | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.7.1 | true | Rancher head | metrics-server | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.7.1 | true | Rancher head | metrics-server | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.7.2 | true | Rancher head | metrics-server | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-attacher:v4.5.0 | true | Rancher head | csi-attacher | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.44.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-attacher:v4.5.0 | true | Rancher head | csi-attacher | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-attacher:v4.5.0 | true | Rancher head | csi-attacher | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-attacher:v4.5.0 | true | Rancher head | csi-attacher | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-attacher:v4.7.0 | true | Rancher head | csi-attacher | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.10.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.10.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.10.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.12.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.0 | true | Rancher head | csi-provisioner | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.0 | true | Rancher head | csi-provisioner | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.0 | true | Rancher head | csi-provisioner | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.1 | true | Rancher head | csi-provisioner | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.1 | true | Rancher head | csi-provisioner | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.1 | true | Rancher head | csi-provisioner | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.0 | true | Rancher head | csi-resizer | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.44.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.0 | true | Rancher head | csi-resizer | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.0 | true | Rancher head | csi-resizer | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.0 | true | Rancher head | csi-resizer | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.1 | true | Rancher head | csi-resizer | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.44.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.1 | true | Rancher head | csi-resizer | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.1 | true | Rancher head | csi-resizer | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.1 | true | Rancher head | csi-resizer | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.1 | true | Rancher head | csi-snapshotter | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.1 | true | Rancher head | csi-snapshotter | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.1 | true | Rancher head | csi-snapshotter | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.2 | true | Rancher head | csi-snapshotter | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.2 | true | Rancher head | csi-snapshotter | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.2 | true | Rancher head | csi-snapshotter | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.12.0 | true | Rancher head | livenessprobe | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.12.0 | true | Rancher head | livenessprobe | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.12.0 | true | Rancher head | livenessprobe | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.14.0 | true | Rancher head | livenessprobe | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/nginx-ingress-controller:nginx-1.11.5-rancher1 | false | Rancher head | c-ares | c-ares@1.34.3-r0 | CVE-2025-31498 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.11.5-rancher1 | false | Rancher head | libxml2 | libxml2@2.13.4-r5 | CVE-2025-32414 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.11.5-rancher1 | false | Rancher head | libxml2 | libxml2@2.13.4-r5 | CVE-2025-32415 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.11.5-rancher1 | false | Rancher head | xz-libs | xz-libs@5.6.3-r0 | CVE-2025-31115 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:v1.12.1-hardened3 | false | Rancher head | libopenssl-3-devel | libopenssl-3-devel@3.1.4-150600.5.24.1 | SUSE-SU-2025:1550-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.12.1-hardened3 | false | Rancher head | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.1.4-150600.5.24.1 | SUSE-SU-2025:1550-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.12.1-hardened3 | false | Rancher head | libopenssl3 | libopenssl3@3.1.4-150600.5.24.1 | SUSE-SU-2025:1550-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.12.1-hardened3 | false | Rancher head | libsqlite3-0 | libsqlite3-0@3.44.0-150000.3.23.1 | SUSE-SU-2025:1456-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.12.1-hardened3 | false | Rancher head | openssl-3 | openssl-3@3.1.4-150600.5.24.1 | SUSE-SU-2025:1550-1 | HIGH | affected | sles | |
rancher/rancher-agent:head | false | Rancher head | usr/bin/agent | github.com/golang-jwt/jwt@v3.2.1+incompatible | CVE-2025-30204 | HIGH | affected | gobinary | |
rancher/rancher-agent:head | false | Rancher head | usr/bin/agent | github.com/golang-jwt/jwt/v4@v4.5.1 | CVE-2025-30204 | HIGH | affected | gobinary | |
rancher/rancher-agent:head | false | Rancher head | usr/bin/agent | github.com/golang-jwt/jwt/v5@v5.2.1 | CVE-2025-30204 | HIGH | affected | gobinary | |
rancher/rancher-agent:head | false | Rancher head | usr/bin/kubectl | stdlib@v1.20.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher-agent:head | false | Rancher head | usr/bin/kubectl | stdlib@v1.20.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher-agent:head | false | Rancher head | usr/bin/kubectl | stdlib@v1.20.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:head | false | Rancher head | usr/bin/rancher | github.com/golang-jwt/jwt@v3.2.1+incompatible | CVE-2025-30204 | HIGH | affected | gobinary | |
rancher/rancher:head | false | Rancher head | usr/bin/rancher | github.com/golang-jwt/jwt/v4@v4.5.1 | CVE-2025-30204 | HIGH | affected | gobinary | |
rancher/rancher:head | false | Rancher head | usr/bin/rancher | github.com/golang-jwt/jwt/v5@v5.2.1 | CVE-2025-30204 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.113 | false | Rancher head | opt/rke-tools/bin/docker | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.113 | false | Rancher head | usr/local/bin/kubectl | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.5.0-rc.2 | false | Rancher head | glibc | glibc@2.38-150600.14.26.1 | SUSE-SU-2025:01702-1 | HIGH | affected | sles | |
rancher/shell:v0.5.0-rc.2 | false | Rancher head | libopenssl3 | libopenssl3@3.1.4-150600.5.24.1 | SUSE-SU-2025:1550-1 | HIGH | affected | sles | |
rancher/ui-plugin-catalog:4.0.1 | false | Rancher head | glibc | glibc@2.31-150300.89.2 | SUSE-SU-2025:01784-1 | HIGH | affected | sles | |
rancher/ui-plugin-catalog:4.0.1 | false | Rancher head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/ui-plugin-catalog:4.0.1 | false | Rancher head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/ui-plugin-catalog:4.0.1 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/ui-plugin-catalog:4.0.1 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/calico | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/calico | golang.org/x/crypto@v0.22.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.22.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.3-build20250408 | false | Rancher head | glibc | glibc@2.38-150600.14.23.1 | SUSE-SU-2025:01702-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-coredns:v1.12.1-build20250401 | false | Rancher head | glibc | glibc@2.38-150600.14.23.1 | SUSE-SU-2025:01702-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-dns-node-cache:1.25.0-build20250127 | false | Rancher head | glibc | glibc@2.38-150600.14.20.3 | SUSE-SU-2025:01702-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-dns-node-cache:1.25.0-build20250127 | false | Rancher head | node-cache | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-dns-node-cache:1.25.0-build20250127 | false | Rancher head | node-cache | golang.org/x/crypto@v0.22.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-flannel:v0.26.6-build20250414 | false | Rancher head | glibc | glibc@2.38-150600.14.23.1 | SUSE-SU-2025:01702-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-k8s-metrics-server:v0.7.2-build20250110 | false | Rancher head | metrics-server | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-k8s-metrics-server:v0.7.2-build20250110 | false | Rancher head | metrics-server | golang.org/x/crypto@v0.26.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.31.8-rke2r1-build20250423 | false | Rancher head | glibc | glibc@2.31-150300.92.1 | SUSE-SU-2025:01784-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-kubernetes:v1.31.8-rke2r1-build20250423 | false | Rancher head | usr/local/bin/kube-apiserver | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.8-rke2r1-build20250423 | false | Rancher head | usr/local/bin/kube-apiserver | golang.org/x/crypto@v0.24.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.31.8-rke2r1-build20250423 | false | Rancher head | usr/local/bin/kube-controller-manager | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.8-rke2r1-build20250423 | false | Rancher head | usr/local/bin/kube-controller-manager | golang.org/x/crypto@v0.24.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.31.8-rke2r1-build20250423 | false | Rancher head | usr/local/bin/kube-proxy | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.8-rke2r1-build20250423 | false | Rancher head | usr/local/bin/kube-proxy | golang.org/x/crypto@v0.24.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.31.8-rke2r1-build20250423 | false | Rancher head | usr/local/bin/kube-scheduler | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.8-rke2r1-build20250423 | false | Rancher head | usr/local/bin/kube-scheduler | golang.org/x/crypto@v0.24.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.31.8-rke2r1-build20250423 | false | Rancher head | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.31.8-rke2r1-build20250423 | false | Rancher head | usr/local/bin/kubelet | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.8-rke2r1-build20250423 | false | Rancher head | usr/local/bin/kubelet | golang.org/x/crypto@v0.24.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.32.4-rke2r1-build20250423 | false | Rancher head | glibc | glibc@2.31-150300.92.1 | SUSE-SU-2025:01784-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-kubernetes:v1.32.4-rke2r1-build20250423 | false | Rancher head | usr/local/bin/kube-apiserver | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.32.4-rke2r1-build20250423 | false | Rancher head | usr/local/bin/kube-apiserver | golang.org/x/crypto@v0.28.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.32.4-rke2r1-build20250423 | false | Rancher head | usr/local/bin/kube-controller-manager | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.32.4-rke2r1-build20250423 | false | Rancher head | usr/local/bin/kube-controller-manager | golang.org/x/crypto@v0.28.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.32.4-rke2r1-build20250423 | false | Rancher head | usr/local/bin/kube-proxy | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.32.4-rke2r1-build20250423 | false | Rancher head | usr/local/bin/kube-proxy | golang.org/x/crypto@v0.28.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.32.4-rke2r1-build20250423 | false | Rancher head | usr/local/bin/kube-scheduler | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.32.4-rke2r1-build20250423 | false | Rancher head | usr/local/bin/kube-scheduler | golang.org/x/crypto@v0.28.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.32.4-rke2r1-build20250423 | false | Rancher head | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.32.4-rke2r1-build20250423 | false | Rancher head | usr/local/bin/kubelet | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.32.4-rke2r1-build20250423 | false | Rancher head | usr/local/bin/kubelet | golang.org/x/crypto@v0.28.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.33.0-rke2r1-build20250425 | false | Rancher head | glibc | glibc@2.31-150300.92.1 | SUSE-SU-2025:01784-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-kubernetes:v1.33.0-rke2r1-build20250425 | false | Rancher head | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher head | usr/bin/harvester-cloud-provider | github.com/rancher/apiserver@v0.0.0-20230120214941-e88c32739dc7 | CVE-2023-32192 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher head | usr/bin/harvester-cloud-provider | github.com/rancher/norman@v0.0.0-20221205184727-32ef2e185b99 | CVE-2023-32193 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher head | usr/bin/harvester-cloud-provider | golang.org/x/crypto@v0.16.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher head | usr/bin/harvester-cloud-provider | golang.org/x/crypto@v0.16.0 | CVE-2025-22869 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.13-rancher1 | false | Rancher head | usr/local/bin/kube-apiserver | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.13-rancher1 | false | Rancher head | usr/local/bin/kube-apiserver | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.13-rancher1 | false | Rancher head | usr/local/bin/kube-apiserver | golang.org/x/crypto@v0.21.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.30.13-rancher1 | false | Rancher head | usr/local/bin/kube-controller-manager | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.13-rancher1 | false | Rancher head | usr/local/bin/kube-controller-manager | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.13-rancher1 | false | Rancher head | usr/local/bin/kube-controller-manager | golang.org/x/crypto@v0.21.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.30.13-rancher1 | false | Rancher head | usr/local/bin/kube-proxy | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.13-rancher1 | false | Rancher head | usr/local/bin/kube-proxy | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.13-rancher1 | false | Rancher head | usr/local/bin/kube-proxy | golang.org/x/crypto@v0.21.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.30.13-rancher1 | false | Rancher head | usr/local/bin/kube-scheduler | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.13-rancher1 | false | Rancher head | usr/local/bin/kube-scheduler | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.13-rancher1 | false | Rancher head | usr/local/bin/kube-scheduler | golang.org/x/crypto@v0.21.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.30.13-rancher1 | false | Rancher head | usr/local/bin/kubelet | github.com/docker/docker@v20.10.27+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.30.13-rancher1 | false | Rancher head | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.30.13-rancher1 | false | Rancher head | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.13-rancher1 | false | Rancher head | usr/local/bin/kubelet | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.13-rancher1 | false | Rancher head | usr/local/bin/kubelet | golang.org/x/crypto@v0.21.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.31.9-rancher1 | false | Rancher head | usr/local/bin/kube-apiserver | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.31.9-rancher1 | false | Rancher head | usr/local/bin/kube-apiserver | golang.org/x/crypto@v0.24.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.31.9-rancher1 | false | Rancher head | usr/local/bin/kube-controller-manager | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.31.9-rancher1 | false | Rancher head | usr/local/bin/kube-controller-manager | golang.org/x/crypto@v0.24.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.31.9-rancher1 | false | Rancher head | usr/local/bin/kube-proxy | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.31.9-rancher1 | false | Rancher head | usr/local/bin/kube-proxy | golang.org/x/crypto@v0.24.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.31.9-rancher1 | false | Rancher head | usr/local/bin/kube-scheduler | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.31.9-rancher1 | false | Rancher head | usr/local/bin/kube-scheduler | golang.org/x/crypto@v0.24.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.31.9-rancher1 | false | Rancher head | usr/local/bin/kubelet | github.com/docker/docker@v20.10.27+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.31.9-rancher1 | false | Rancher head | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.31.9-rancher1 | false | Rancher head | usr/local/bin/kubelet | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.31.9-rancher1 | false | Rancher head | usr/local/bin/kubelet | golang.org/x/crypto@v0.24.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.32.5-rancher1 | false | Rancher head | usr/local/bin/kube-apiserver | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.32.5-rancher1 | false | Rancher head | usr/local/bin/kube-apiserver | golang.org/x/crypto@v0.28.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.32.5-rancher1 | false | Rancher head | usr/local/bin/kube-controller-manager | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.32.5-rancher1 | false | Rancher head | usr/local/bin/kube-controller-manager | golang.org/x/crypto@v0.28.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.32.5-rancher1 | false | Rancher head | usr/local/bin/kube-proxy | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.32.5-rancher1 | false | Rancher head | usr/local/bin/kube-proxy | golang.org/x/crypto@v0.28.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.32.5-rancher1 | false | Rancher head | usr/local/bin/kube-scheduler | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.32.5-rancher1 | false | Rancher head | usr/local/bin/kube-scheduler | golang.org/x/crypto@v0.28.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.32.5-rancher1 | false | Rancher head | usr/local/bin/kubelet | github.com/docker/docker@v26.1.4+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.32.5-rancher1 | false | Rancher head | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.32.5-rancher1 | false | Rancher head | usr/local/bin/kubelet | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.32.5-rancher1 | false | Rancher head | usr/local/bin/kubelet | golang.org/x/crypto@v0.28.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.5-build20250306 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.5-build20250306 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | golang.org/x/crypto@v0.26.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.5-build20250306 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | golang.org/x/crypto@v0.25.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.5-build20250306 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | golang.org/x/crypto@v0.25.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.5-build20250306 | false | Rancher head | usr/bin/helm | golang.org/x/crypto@v0.31.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/kube-api-auth:v0.2.4 | false | Rancher head | usr/bin/kube-api-auth | github.com/docker/docker@v20.10.27+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/kube-api-auth:v0.2.4 | false | Rancher head | usr/bin/kube-api-auth | github.com/rancher/rancher@v0.0.0-20241004204441-d3c434633444 | CVE-2019-12274 | none | not affected | inline mitigations already exist | gobinary |
rancher/kube-api-auth:v0.2.4 | false | Rancher head | usr/bin/kube-api-auth | github.com/rancher/rancher@v0.0.0-20241004204441-d3c434633444 | CVE-2021-36775 | none | not affected | inline mitigations already exist | gobinary |
rancher/kube-api-auth:v0.2.4 | false | Rancher head | usr/bin/kube-api-auth | github.com/rancher/steve@v0.0.0-20240913181958-99e479ba0f08 | CVE-2024-52280 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/kube-api-auth:v0.2.4 | false | Rancher head | usr/bin/kube-api-auth | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/kube-api-auth:v0.2.4 | false | Rancher head | usr/bin/kube-api-auth | golang.org/x/crypto@v0.26.0 | CVE-2025-22869 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/local-path-provisioner:v0.0.31 | false | Rancher head | libcrypto3 | libcrypto3@3.3.2-r4 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/local-path-provisioner:v0.0.31 | false | Rancher head | libssl3 | libssl3@3.3.2-r4 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/machine:v0.15.0-rancher128 | false | Rancher head | usr/local/bin/rancher-machine | github.com/golang-jwt/jwt/v4@v4.5.0 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/machine:v0.15.0-rancher128 | false | Rancher head | usr/local/bin/rancher-machine | github.com/moby/moby@v1.4.2-0.20170731201646-1009e6a40b29 | CVE-2024-36621 | none | not affected | vulnerable code not present | gobinary |
rancher/machine:v0.15.0-rancher128 | false | Rancher head | usr/local/bin/rancher-machine | github.com/moby/moby@v1.4.2-0.20170731201646-1009e6a40b29 | CVE-2024-36623 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.28.1 | true | Rancher head | usr/bin/kube-controllers | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.28.1 | true | Rancher head | usr/bin/kube-controllers | golang.org/x/crypto@v0.22.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-operator-azure:v1.17.3 | true | Rancher head | usr/bin/cilium-operator-azure | github.com/golang-jwt/jwt/v4@v4.5.1 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-coredns-coredns:1.11.1 | true | Rancher head | coredns | github.com/golang-jwt/jwt/v4@v4.5.0 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-coredns-coredns:1.11.1 | true | Rancher head | coredns | golang.org/x/crypto@v0.12.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coredns-coredns:1.11.1 | true | Rancher head | coredns | golang.org/x/crypto@v0.12.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coredns-coredns:1.11.1 | true | Rancher head | coredns | golang.org/x/net@v0.14.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-coredns-coredns:1.11.3 | true | Rancher head | coredns | github.com/golang-jwt/jwt/v4@v4.5.0 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-coredns-coredns:1.11.3 | true | Rancher head | coredns | golang.org/x/crypto@v0.23.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coredns-coredns:1.11.3 | true | Rancher head | coredns | golang.org/x/crypto@v0.23.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher head | usr/local/bin/etcd | github.com/golang-jwt/jwt/v4@v4.4.2 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher head | usr/local/bin/etcd | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher head | usr/local/bin/etcd | golang.org/x/crypto@v0.17.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher head | usr/local/bin/etcdctl | github.com/golang-jwt/jwt/v4@v4.4.2 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher head | usr/local/bin/etcdctl | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher head | usr/local/bin/etcdctl | golang.org/x/crypto@v0.17.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher head | usr/local/bin/etcdutl | github.com/golang-jwt/jwt/v4@v4.4.2 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher head | usr/local/bin/etcdutl | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher head | usr/local/bin/etcdutl | golang.org/x/crypto@v0.17.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.15 | true | Rancher head | usr/local/bin/etcd | github.com/golang-jwt/jwt/v4@v4.4.2 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-coreos-etcd:v3.5.15 | true | Rancher head | usr/local/bin/etcd | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.15 | true | Rancher head | usr/local/bin/etcd | golang.org/x/crypto@v0.21.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.15 | true | Rancher head | usr/local/bin/etcdctl | github.com/golang-jwt/jwt/v4@v4.4.2 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-coreos-etcd:v3.5.15 | true | Rancher head | usr/local/bin/etcdctl | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.15 | true | Rancher head | usr/local/bin/etcdctl | golang.org/x/crypto@v0.21.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.15 | true | Rancher head | usr/local/bin/etcdutl | github.com/golang-jwt/jwt/v4@v4.4.2 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-coreos-etcd:v3.5.15 | true | Rancher head | usr/local/bin/etcdutl | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.15 | true | Rancher head | usr/local/bin/etcdutl | golang.org/x/crypto@v0.21.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.16 | true | Rancher head | usr/local/bin/etcd | github.com/golang-jwt/jwt/v4@v4.4.2 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-coreos-etcd:v3.5.16 | true | Rancher head | usr/local/bin/etcd | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.16 | true | Rancher head | usr/local/bin/etcd | golang.org/x/crypto@v0.21.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.16 | true | Rancher head | usr/local/bin/etcdctl | github.com/golang-jwt/jwt/v4@v4.4.2 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-coreos-etcd:v3.5.16 | true | Rancher head | usr/local/bin/etcdctl | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.16 | true | Rancher head | usr/local/bin/etcdctl | golang.org/x/crypto@v0.21.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.16 | true | Rancher head | usr/local/bin/etcdutl | github.com/golang-jwt/jwt/v4@v4.4.2 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-coreos-etcd:v3.5.16 | true | Rancher head | usr/local/bin/etcdutl | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.16 | true | Rancher head | usr/local/bin/etcdutl | golang.org/x/crypto@v0.21.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-flannel-flannel:v0.26.4 | true | Rancher head | opt/bin/flanneld | golang.org/x/crypto@v0.32.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-dnsmasq-nanny:1.23.0 | true | Rancher head | dnsmasq-nanny | github.com/coredns/coredns@v1.10.0 | CVE-2023-28452 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-dnsmasq-nanny:1.23.0 | true | Rancher head | dnsmasq-nanny | github.com/coredns/coredns@v1.10.0 | CVE-2025-47950 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-kube-dns:1.23.0 | true | Rancher head | kube-dns | github.com/coredns/coredns@v1.10.0 | CVE-2023-28452 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-kube-dns:1.23.0 | true | Rancher head | kube-dns | github.com/coredns/coredns@v1.10.0 | CVE-2025-47950 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | node-cache | github.com/coredns/coredns@v1.10.0 | CVE-2023-28452 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | node-cache | github.com/coredns/coredns@v1.10.0 | CVE-2025-47950 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-sidecar:1.23.0 | true | Rancher head | sidecar | github.com/coredns/coredns@v1.10.0 | CVE-2023-28452 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-sidecar:1.23.0 | true | Rancher head | sidecar | github.com/coredns/coredns@v1.10.0 | CVE-2025-47950 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.8.7 | true | Rancher head | kube-vip | golang.org/x/crypto@v0.23.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.8.7 | true | Rancher head | kube-vip | golang.org/x/crypto@v0.23.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-metrics-server:v0.7.1 | true | Rancher head | metrics-server | golang.org/x/crypto@v0.18.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-metrics-server:v0.7.1 | true | Rancher head | metrics-server | golang.org/x/crypto@v0.18.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-metrics-server:v0.7.2 | true | Rancher head | metrics-server | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-metrics-server:v0.7.2 | true | Rancher head | metrics-server | golang.org/x/crypto@v0.26.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/nginx-ingress-controller:v1.12.1-hardened3 | false | Rancher head | glibc | glibc@2.38-150600.14.23.1 | SUSE-SU-2025:01702-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/nginx-ingress-controller:v1.12.1-hardened3 | false | Rancher head | glibc-devel | glibc-devel@2.38-150600.14.26.1 | SUSE-SU-2025:01702-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/rancher-agent:head | false | Rancher head | usr/bin/agent | github.com/docker/docker@v20.10.27+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher-agent:head | false | Rancher head | usr/bin/kubectl | github.com/docker/distribution@v2.8.1+incompatible | CVE-2023-2253 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:head | false | Rancher head | opt/drivers/management-state/bin/docker-machine-driver-harvester | github.com/moby/moby@v1.4.2-0.20170731201646-1009e6a40b29 | CVE-2024-36621 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:head | false | Rancher head | opt/drivers/management-state/bin/docker-machine-driver-harvester | github.com/moby/moby@v1.4.2-0.20170731201646-1009e6a40b29 | CVE-2024-36623 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:head | false | Rancher head | opt/drivers/management-state/bin/docker-machine-driver-harvester | golang.org/x/crypto@v0.27.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:head | false | Rancher head | opt/drivers/management-state/bin/docker-machine-driver-harvester | golang.org/x/crypto@v0.27.0 | CVE-2025-22869 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:head | false | Rancher head | usr/bin/containerd | github.com/golang-jwt/jwt/v4@v4.5.1 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:head | false | Rancher head | usr/bin/containerd | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:head | false | Rancher head | usr/bin/containerd | golang.org/x/crypto@v0.24.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:head | false | Rancher head | usr/bin/etcdctl | github.com/golang-jwt/jwt/v4@v4.4.2 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:head | false | Rancher head | usr/bin/etcdctl | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:head | false | Rancher head | usr/bin/etcdctl | golang.org/x/crypto@v0.21.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:head | false | Rancher head | usr/bin/k3s | github.com/golang-jwt/jwt/v4@v4.5.1 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:head | false | Rancher head | usr/bin/k3s | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:head | false | Rancher head | usr/bin/k3s | golang.org/x/crypto@v0.24.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:head | false | Rancher head | usr/bin/rancher | github.com/docker/docker@v20.10.27+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:head | false | Rancher head | usr/bin/rancher-machine | github.com/golang-jwt/jwt/v4@v4.5.0 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:head | false | Rancher head | usr/bin/rancher-machine | github.com/moby/moby@v1.4.2-0.20170731201646-1009e6a40b29 | CVE-2024-36621 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:head | false | Rancher head | usr/bin/rancher-machine | github.com/moby/moby@v1.4.2-0.20170731201646-1009e6a40b29 | CVE-2024-36623 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:head | false | Rancher head | usr/share/rancher/ui/assets/wins.exe | golang.org/x/crypto@v0.30.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:head | false | Rancher head | usr/share/rancher/ui/assets/wins.exe | golang.org/x/crypto@v0.30.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/remotedialer-proxy:v0.4.4 | false | Rancher head | proxy | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/remotedialer-proxy:v0.4.4 | false | Rancher head | proxy | golang.org/x/crypto@v0.26.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.113 | false | Rancher head | opt/rke-tools/bin/cri-dockerd | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.113 | false | Rancher head | opt/rke-tools/bin/cri-dockerd | golang.org/x/crypto@v0.22.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.113 | false | Rancher head | opt/rke-tools/rke-etcd-backup | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.113 | false | Rancher head | opt/rke-tools/rke-etcd-backup | golang.org/x/crypto@v0.24.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.113 | false | Rancher head | usr/bin/confd | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.113 | false | Rancher head | usr/bin/confd | golang.org/x/crypto@v0.14.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.113 | false | Rancher head | usr/bin/confd | google.golang.org/grpc@v1.26.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke-tools:v0.1.113 | false | Rancher head | usr/local/bin/etcdctl | github.com/golang-jwt/jwt/v4@v4.4.2 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke-tools:v0.1.113 | false | Rancher head | usr/local/bin/etcdctl | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.113 | false | Rancher head | usr/local/bin/etcdctl | golang.org/x/crypto@v0.21.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-cloud-provider:v1.31.2-0.20241016053446-0955fa330f90-build20241016 | false | Rancher head | usr/local/bin/rke2-cloud-provider | github.com/golang-jwt/jwt/v4@v4.5.0 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-cloud-provider:v1.31.2-0.20241016053446-0955fa330f90-build20241016 | false | Rancher head | usr/local/bin/rke2-cloud-provider | golang.org/x/crypto@v0.27.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-cloud-provider:v1.31.2-0.20241016053446-0955fa330f90-build20241016 | false | Rancher head | usr/local/bin/rke2-cloud-provider | golang.org/x/crypto@v0.27.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-cloud-provider:v1.32.0-rc3.0.20241220224140-68fbd1a6b543-build20250101 | false | Rancher head | usr/local/bin/rke2-cloud-provider | github.com/golang-jwt/jwt/v4@v4.5.1 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-cloud-provider:v1.32.0-rc3.0.20241220224140-68fbd1a6b543-build20250101 | false | Rancher head | usr/local/bin/rke2-cloud-provider | golang.org/x/crypto@v0.29.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-cloud-provider:v1.32.0-rc3.0.20241220224140-68fbd1a6b543-build20250101 | false | Rancher head | usr/local/bin/rke2-cloud-provider | golang.org/x/crypto@v0.29.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.31.8-rke2r1 | false | Rancher head | bin/containerd | golang.org/x/crypto@v0.31.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.31.8-rke2r1 | false | Rancher head | bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.31.8-rke2r1 | false | Rancher head | bin/kubelet | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.31.8-rke2r1 | false | Rancher head | bin/kubelet | golang.org/x/crypto@v0.24.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.32.4-rke2r1 | false | Rancher head | bin/containerd | golang.org/x/crypto@v0.31.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.32.4-rke2r1 | false | Rancher head | bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.32.4-rke2r1 | false | Rancher head | bin/kubelet | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.32.4-rke2r1 | false | Rancher head | bin/kubelet | golang.org/x/crypto@v0.28.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.33.0-rke2r1 | false | Rancher head | bin/containerd | golang.org/x/crypto@v0.31.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.33.0-rke2r1 | false | Rancher head | bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-upgrade:v1.31.8-rke2r1 | false | Rancher head | opt/rke2 | github.com/pion/interceptor@v0.1.37 | CVE-2025-49140 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-upgrade:v1.31.8-rke2r1 | false | Rancher head | opt/rke2 | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-upgrade:v1.31.8-rke2r1 | false | Rancher head | opt/rke2 | golang.org/x/crypto@v0.24.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-upgrade:v1.32.4-rke2r1 | false | Rancher head | opt/rke2 | github.com/pion/interceptor@v0.1.37 | CVE-2025-49140 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-upgrade:v1.32.4-rke2r1 | false | Rancher head | opt/rke2 | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-upgrade:v1.32.4-rke2r1 | false | Rancher head | opt/rke2 | golang.org/x/crypto@v0.28.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-upgrade:v1.33.0-rke2r1 | false | Rancher head | opt/rke2 | github.com/pion/interceptor@v0.1.37 | CVE-2025-49140 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.5.0-rc.2 | false | Rancher head | usr/local/bin/helm | golang.org/x/crypto@v0.31.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/system-agent:v0.3.13-rc.2-suc | false | Rancher head | opt/rancher-system-agent-suc/rancher-system-agent | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/system-agent:v0.3.13-rc.2-suc | false | Rancher head | opt/rancher-system-agent-suc/rancher-system-agent | golang.org/x/crypto@v0.28.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |