Search:
Image | Mirrored | Release | Binary/Package | Dependency | Vulnerability ID (CVE) | Severity | Status | Justification (for status not affected) | Type (language or OS) |
---|---|---|---|---|---|---|---|---|---|
rancher/backup-restore-operator:v7.0.0-alpha.8 | false | Rancher head | usr/bin/backup-restore-operator | golang.org/x/net@v0.31.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/bandwidth | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/calico | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/calico-ipam | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/flannel | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/host-local | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/install | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/loopback | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/tuning | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/bridge | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/bridge | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/bridge | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/dhcp | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/dhcp | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/dhcp | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/flannel | stdlib@v1.21.9 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/flannel | stdlib@v1.21.9 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/host-local | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/host-local | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/host-local | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/ipvlan | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/ipvlan | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/ipvlan | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/loopback | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/loopback | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/loopback | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/macvlan | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/macvlan | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/macvlan | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/ptp | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/ptp | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/ptp | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/tuning | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/tuning | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/tuning | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/vlan | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/vlan | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher head | opt/cni/bin/vlan | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.20.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.4-build20250218 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.20.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-kubernetes:v1.30.10-rke2r1-build20250213 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.20.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-kubernetes:v1.31.6-rke2r1-build20250213 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.20.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-kubernetes:v1.32.2-rke2r1-build20250213 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.20.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-multus-cni:v4.1.4-build20250108 | false | Rancher head | cert-approver | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.1.4-build20250108 | false | Rancher head | install_multus | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.1.4-build20250108 | false | Rancher head | kubeconfig_generator | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.1.4-build20250108 | false | Rancher head | thin_entrypoint | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.1.4-build20250108 | false | Rancher head | usr/src/multus-cni/bin/multus | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-whereabouts:v0.8.0-build20241011 | false | Rancher head | ip-control-loop | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-whereabouts:v0.8.0-build20241011 | false | Rancher head | whereabouts | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher head | usr/bin/harvester-cloud-provider | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2019-12274 | HIGH | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher head | usr/bin/harvester-cloud-provider | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2021-36775 | HIGH | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher head | usr/bin/harvester-cloud-provider | github.com/rancher/steve@v0.0.0-20221209194631-acf9d31ce0dd | CVE-2024-52280 | HIGH | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher head | usr/bin/harvester-cloud-provider | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher head | glibc | glibc@2.31-150300.63.1 | SUSE-SU-2024:1375-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher head | glibc | glibc@2.31-150300.63.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher head | krb5 | krb5@1.19.2-150300.13.1 | SUSE-SU-2024:1001-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher head | krb5 | krb5@1.19.2-150300.13.1 | SUSE-SU-2024:2303-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher head | libblkid1 | libblkid1@2.36.2-150300.4.35.1 | SUSE-SU-2024:1170-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher head | libfdisk1 | libfdisk1@2.36.2-150300.4.35.1 | SUSE-SU-2024:1170-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher head | libglib-2_0-0 | libglib-2_0-0@2.62.6-150200.3.15.1 | SUSE-SU-2024:3998-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher head | libmount1 | libmount1@2.36.2-150300.4.35.1 | SUSE-SU-2024:1170-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher head | libnghttp2-14 | libnghttp2-14@1.40.0-150200.12.1 | SUSE-SU-2024:1167-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher head | libopenssl1_1 | libopenssl1_1@1.1.1d-150200.11.82.1 | SUSE-SU-2024:2035-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher head | libopenssl1_1-hmac | libopenssl1_1-hmac@1.1.1d-150200.11.82.1 | SUSE-SU-2024:2035-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher head | libsmartcols1 | libsmartcols1@2.36.2-150300.4.35.1 | SUSE-SU-2024:1170-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher head | libssh4 | libssh4@0.8.7-10.12.1 | SUSE-SU-2024:0525-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher head | libuuid1 | libuuid1@2.36.2-150300.4.35.1 | SUSE-SU-2024:1170-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher head | libxml2-2 | libxml2-2@2.9.7-150000.3.63.1 | SUSE-SU-2024:0461-2 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher head | libxml2-2 | libxml2-2@2.9.7-150000.3.63.1 | SUSE-SU-2025:0303-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher head | openssl-1_1 | openssl-1_1@1.1.1d-150200.11.82.1 | SUSE-SU-2024:2035-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher head | perl | perl@5.26.1-150300.17.14.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher head | perl-base | perl-base@5.26.1-150300.17.14.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher head | util-linux | util-linux@2.36.2-150300.4.35.1 | SUSE-SU-2024:1170-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher head | usr/bin/istioctl | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher head | usr/bin/istioctl | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher head | usr/bin/istioctl | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher head | usr/local/bin/kubectl | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/istio-installer:1.23.2-rancher1 | false | Rancher head | libopenssl3 | libopenssl3@3.1.4-150600.5.15.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/istio-installer:1.23.2-rancher1 | false | Rancher head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/istio-installer:1.23.2-rancher1 | false | Rancher head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/istio-installer:1.23.2-rancher1 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/istio-installer:1.23.2-rancher1 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/istio-installer:1.23.2-rancher1 | false | Rancher head | nginx | nginx@1.21.5-150600.8.4 | SUSE-SU-2025:0283-1 | HIGH | affected | sles | |
rancher/istio-installer:1.23.2-rancher1 | false | Rancher head | openssl-3 | openssl-3@3.1.4-150600.5.15.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/istio-installer:1.23.2-rancher1 | false | Rancher head | usr/bin/istioctl | stdlib@v1.22.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/istio-installer:1.23.2-rancher1 | false | Rancher head | usr/local/bin/kubectl | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/istio-installer:1.24.1-rancher1 | false | Rancher head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/istio-installer:1.24.1-rancher1 | false | Rancher head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/istio-installer:1.24.1-rancher1 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/istio-installer:1.24.1-rancher1 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/istio-installer:1.24.1-rancher1 | false | Rancher head | nginx | nginx@1.21.5-150600.8.4 | SUSE-SU-2025:0283-1 | HIGH | affected | sles | |
rancher/istio-installer:1.24.1-rancher1 | false | Rancher head | usr/local/bin/kubectl | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kuberlr-kubectl:v4.0.1 | false | Rancher head | bin/kuberlr | stdlib@v1.22.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/machine:v0.15.0-rancher125 | false | Rancher head | git-core | git-core@2.43.0-150600.3.6.1 | SUSE-SU-2025:0116-1 | HIGH | affected | sles | |
rancher/mirrored-calico-csi:v3.29.1 | true | Rancher head | usr/bin/csi-driver | golang.org/x/net@v0.26.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.28.1 | true | Rancher head | usr/bin/calicoctl | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.28.1 | true | Rancher head | usr/bin/calicoctl | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.28.1 | true | Rancher head | usr/bin/calicoctl | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.29.0 | true | Rancher head | usr/bin/calicoctl | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.29.0 | true | Rancher head | usr/bin/calicoctl | golang.org/x/net@v0.26.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.29.1 | true | Rancher head | usr/bin/calicoctl | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.29.1 | true | Rancher head | usr/bin/calicoctl | golang.org/x/net@v0.26.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.28.1 | true | Rancher head | usr/bin/check-status | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.28.1 | true | Rancher head | usr/bin/kube-controllers | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node-driver-registrar:v3.29.1 | true | Rancher head | usr/bin/node-driver-registrar | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.28.1 | true | Rancher head | usr/bin/calico-node | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.28.1 | true | Rancher head | usr/bin/calico-node | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.28.1 | true | Rancher head | usr/bin/calico-node | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.28.1 | true | Rancher head | usr/bin/mountns | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.29.0 | true | Rancher head | usr/bin/calico-node | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.29.0 | true | Rancher head | usr/bin/calico-node | golang.org/x/net@v0.26.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.29.1 | true | Rancher head | usr/bin/calico-node | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.29.1 | true | Rancher head | usr/bin/calico-node | golang.org/x/net@v0.26.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.36.2 | true | Rancher head | usr/bin/operator | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.36.2 | true | Rancher head | usr/bin/operator | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-pod2daemon-flexvol:v3.28.1 | true | Rancher head | usr/local/bin/flexvol | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-certgen:v0.2.0 | true | Rancher head | usr/bin/cilium-certgen | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-certgen:v0.2.0 | true | Rancher head | usr/bin/cilium-certgen | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-certgen:v0.2.0 | true | Rancher head | usr/bin/cilium-certgen | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-certgen:v0.2.1 | true | Rancher head | usr/bin/cilium-certgen | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-certgen:v0.2.1 | true | Rancher head | usr/bin/cilium-certgen | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-certgen:v0.2.1 | true | Rancher head | usr/bin/cilium-certgen | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-ui-backend:v0.13.1 | true | Rancher head | usr/bin/backend | github.com/cilium/cilium@v1.15.5 | CVE-2024-37307 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-hubble-ui-backend:v0.13.1 | true | Rancher head | usr/bin/backend | golang.org/x/net@v0.25.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-ui-backend:v0.13.1 | true | Rancher head | usr/bin/backend | stdlib@v1.22.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-ui-backend:v0.13.1 | true | Rancher head | usr/bin/backend | stdlib@v1.22.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.41.1 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.41.1 | CVE-2023-45142 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/net@v0.10.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/net@v0.10.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.41.1 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.41.1 | CVE-2023-45142 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.11.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/net@v0.13.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/net@v0.13.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.7 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.7 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.29.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.29.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.29.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/net@v0.17.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.29.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.21.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.29.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.21.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.29.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.21.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.30.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.30.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.30.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/net@v0.23.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.30.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.22.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.30.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.22.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | curl | curl@8.1.2-7.ph4 | CVE-2024-2398 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | curl | curl@8.1.2-7.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | curl-libs | curl-libs@8.1.2-7.ph4 | CVE-2024-2398 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | curl-libs | curl-libs@8.1.2-7.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | expat | expat@2.2.9-11.ph4 | CVE-2024-45491 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | expat | expat@2.2.9-11.ph4 | CVE-2024-45492 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | expat | expat@2.2.9-11.ph4 | CVE-2023-52425 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | expat | expat@2.2.9-11.ph4 | CVE-2024-28757 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | expat | expat@2.2.9-11.ph4 | CVE-2024-45490 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-45491 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-45492 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2023-52425 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-28757 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-45490 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | glib | glib@2.68.4-1.ph4 | CVE-2024-52533 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | glibc | glibc@2.32-15.ph4 | CVE-2024-2961 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | glibc-iconv | glibc-iconv@2.32-15.ph4 | CVE-2024-2961 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | krb5 | krb5@1.17-10.ph4 | CVE-2024-37371 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | krb5 | krb5@1.17-10.ph4 | CVE-2024-37370 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | libtasn1 | libtasn1@4.14-2.ph4 | CVE-2024-12133 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2024-56171 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2025-24928 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2025-27113 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | nss-libs | nss-libs@3.72-4.ph4 | CVE-2024-0743 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | openssl | openssl@3.0.13-2.ph4 | CVE-2024-5535 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | openssl | openssl@3.0.13-2.ph4 | CVE-2024-2511 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | openssl | openssl@3.0.13-2.ph4 | CVE-2024-6119 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | python3 | python3@3.10.11-7.ph4 | CVE-2023-6597 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | python3 | python3@3.10.11-7.ph4 | CVE-2024-6232 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | python3 | python3@3.10.11-7.ph4 | cve-2024-7592 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | python3-libs | python3-libs@3.10.11-7.ph4 | CVE-2023-6597 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | python3-libs | python3-libs@3.10.11-7.ph4 | CVE-2024-6232 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | python3-libs | python3-libs@3.10.11-7.ph4 | cve-2024-7592 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | util-linux | util-linux@2.37.4-1.ph4 | CVE-2024-28085 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | util-linux-libs | util-linux-libs@2.37.4-1.ph4 | CVE-2024-28085 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | usr/bin/vsphere-csi | golang.org/x/net@v0.19.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | usr/bin/vsphere-csi | k8s.io/kubernetes@v1.26.10 | CVE-2023-5528 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | usr/bin/vsphere-csi | k8s.io/kubernetes@v1.26.10 | CVE-2024-0793 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | usr/bin/vsphere-csi | k8s.io/kubernetes@v1.26.10 | CVE-2024-10220 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | usr/bin/vsphere-csi | k8s.io/kubernetes@v1.26.10 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | usr/bin/vsphere-csi | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | usr/bin/vsphere-csi | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | usr/bin/vsphere-csi | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | curl | curl@8.7.1-1.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | curl-libs | curl-libs@8.7.1-1.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | expat | expat@2.4.9-2.ph4 | CVE-2024-45491 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | expat | expat@2.4.9-2.ph4 | CVE-2024-45492 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | expat | expat@2.4.9-2.ph4 | CVE-2024-45490 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | expat-libs | expat-libs@2.4.9-2.ph4 | CVE-2024-45491 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | expat-libs | expat-libs@2.4.9-2.ph4 | CVE-2024-45492 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | expat-libs | expat-libs@2.4.9-2.ph4 | CVE-2024-45490 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | glib | glib@2.68.4-2.ph4 | CVE-2024-52533 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | krb5 | krb5@1.17-11.ph4 | CVE-2024-37371 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | krb5 | krb5@1.17-11.ph4 | CVE-2024-37370 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | libtasn1 | libtasn1@4.14-2.ph4 | CVE-2024-12133 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | libxml2 | libxml2@2.9.12-14.ph4 | CVE-2024-56171 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | libxml2 | libxml2@2.9.12-14.ph4 | CVE-2025-24928 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | libxml2 | libxml2@2.9.12-14.ph4 | CVE-2025-27113 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | nss-libs | nss-libs@3.72-5.ph4 | CVE-2024-0743 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | openssl | openssl@3.0.14-2.ph4 | CVE-2024-6119 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | python3 | python3@3.10.11-8.ph4 | CVE-2023-6597 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | python3 | python3@3.10.11-8.ph4 | CVE-2024-6232 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | python3 | python3@3.10.11-8.ph4 | cve-2024-7592 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | python3-libs | python3-libs@3.10.11-8.ph4 | CVE-2023-6597 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | python3-libs | python3-libs@3.10.11-8.ph4 | CVE-2024-6232 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | python3-libs | python3-libs@3.10.11-8.ph4 | cve-2024-7592 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | usr/bin/vsphere-csi | golang.org/x/net@v0.19.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | usr/bin/vsphere-csi | k8s.io/kubernetes@v1.27.10 | CVE-2024-10220 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | usr/bin/vsphere-csi | k8s.io/kubernetes@v1.27.10 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | usr/bin/vsphere-csi | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | curl | curl@8.1.2-7.ph4 | CVE-2024-2398 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | curl | curl@8.1.2-7.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | curl-libs | curl-libs@8.1.2-7.ph4 | CVE-2024-2398 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | curl-libs | curl-libs@8.1.2-7.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-45491 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-45492 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2023-52425 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-28757 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-45490 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | glibc | glibc@2.32-15.ph4 | CVE-2024-2961 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | krb5 | krb5@1.17-10.ph4 | CVE-2024-37371 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | krb5 | krb5@1.17-10.ph4 | CVE-2024-37370 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2024-56171 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2025-24928 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2025-27113 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | nss-libs | nss-libs@3.72-4.ph4 | CVE-2024-0743 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | openssl | openssl@3.0.13-2.ph4 | CVE-2024-5535 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | openssl | openssl@3.0.13-2.ph4 | CVE-2024-2511 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | openssl | openssl@3.0.13-2.ph4 | CVE-2024-6119 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | usr/bin/vsphere-syncer | golang.org/x/net@v0.19.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | usr/bin/vsphere-syncer | k8s.io/kubernetes@v1.26.10 | CVE-2023-5528 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | usr/bin/vsphere-syncer | k8s.io/kubernetes@v1.26.10 | CVE-2024-0793 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | usr/bin/vsphere-syncer | k8s.io/kubernetes@v1.26.10 | CVE-2024-10220 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | usr/bin/vsphere-syncer | k8s.io/kubernetes@v1.26.10 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | usr/bin/vsphere-syncer | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | usr/bin/vsphere-syncer | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | usr/bin/vsphere-syncer | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | curl | curl@8.7.1-1.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | curl-libs | curl-libs@8.7.1-1.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | expat-libs | expat-libs@2.4.9-2.ph4 | CVE-2024-45491 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | expat-libs | expat-libs@2.4.9-2.ph4 | CVE-2024-45492 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | expat-libs | expat-libs@2.4.9-2.ph4 | CVE-2024-45490 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | krb5 | krb5@1.17-11.ph4 | CVE-2024-37371 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | krb5 | krb5@1.17-11.ph4 | CVE-2024-37370 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | libxml2 | libxml2@2.9.12-14.ph4 | CVE-2024-56171 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | libxml2 | libxml2@2.9.12-14.ph4 | CVE-2025-24928 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | libxml2 | libxml2@2.9.12-14.ph4 | CVE-2025-27113 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | nss-libs | nss-libs@3.72-5.ph4 | CVE-2024-0743 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | openssl | openssl@3.0.14-2.ph4 | CVE-2024-6119 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | usr/bin/vsphere-syncer | golang.org/x/net@v0.19.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | usr/bin/vsphere-syncer | k8s.io/kubernetes@v1.27.10 | CVE-2024-10220 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | usr/bin/vsphere-syncer | k8s.io/kubernetes@v1.27.10 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | usr/bin/vsphere-syncer | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.31.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.31.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/net@v0.26.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.31.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.22.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.31.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.31.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/net@v0.26.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.32.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.30.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.32.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/net@v0.32.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.32.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.23.0 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.32.2 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.23.0 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cluster-proportional-autoscaler:v1.8.9 | true | Rancher head | cluster-proportional-autoscaler | golang.org/x/net@v0.8.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-cluster-proportional-autoscaler:v1.8.9 | true | Rancher head | cluster-proportional-autoscaler | golang.org/x/net@v0.8.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cluster-proportional-autoscaler:v1.8.9 | true | Rancher head | cluster-proportional-autoscaler | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cluster-proportional-autoscaler:v1.8.9 | true | Rancher head | cluster-proportional-autoscaler | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-cluster-proportional-autoscaler:v1.8.9 | true | Rancher head | cluster-proportional-autoscaler | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cluster-proportional-autoscaler:v1.8.9 | true | Rancher head | cluster-proportional-autoscaler | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cluster-proportional-autoscaler:v1.8.9 | true | Rancher head | cluster-proportional-autoscaler | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.11.1 | true | Rancher head | coredns | github.com/quic-go/quic-go@v0.37.4 | CVE-2024-22189 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.11.1 | true | Rancher head | coredns | google.golang.org/grpc@v1.57.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.11.1 | true | Rancher head | coredns | stdlib@v1.20.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.11.1 | true | Rancher head | coredns | stdlib@v1.20.7 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.11.1 | true | Rancher head | coredns | stdlib@v1.20.7 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.11.1 | true | Rancher head | coredns | stdlib@v1.20.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.11.1 | true | Rancher head | coredns | stdlib@v1.20.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.11.3 | true | Rancher head | coredns | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher head | usr/local/bin/etcd | stdlib@v1.20.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher head | usr/local/bin/etcd | stdlib@v1.20.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher head | usr/local/bin/etcd | stdlib@v1.20.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher head | usr/local/bin/etcdctl | stdlib@v1.20.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher head | usr/local/bin/etcdctl | stdlib@v1.20.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher head | usr/local/bin/etcdctl | stdlib@v1.20.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher head | usr/local/bin/etcdutl | stdlib@v1.20.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher head | usr/local/bin/etcdutl | stdlib@v1.20.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher head | usr/local/bin/etcdutl | stdlib@v1.20.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.15 | true | Rancher head | usr/local/bin/etcd | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.15 | true | Rancher head | usr/local/bin/etcdctl | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.15 | true | Rancher head | usr/local/bin/etcdutl | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-curlimages-curl:7.85.0 | true | Rancher head | libcrypto1.1 | libcrypto1.1@1.1.1q-r0 | CVE-2022-4450 | HIGH | affected | alpine | |
rancher/mirrored-curlimages-curl:7.85.0 | true | Rancher head | libcrypto1.1 | libcrypto1.1@1.1.1q-r0 | CVE-2023-0215 | HIGH | affected | alpine | |
rancher/mirrored-curlimages-curl:7.85.0 | true | Rancher head | libcrypto1.1 | libcrypto1.1@1.1.1q-r0 | CVE-2023-0286 | HIGH | affected | alpine | |
rancher/mirrored-curlimages-curl:7.85.0 | true | Rancher head | libcrypto1.1 | libcrypto1.1@1.1.1q-r0 | CVE-2023-0464 | HIGH | affected | alpine | |
rancher/mirrored-curlimages-curl:7.85.0 | true | Rancher head | libssl1.1 | libssl1.1@1.1.1q-r0 | CVE-2022-4450 | HIGH | affected | alpine | |
rancher/mirrored-curlimages-curl:7.85.0 | true | Rancher head | libssl1.1 | libssl1.1@1.1.1q-r0 | CVE-2023-0215 | HIGH | affected | alpine | |
rancher/mirrored-curlimages-curl:7.85.0 | true | Rancher head | libssl1.1 | libssl1.1@1.1.1q-r0 | CVE-2023-0286 | HIGH | affected | alpine | |
rancher/mirrored-curlimages-curl:7.85.0 | true | Rancher head | libssl1.1 | libssl1.1@1.1.1q-r0 | CVE-2023-0464 | HIGH | affected | alpine | |
rancher/mirrored-curlimages-curl:7.85.0 | true | Rancher head | nghttp2-dev | nghttp2-dev@1.46.0-r0 | CVE-2023-35945 | HIGH | affected | alpine | |
rancher/mirrored-curlimages-curl:7.85.0 | true | Rancher head | nghttp2-dev | nghttp2-dev@1.46.0-r0 | CVE-2023-44487 | HIGH | affected | alpine | |
rancher/mirrored-curlimages-curl:7.85.0 | true | Rancher head | nghttp2-libs | nghttp2-libs@1.46.0-r0 | CVE-2023-35945 | HIGH | affected | alpine | |
rancher/mirrored-curlimages-curl:7.85.0 | true | Rancher head | nghttp2-libs | nghttp2-libs@1.46.0-r0 | CVE-2023-44487 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.25.1 | true | Rancher head | libcrypto3 | libcrypto3@3.2.1-r2 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.25.1 | true | Rancher head | libcurl | libcurl@8.7.1-r0 | CVE-2024-6197 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.25.1 | true | Rancher head | libssl3 | libssl3@3.2.1-r2 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.25.1 | true | Rancher head | opt/bin/flanneld | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.25.1 | true | Rancher head | opt/bin/flanneld | golang.org/x/net@v0.22.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.25.1 | true | Rancher head | opt/bin/flanneld | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.25.1 | true | Rancher head | opt/bin/flanneld | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.25.1 | true | Rancher head | opt/bin/flanneld | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.25.1 | true | Rancher head | sbin/iptables-wrapper | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.25.1 | true | Rancher head | sbin/iptables-wrapper | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.25.1 | true | Rancher head | sbin/iptables-wrapper | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.26.4 | true | Rancher head | libcrypto3 | libcrypto3@3.3.2-r4 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.26.4 | true | Rancher head | libssl3 | libssl3@3.3.2-r4 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-fluent-fluent-bit:3.1.8 | true | Rancher head | libldap-2.5-0 | libldap-2.5-0@2.5.13+dfsg-5 | CVE-2023-2953 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8 | true | Rancher head | libpq5 | libpq5@15.8-0+deb12u1 | CVE-2024-10979 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8 | true | Rancher head | libpq5 | libpq5@15.8-0+deb12u1 | CVE-2025-1094 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8 | true | Rancher head | zlib1g | zlib1g@1:1.2.13.dfsg-1 | CVE-2023-45853 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | bind9-dnsutils | bind9-dnsutils@1:9.18.28-1~deb12u2 | CVE-2024-11187 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | bind9-dnsutils | bind9-dnsutils@1:9.18.28-1~deb12u2 | CVE-2024-12705 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | bind9-host | bind9-host@1:9.18.28-1~deb12u2 | CVE-2024-11187 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | bind9-host | bind9-host@1:9.18.28-1~deb12u2 | CVE-2024-12705 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | bind9-libs | bind9-libs@1:9.18.28-1~deb12u2 | CVE-2024-11187 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | bind9-libs | bind9-libs@1:9.18.28-1~deb12u2 | CVE-2024-12705 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | dnsutils | dnsutils@1:9.18.28-1~deb12u2 | CVE-2024-11187 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | dnsutils | dnsutils@1:9.18.28-1~deb12u2 | CVE-2024-12705 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | libarchive13 | libarchive13@3.6.2-1+deb12u1 | CVE-2024-20696 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | libcups2 | libcups2@2.4.2-3+deb12u7 | CVE-2024-47175 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | libexpat1 | libexpat1@2.5.0-1 | CVE-2024-45491 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | libexpat1 | libexpat1@2.5.0-1 | CVE-2024-45492 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | libexpat1 | libexpat1@2.5.0-1 | CVE-2023-52425 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | libexpat1 | libexpat1@2.5.0-1 | CVE-2024-45490 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | libfreetype6 | libfreetype6@2.12.1+dfsg-5+deb12u3 | CVE-2025-27363 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | libglib2.0-0 | libglib2.0-0@2.74.6-2+deb12u3 | CVE-2024-52533 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | libharfbuzz0b | libharfbuzz0b@6.0.0+dfsg-3 | CVE-2023-25193 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | libldap-2.5-0 | libldap-2.5-0@2.5.13+dfsg-5 | CVE-2023-2953 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | libnss3 | libnss3@2:3.87.1-1 | CVE-2024-0743 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | libnss3 | libnss3@2:3.87.1-1 | CVE-2024-6609 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | libperl5.36 | libperl5.36@5.36.0-7+deb12u1 | CVE-2023-31484 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | libpq-dev | libpq-dev@15.8-0+deb12u1 | CVE-2024-10979 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | libpq-dev | libpq-dev@15.8-0+deb12u1 | CVE-2025-1094 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | libpq5 | libpq5@15.8-0+deb12u1 | CVE-2024-10979 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | libpq5 | libpq5@15.8-0+deb12u1 | CVE-2025-1094 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | libpython3.11 | libpython3.11@3.11.2-6+deb12u3 | CVE-2024-6232 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | libpython3.11 | libpython3.11@3.11.2-6+deb12u3 | CVE-2024-7592 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | libpython3.11 | libpython3.11@3.11.2-6+deb12u3 | CVE-2024-9287 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | libpython3.11-minimal | libpython3.11-minimal@3.11.2-6+deb12u3 | CVE-2024-6232 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | libpython3.11-minimal | libpython3.11-minimal@3.11.2-6+deb12u3 | CVE-2024-7592 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | libpython3.11-minimal | libpython3.11-minimal@3.11.2-6+deb12u3 | CVE-2024-9287 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | libpython3.11-stdlib | libpython3.11-stdlib@3.11.2-6+deb12u3 | CVE-2024-6232 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | libpython3.11-stdlib | libpython3.11-stdlib@3.11.2-6+deb12u3 | CVE-2024-7592 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | libpython3.11-stdlib | libpython3.11-stdlib@3.11.2-6+deb12u3 | CVE-2024-9287 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | libsqlite3-0 | libsqlite3-0@3.40.1-2 | CVE-2023-7104 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | libtiff6 | libtiff6@4.5.0-6+deb12u1 | CVE-2023-52355 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | libtiff6 | libtiff6@4.5.0-6+deb12u1 | CVE-2023-52356 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | libtiff6 | libtiff6@4.5.0-6+deb12u1 | CVE-2024-7006 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | libxml2 | libxml2@2.9.14+dfsg-1.3~deb12u1 | CVE-2024-25062 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | libxml2 | libxml2@2.9.14+dfsg-1.3~deb12u1 | CVE-2024-56171 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | libxml2 | libxml2@2.9.14+dfsg-1.3~deb12u1 | CVE-2025-24928 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | libxml2 | libxml2@2.9.14+dfsg-1.3~deb12u1 | CVE-2025-27113 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | libxml2-dev | libxml2-dev@2.9.14+dfsg-1.3~deb12u1 | CVE-2024-25062 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | libxml2-dev | libxml2-dev@2.9.14+dfsg-1.3~deb12u1 | CVE-2024-56171 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | libxml2-dev | libxml2-dev@2.9.14+dfsg-1.3~deb12u1 | CVE-2025-24928 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | libxml2-dev | libxml2-dev@2.9.14+dfsg-1.3~deb12u1 | CVE-2025-27113 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47685 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2013-7445 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2019-19449 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2019-19814 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2021-3847 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2021-3864 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2023-52452 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2023-52586 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2023-52751 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2023-52812 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-21803 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-25742 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-25743 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-26669 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-26739 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-26913 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-26930 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-26944 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-26952 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-26982 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-27042 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-35866 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-35887 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-35929 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-35937 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-36013 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-36899 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-36921 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-38570 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-38630 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-39479 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-39508 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-41013 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-41096 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-42162 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-42228 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-42314 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-44940 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-44941 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-44942 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-44949 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-44951 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-44974 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-44977 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-44983 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-44985 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-44986 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-44987 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-44998 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-44999 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-45026 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46673 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46674 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46722 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46723 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46724 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46725 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46731 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46738 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46740 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46743 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46744 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46746 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46747 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46759 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46774 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46782 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46786 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46798 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46800 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46804 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46811 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46812 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46813 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46814 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46815 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46818 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46821 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46828 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46830 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46833 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46836 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46844 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46849 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46852 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46853 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46854 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46858 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46859 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46865 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46871 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47659 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47670 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47682 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47686 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47691 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47695 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47696 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47697 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47698 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47701 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47718 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47723 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47727 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47730 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47742 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47745 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47747 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47748 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47750 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47751 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47757 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49852 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49853 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49854 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49855 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49860 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49861 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49882 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49883 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49884 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49889 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49894 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49895 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49900 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49903 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49924 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49928 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49930 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49936 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49950 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49960 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49966 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49969 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49981 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49982 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49983 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49986 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49989 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49991 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49992 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49995 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49996 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49997 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50007 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50029 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50033 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50035 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50036 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50047 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50051 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50055 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50059 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50061 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50063 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50067 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50073 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50074 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50083 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50086 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50088 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50112 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50115 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50121 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50124 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50125 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50126 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50127 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50128 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50131 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50143 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50150 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50151 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50154 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50155 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50164 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50180 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50186 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50193 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50200 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50209 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50215 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50217 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50226 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50230 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50234 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50235 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50242 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50246 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50247 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50250 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50257 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50261 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50262 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50264 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50267 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50268 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50269 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50275 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50276 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50278 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50279 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50282 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50283 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50286 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50301 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53057 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53059 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53061 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53068 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53082 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53096 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53099 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53103 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53104 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53108 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53133 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53141 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53142 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53150 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53155 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53156 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53165 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53166 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53168 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53170 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53171 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53173 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53174 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53179 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53203 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53206 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53208 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53213 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53216 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53227 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53229 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53237 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53239 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56538 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56548 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56551 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56558 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56581 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56582 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56595 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56596 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56598 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56600 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56601 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56602 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56603 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56604 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56605 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56606 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56608 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56614 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56615 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56626 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56627 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56631 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56640 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56642 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56645 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56650 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56651 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56658 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56662 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56663 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56664 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56672 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56675 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56704 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56708 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56759 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56765 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56766 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56775 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56784 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-57798 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-57850 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-57887 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-57892 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-57896 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-57900 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-57906 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-57907 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-57908 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-57910 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-57911 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-57912 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-57925 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-57951 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-57980 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-57982 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-57984 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-58002 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-58007 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-58087 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-8805 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2025-21631 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2025-21647 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2025-21648 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2025-21671 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2025-21680 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2025-21687 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2025-21692 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2025-21702 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2025-21703 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2025-21718 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2025-21726 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2025-21735 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2025-21753 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2025-21782 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2025-21785 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2025-21794 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2025-21812 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | perl | perl@5.36.0-7+deb12u1 | CVE-2023-31484 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | perl-base | perl-base@5.36.0-7+deb12u1 | CVE-2023-31484 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | perl-modules-5.36 | perl-modules-5.36@5.36.0-7+deb12u1 | CVE-2023-31484 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | postgresql-client-15 | postgresql-client-15@15.8-0+deb12u1 | CVE-2024-10979 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | postgresql-client-15 | postgresql-client-15@15.8-0+deb12u1 | CVE-2025-1094 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | postgresql-server-dev-15 | postgresql-server-dev-15@15.8-0+deb12u1 | CVE-2024-10979 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | postgresql-server-dev-15 | postgresql-server-dev-15@15.8-0+deb12u1 | CVE-2025-1094 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | python3-pkg-resources | python3-pkg-resources@66.1.1-1 | CVE-2024-6345 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | python3.11 | python3.11@3.11.2-6+deb12u3 | CVE-2024-6232 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | python3.11 | python3.11@3.11.2-6+deb12u3 | CVE-2024-7592 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | python3.11 | python3.11@3.11.2-6+deb12u3 | CVE-2024-9287 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | python3.11-minimal | python3.11-minimal@3.11.2-6+deb12u3 | CVE-2024-6232 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | python3.11-minimal | python3.11-minimal@3.11.2-6+deb12u3 | CVE-2024-7592 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | python3.11-minimal | python3.11-minimal@3.11.2-6+deb12u3 | CVE-2024-9287 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | sysstat | sysstat@12.6.1-1 | CVE-2023-33204 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | vim | vim@2:9.0.1378-2 | CVE-2023-2610 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | vim | vim@2:9.0.1378-2 | CVE-2023-4738 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | vim | vim@2:9.0.1378-2 | CVE-2023-4752 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | vim | vim@2:9.0.1378-2 | CVE-2023-4781 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | vim | vim@2:9.0.1378-2 | CVE-2023-5344 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | vim | vim@2:9.0.1378-2 | CVE-2024-22667 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | vim-common | vim-common@2:9.0.1378-2 | CVE-2023-2610 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | vim-common | vim-common@2:9.0.1378-2 | CVE-2023-4738 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | vim-common | vim-common@2:9.0.1378-2 | CVE-2023-4752 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | vim-common | vim-common@2:9.0.1378-2 | CVE-2023-4781 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | vim-common | vim-common@2:9.0.1378-2 | CVE-2023-5344 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | vim-common | vim-common@2:9.0.1378-2 | CVE-2024-22667 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | vim-runtime | vim-runtime@2:9.0.1378-2 | CVE-2023-2610 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | vim-runtime | vim-runtime@2:9.0.1378-2 | CVE-2023-4738 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | vim-runtime | vim-runtime@2:9.0.1378-2 | CVE-2023-4752 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | vim-runtime | vim-runtime@2:9.0.1378-2 | CVE-2023-4781 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | vim-runtime | vim-runtime@2:9.0.1378-2 | CVE-2023-5344 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | vim-runtime | vim-runtime@2:9.0.1378-2 | CVE-2024-22667 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | zlib1g | zlib1g@1:1.2.13.dfsg-1 | CVE-2023-45853 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher head | zlib1g-dev | zlib1g-dev@1:1.2.13.dfsg-1 | CVE-2023-45853 | CRITICAL | affected | debian | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher head | aom-libs | aom-libs@3.9.0-r0 | CVE-2024-5171 | CRITICAL | affected | alpine | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher head | cups-libs | cups-libs@2.4.8-r0 | CVE-2024-47175 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher head | gdk-pixbuf | gdk-pixbuf@2.42.11-r1 | CVE-2022-48622 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher head | libcrypto3 | libcrypto3@3.3.0-r2 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher head | libexpat | libexpat@2.6.2-r0 | CVE-2024-45491 | CRITICAL | affected | alpine | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher head | libexpat | libexpat@2.6.2-r0 | CVE-2024-45492 | CRITICAL | affected | alpine | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher head | libexpat | libexpat@2.6.2-r0 | CVE-2024-45490 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher head | libssl3 | libssl3@3.3.0-r2 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher head | libvpx | libvpx@1.14.0-r0 | CVE-2024-5197 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher head | libxml2 | libxml2@2.12.7-r0 | CVE-2024-56171 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher head | libxml2 | libxml2@2.12.7-r0 | CVE-2025-24928 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher head | libxml2 | libxml2@2.12.7-r0 | CVE-2025-27113 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher head | mbedtls | mbedtls@3.6.0-r0 | CVE-2024-45159 | CRITICAL | affected | alpine | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher head | Node.js | axios@1.6.7 | CVE-2024-39338 | HIGH | affected | node-pkg | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher head | Node.js | axios@1.6.7 | CVE-2025-27152 | HIGH | affected | node-pkg | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher head | Node.js | body-parser@1.20.2 | CVE-2024-45590 | HIGH | affected | node-pkg | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher head | Node.js | braces@3.0.2 | CVE-2024-4068 | HIGH | affected | node-pkg | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher head | Node.js | cross-spawn@7.0.3 | CVE-2024-21538 | HIGH | affected | node-pkg | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher head | Node.js | cross-spawn@7.0.3 | CVE-2024-21538 | HIGH | affected | node-pkg | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher head | Node.js | dompurify@2.4.7 | CVE-2024-45801 | HIGH | affected | node-pkg | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher head | Node.js | dompurify@2.4.7 | CVE-2024-47875 | HIGH | affected | node-pkg | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher head | Node.js | ip@1.1.9 | CVE-2024-29415 | HIGH | affected | node-pkg | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher head | Node.js | ip@2.0.1 | CVE-2024-29415 | HIGH | affected | node-pkg | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher head | Node.js | path-to-regexp@0.1.7 | CVE-2024-45296 | HIGH | affected | node-pkg | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher head | Node.js | path-to-regexp@0.1.7 | CVE-2024-52798 | HIGH | affected | node-pkg | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher head | Node.js | ws@8.13.0 | CVE-2024-37890 | HIGH | affected | node-pkg | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher head | krb5-libs | krb5-libs@1.20.1-r0 | CVE-2024-37371 | CRITICAL | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher head | krb5-libs | krb5-libs@1.20.1-r0 | CVE-2024-37370 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher head | libcom_err | libcom_err@1.46.5-r4 | CVE-2022-1304 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher head | libcrypto3 | libcrypto3@3.0.7-r0 | CVE-2022-3996 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher head | libcrypto3 | libcrypto3@3.0.7-r0 | CVE-2022-4450 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher head | libcrypto3 | libcrypto3@3.0.7-r0 | CVE-2023-0215 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher head | libcrypto3 | libcrypto3@3.0.7-r0 | CVE-2023-0216 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher head | libcrypto3 | libcrypto3@3.0.7-r0 | CVE-2023-0217 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher head | libcrypto3 | libcrypto3@3.0.7-r0 | CVE-2023-0286 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher head | libcrypto3 | libcrypto3@3.0.7-r0 | CVE-2023-0401 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher head | libcrypto3 | libcrypto3@3.0.7-r0 | CVE-2023-0464 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher head | libcrypto3 | libcrypto3@3.0.7-r0 | CVE-2023-5363 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher head | libexpat | libexpat@2.5.0-r0 | CVE-2024-45491 | CRITICAL | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher head | libexpat | libexpat@2.5.0-r0 | CVE-2024-45492 | CRITICAL | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher head | libexpat | libexpat@2.5.0-r0 | CVE-2023-52425 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher head | libexpat | libexpat@2.5.0-r0 | CVE-2024-28757 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher head | libexpat | libexpat@2.5.0-r0 | CVE-2024-45490 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher head | libssl3 | libssl3@3.0.7-r0 | CVE-2022-3996 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher head | libssl3 | libssl3@3.0.7-r0 | CVE-2022-4450 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher head | libssl3 | libssl3@3.0.7-r0 | CVE-2023-0215 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher head | libssl3 | libssl3@3.0.7-r0 | CVE-2023-0216 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher head | libssl3 | libssl3@3.0.7-r0 | CVE-2023-0217 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher head | libssl3 | libssl3@3.0.7-r0 | CVE-2023-0286 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher head | libssl3 | libssl3@3.0.7-r0 | CVE-2023-0401 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher head | libssl3 | libssl3@3.0.7-r0 | CVE-2023-0464 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher head | libssl3 | libssl3@3.0.7-r0 | CVE-2023-5363 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher head | ncurses-libs | ncurses-libs@6.3_p20221119-r0 | CVE-2023-29491 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher head | ncurses-terminfo-base | ncurses-terminfo-base@6.3_p20221119-r0 | CVE-2023-29491 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher head | sqlite-libs | sqlite-libs@3.40.0-r0 | CVE-2023-7104 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher head | Python | Flask@1.0.2 | CVE-2023-30861 | HIGH | affected | python-pkg | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher head | Python | Werkzeug@0.16.1 | CVE-2023-25577 | HIGH | affected | python-pkg | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher head | Python | Werkzeug@0.16.1 | CVE-2024-34069 | HIGH | affected | python-pkg | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher head | Python | certifi@2022.12.7 | CVE-2023-37920 | HIGH | affected | python-pkg | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher head | Python | setuptools@57.5.0 | CVE-2022-40897 | HIGH | affected | python-pkg | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher head | Python | setuptools@57.5.0 | CVE-2024-6345 | HIGH | affected | python-pkg | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher head | Python | uWSGI@2.0.20 | CVE-2023-27522 | HIGH | affected | python-pkg | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher head | Python | urllib3@1.24.3 | CVE-2023-43804 | HIGH | affected | python-pkg | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v1.4.1 | true | Rancher head | kube-webhook-certgen | golang.org/x/net@v0.22.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v1.4.1 | true | Rancher head | kube-webhook-certgen | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v1.4.1 | true | Rancher head | kube-webhook-certgen | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v1.4.1 | true | Rancher head | kube-webhook-certgen | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.22.1-distroless | true | Rancher head | opt/cni/bin/istio-cni | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.22.1-distroless | true | Rancher head | opt/cni/bin/istio-cni | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.22.1-distroless | true | Rancher head | opt/cni/bin/istio-cni | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.22.1-distroless | true | Rancher head | usr/local/bin/install-cni | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.22.1-distroless | true | Rancher head | usr/local/bin/install-cni | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.22.1-distroless | true | Rancher head | usr/local/bin/install-cni | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.23.2-distroless | true | Rancher head | opt/cni/bin/istio-cni | stdlib@v1.22.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.23.2-distroless | true | Rancher head | usr/local/bin/install-cni | stdlib@v1.22.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-pilot:1.22.1-distroless | true | Rancher head | usr/local/bin/pilot-discovery | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-pilot:1.22.1-distroless | true | Rancher head | usr/local/bin/pilot-discovery | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-pilot:1.22.1-distroless | true | Rancher head | usr/local/bin/pilot-discovery | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-pilot:1.23.2-distroless | true | Rancher head | usr/local/bin/pilot-discovery | stdlib@v1.22.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-proxyv2:1.22.1-distroless | true | Rancher head | usr/local/bin/pilot-agent | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-proxyv2:1.22.1-distroless | true | Rancher head | usr/local/bin/pilot-agent | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-proxyv2:1.22.1-distroless | true | Rancher head | usr/local/bin/pilot-agent | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-proxyv2:1.23.2-distroless | true | Rancher head | usr/local/bin/pilot-agent | stdlib@v1.22.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.57.0 | true | Rancher head | go/bin/all-in-one-linux | github.com/mostynb/go-grpc-compression@v1.2.2 | GHSA-87m9-rv8p-rgmg | HIGH | affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.57.0 | true | Rancher head | go/bin/all-in-one-linux | go.opentelemetry.io/collector/config/configgrpc@v0.98.0 | CVE-2024-36129 | HIGH | affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.57.0 | true | Rancher head | go/bin/all-in-one-linux | go.opentelemetry.io/collector/config/confighttp@v0.98.0 | CVE-2024-36129 | HIGH | affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.57.0 | true | Rancher head | go/bin/all-in-one-linux | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.57.0 | true | Rancher head | go/bin/all-in-one-linux | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.57.0 | true | Rancher head | go/bin/all-in-one-linux | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.60.0 | true | Rancher head | libcrypto3 | libcrypto3@3.3.1-r3 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-jaegertracing-all-in-one:1.60.0 | true | Rancher head | libssl3 | libssl3@3.3.1-r3 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-jaegertracing-all-in-one:1.60.0 | true | Rancher head | go/bin/all-in-one-linux | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.63.0 | true | Rancher head | libcrypto3 | libcrypto3@3.3.2-r0 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-jaegertracing-all-in-one:1.63.0 | true | Rancher head | libssl3 | libssl3@3.3.2-r0 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-jimmidyson-configmap-reload:v0.13.1 | true | Rancher head | configmap-reload | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-dnsmasq-nanny:1.23.0 | true | Rancher head | libc6 | libc6@2.31-13+deb11u7 | CVE-2024-2961 | HIGH | affected | debian | |
rancher/mirrored-k8s-dns-dnsmasq-nanny:1.23.0 | true | Rancher head | libc6 | libc6@2.31-13+deb11u7 | CVE-2024-33599 | HIGH | affected | debian | |
rancher/mirrored-k8s-dns-dnsmasq-nanny:1.23.0 | true | Rancher head | dnsmasq-nanny | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-dnsmasq-nanny:1.23.0 | true | Rancher head | dnsmasq-nanny | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-dnsmasq-nanny:1.23.0 | true | Rancher head | dnsmasq-nanny | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-kube-dns:1.23.0 | true | Rancher head | kube-dns | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-kube-dns:1.23.0 | true | Rancher head | kube-dns | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-kube-dns:1.23.0 | true | Rancher head | kube-dns | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | libc6 | libc6@2.36-9+deb12u3 | CVE-2023-6246 | HIGH | affected | debian | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | libc6 | libc6@2.36-9+deb12u3 | CVE-2023-6779 | HIGH | affected | debian | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | libc6 | libc6@2.36-9+deb12u3 | CVE-2024-2961 | HIGH | affected | debian | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | libc6 | libc6@2.36-9+deb12u3 | CVE-2024-33599 | HIGH | affected | debian | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | libssl3 | libssl3@3.0.11-1~deb12u1 | CVE-2023-5363 | HIGH | affected | debian | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | go-runner | stdlib@v1.21.1 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | go-runner | stdlib@v1.21.1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | go-runner | stdlib@v1.21.1 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | go-runner | stdlib@v1.21.1 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | go-runner | stdlib@v1.21.1 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2023-5528 | HIGH | affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2024-0793 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | node-cache | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | node-cache | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | node-cache | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-sidecar:1.23.0 | true | Rancher head | sidecar | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-sidecar:1.23.0 | true | Rancher head | sidecar | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-sidecar:1.23.0 | true | Rancher head | sidecar | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kiali-kiali:v1.86.0 | true | Rancher head | glibc | glibc@2.28-236.el8_9.12 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.86.0 | true | Rancher head | glibc | glibc@2.28-236.el8_9.12 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.86.0 | true | Rancher head | glibc-common | glibc-common@2.28-236.el8_9.12 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.86.0 | true | Rancher head | glibc-common | glibc-common@2.28-236.el8_9.12 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.86.0 | true | Rancher head | glibc-minimal-langpack | glibc-minimal-langpack@2.28-236.el8_9.12 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.86.0 | true | Rancher head | glibc-minimal-langpack | glibc-minimal-langpack@2.28-236.el8_9.12 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.86.0 | true | Rancher head | opt/kiali/kiali | stdlib@v1.22.1 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kiali-kiali:v1.86.0 | true | Rancher head | opt/kiali/kiali | stdlib@v1.22.1 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kiali-kiali:v1.86.0 | true | Rancher head | opt/kiali/kiali | stdlib@v1.22.1 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kiali-kiali:v1.86.0 | true | Rancher head | opt/kiali/kiali | stdlib@v1.22.1 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kiali-kiali:v1.89.3 | true | Rancher head | glibc | glibc@2.28-236.el8_9.12 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.89.3 | true | Rancher head | glibc | glibc@2.28-236.el8_9.12 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.89.3 | true | Rancher head | glibc-common | glibc-common@2.28-236.el8_9.12 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.89.3 | true | Rancher head | glibc-common | glibc-common@2.28-236.el8_9.12 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.89.3 | true | Rancher head | glibc-minimal-langpack | glibc-minimal-langpack@2.28-236.el8_9.12 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.89.3 | true | Rancher head | glibc-minimal-langpack | glibc-minimal-langpack@2.28-236.el8_9.12 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.89.3 | true | Rancher head | opt/kiali/kiali | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kiali-kiali:v2.1.0 | true | Rancher head | glibc | glibc@2.34-83.el9_3.12 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v2.1.0 | true | Rancher head | glibc | glibc@2.34-83.el9_3.12 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v2.1.0 | true | Rancher head | glibc-common | glibc-common@2.34-83.el9_3.12 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v2.1.0 | true | Rancher head | glibc-common | glibc-common@2.34-83.el9_3.12 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v2.1.0 | true | Rancher head | glibc-minimal-langpack | glibc-minimal-langpack@2.34-83.el9_3.12 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v2.1.0 | true | Rancher head | glibc-minimal-langpack | glibc-minimal-langpack@2.34-83.el9_3.12 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v2.1.0 | true | Rancher head | openssl | openssl@1:3.0.7-25.el9_3 | CVE-2024-12797 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v2.1.0 | true | Rancher head | openssl-libs | openssl-libs@1:3.0.7-25.el9_3 | CVE-2024-12797 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v2.1.0 | true | Rancher head | opt/kiali/kiali | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.26.1 | true | Rancher head | libexpat | libexpat@2.5.0-r2 | CVE-2024-45491 | CRITICAL | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.26.1 | true | Rancher head | libexpat | libexpat@2.5.0-r2 | CVE-2024-45492 | CRITICAL | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.26.1 | true | Rancher head | libexpat | libexpat@2.5.0-r2 | CVE-2023-52425 | HIGH | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.26.1 | true | Rancher head | libexpat | libexpat@2.5.0-r2 | CVE-2024-28757 | HIGH | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.26.1 | true | Rancher head | libexpat | libexpat@2.5.0-r2 | CVE-2024-45490 | HIGH | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.26.1 | true | Rancher head | Python | setuptools@69.0.3 | CVE-2024-6345 | HIGH | affected | python-pkg | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.26.1 | true | Rancher head | Python | setuptools@69.1.1 | CVE-2024-6345 | HIGH | affected | python-pkg | |
rancher/mirrored-kube-logging-fluentd:v1.16-4.10-full | true | Rancher head | libcrypto3 | libcrypto3@3.3.2-r1 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-kube-logging-fluentd:v1.16-4.10-full | true | Rancher head | libssl3 | libssl3@3.3.2-r1 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-kube-logging-fluentd:v1.16-4.10-full | true | Rancher head | Ruby | google-protobuf@3.21.12 | CVE-2024-7254 | HIGH | affected | gemspec | |
rancher/mirrored-kube-logging-fluentd:v1.16-4.10-full | true | Rancher head | Ruby | rack@3.0.9.1 | CVE-2025-27610 | HIGH | affected | gemspec | |
rancher/mirrored-kube-logging-fluentd:v1.16-4.10-full | true | Rancher head | Ruby | rexml@3.2.6 | CVE-2024-49761 | HIGH | affected | gemspec | |
rancher/mirrored-kube-logging-fluentd:v1.16-4.10-full | true | Rancher head | Ruby | rexml@3.3.2 | CVE-2024-49761 | HIGH | affected | gemspec | |
rancher/mirrored-kube-logging-fluentd:v1.16-4.10-full | true | Rancher head | Ruby | webrick@1.8.1 | CVE-2024-47220 | HIGH | affected | gemspec | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.14.0 | true | Rancher head | kube-state-metrics | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.14.0 | true | Rancher head | kube-state-metrics | golang.org/x/net@v0.29.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.8.7 | true | Rancher head | libcrypto3 | libcrypto3@3.3.2-r1 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.8.7 | true | Rancher head | libssl3 | libssl3@3.3.2-r1 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.27.2-alpine | true | Rancher head | libcrypto3 | libcrypto3@3.3.2-r1 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.27.2-alpine | true | Rancher head | libssl3 | libssl3@3.3.2-r1 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.27.2-alpine | true | Rancher head | libxml2 | libxml2@2.12.7-r0 | CVE-2024-56171 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.27.2-alpine | true | Rancher head | libxml2 | libxml2@2.12.7-r0 | CVE-2025-24928 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.27.2-alpine | true | Rancher head | libxml2 | libxml2@2.12.7-r0 | CVE-2025-27113 | HIGH | affected | alpine | |
rancher/mirrored-library-traefik:2.11.10 | true | Rancher head | libcrypto3 | libcrypto3@3.3.2-r0 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-library-traefik:2.11.10 | true | Rancher head | libssl3 | libssl3@3.3.2-r0 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-library-traefik:2.11.18 | true | Rancher head | libcrypto3 | libcrypto3@3.3.2-r4 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-library-traefik:2.11.18 | true | Rancher head | libssl3 | libssl3@3.3.2-r4 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-library-traefik:3.3.2 | true | Rancher head | libcrypto3 | libcrypto3@3.3.2-r4 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-library-traefik:3.3.2 | true | Rancher head | libssl3 | libssl3@3.3.2-r4 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-longhornio-backing-image-manager:v1.7.3 | true | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.20.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | github.com/prometheus/client_golang@v1.9.0 | CVE-2022-21698 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | golang.org/x/net@v0.0.0-20210410081132-afb366fc7cd1 | CVE-2021-33194 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | golang.org/x/net@v0.0.0-20210410081132-afb366fc7cd1 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | golang.org/x/net@v0.0.0-20210410081132-afb366fc7cd1 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | golang.org/x/net@v0.0.0-20210410081132-afb366fc7cd1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | golang.org/x/net@v0.0.0-20210410081132-afb366fc7cd1 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | golang.org/x/text@v0.3.6 | CVE-2021-38561 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | golang.org/x/text@v0.3.6 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | google.golang.org/grpc@v1.36.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | gopkg.in/yaml.v3@v3.0.0-20210107192922-496545a6307b | CVE-2022-28948 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2021-27918 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2021-33195 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2021-33196 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2021-33198 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2021-39293 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | github.com/prometheus/client_golang@v1.11.0 | CVE-2022-21698 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | golang.org/x/net@v0.0.0-20210520170846-37e1c6afe023 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | golang.org/x/net@v0.0.0-20210520170846-37e1c6afe023 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | golang.org/x/net@v0.0.0-20210520170846-37e1c6afe023 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | golang.org/x/net@v0.0.0-20210520170846-37e1c6afe023 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | golang.org/x/text@v0.3.6 | CVE-2021-38561 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | golang.org/x/text@v0.3.6 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | google.golang.org/grpc@v1.38.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-33195 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-33196 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-33198 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-39293 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | github.com/gogo/protobuf@v1.3.1 | CVE-2021-3121 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | github.com/prometheus/client_golang@v1.8.0 | CVE-2022-21698 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | golang.org/x/crypto@v0.0.0-20201208171446-5f87f3452ae9 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | golang.org/x/crypto@v0.0.0-20201208171446-5f87f3452ae9 | CVE-2020-29652 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | golang.org/x/crypto@v0.0.0-20201208171446-5f87f3452ae9 | CVE-2021-43565 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | golang.org/x/crypto@v0.0.0-20201208171446-5f87f3452ae9 | CVE-2022-27191 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | golang.org/x/net@v0.0.0-20201209123823-ac852fbbde11 | CVE-2021-33194 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | golang.org/x/net@v0.0.0-20201209123823-ac852fbbde11 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | golang.org/x/net@v0.0.0-20201209123823-ac852fbbde11 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | golang.org/x/net@v0.0.0-20201209123823-ac852fbbde11 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | golang.org/x/net@v0.0.0-20201209123823-ac852fbbde11 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | golang.org/x/text@v0.3.4 | CVE-2021-38561 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | golang.org/x/text@v0.3.4 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | google.golang.org/grpc@v1.34.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | gopkg.in/yaml.v3@v3.0.0-20200615113413-eeeca48fe776 | CVE-2022-28948 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2020-28362 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2021-27918 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2021-33195 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2021-33196 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2021-33198 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2021-39293 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | github.com/prometheus/client_golang@v1.9.0 | CVE-2022-21698 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | golang.org/x/net@v0.0.0-20210316092652-d523dce5a7f4 | CVE-2021-33194 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | golang.org/x/net@v0.0.0-20210316092652-d523dce5a7f4 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | golang.org/x/net@v0.0.0-20210316092652-d523dce5a7f4 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | golang.org/x/net@v0.0.0-20210316092652-d523dce5a7f4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | golang.org/x/net@v0.0.0-20210316092652-d523dce5a7f4 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | golang.org/x/text@v0.3.5 | CVE-2021-38561 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | golang.org/x/text@v0.3.5 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | google.golang.org/grpc@v1.36.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | gopkg.in/yaml.v3@v3.0.0-20210107192922-496545a6307b | CVE-2022-28948 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2021-27918 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2021-33195 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2021-33196 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2021-33198 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2021-39293 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-longhorn-engine:v1.7.3 | true | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.20.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/mirrored-longhornio-longhorn-instance-manager:v1.7.3 | true | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.20.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/mirrored-longhornio-longhorn-manager:v1.7.3 | true | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.20.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/mirrored-longhornio-longhorn-share-manager:v1.7.3 | true | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.20.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/mirrored-longhornio-longhorn-ui:v1.7.3 | true | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.20.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/mirrored-longhornio-longhorn-ui:v1.7.3 | true | Rancher head | libxml2-tools | libxml2-tools@2.10.3-150500.5.20.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/mirrored-longhornio-support-bundle-kit:v0.0.51 | true | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.20.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | libcrypto1.1 | libcrypto1.1@1.1.1n-r0 | CVE-2022-4450 | HIGH | affected | alpine | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | libcrypto1.1 | libcrypto1.1@1.1.1n-r0 | CVE-2023-0215 | HIGH | affected | alpine | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | libcrypto1.1 | libcrypto1.1@1.1.1n-r0 | CVE-2023-0286 | HIGH | affected | alpine | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | libcrypto1.1 | libcrypto1.1@1.1.1n-r0 | CVE-2023-0464 | HIGH | affected | alpine | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | libssl1.1 | libssl1.1@1.1.1n-r0 | CVE-2022-4450 | HIGH | affected | alpine | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | libssl1.1 | libssl1.1@1.1.1n-r0 | CVE-2023-0215 | HIGH | affected | alpine | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | libssl1.1 | libssl1.1@1.1.1n-r0 | CVE-2023-0286 | HIGH | affected | alpine | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | libssl1.1 | libssl1.1@1.1.1n-r0 | CVE-2023-0464 | HIGH | affected | alpine | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | zlib | zlib@1.2.12-r0 | CVE-2022-37434 | CRITICAL | affected | alpine | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | github.com/prometheus/client_golang@v1.11.0 | CVE-2022-21698 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-27536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.7.1 | true | Rancher head | metrics-server | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.7.1 | true | Rancher head | metrics-server | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.7.1 | true | Rancher head | metrics-server | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.7.2 | true | Rancher head | metrics-server | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.12.0 | true | Rancher head | adapter | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.12.0 | true | Rancher head | adapter | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.12.0 | true | Rancher head | adapter | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.27.0 | true | Rancher head | bin/alertmanager | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.27.0 | true | Rancher head | bin/alertmanager | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.27.0 | true | Rancher head | bin/alertmanager | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.27.0 | true | Rancher head | bin/amtool | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.27.0 | true | Rancher head | bin/amtool | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.27.0 | true | Rancher head | bin/amtool | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | github.com/prometheus/client_golang@v1.11.0 | CVE-2022-21698 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | golang.org/x/crypto@v0.0.0-20210616213533-5ff15b29337e | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | golang.org/x/crypto@v0.0.0-20210616213533-5ff15b29337e | CVE-2021-43565 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | golang.org/x/crypto@v0.0.0-20210616213533-5ff15b29337e | CVE-2022-27191 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | golang.org/x/net@v0.0.0-20210525063256-abc453219eb5 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | golang.org/x/net@v0.0.0-20210525063256-abc453219eb5 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | golang.org/x/net@v0.0.0-20210525063256-abc453219eb5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | golang.org/x/net@v0.0.0-20210525063256-abc453219eb5 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | golang.org/x/text@v0.3.6 | CVE-2021-38561 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | golang.org/x/text@v0.3.6 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.3.1 | true | Rancher head | bin/node_exporter | stdlib@v1.17.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-admission-webhook:v0.79.0 | true | Rancher head | bin/admission-webhook | golang.org/x/net@v0.32.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-config-reloader:v0.79.0 | true | Rancher head | bin/prometheus-config-reloader | golang.org/x/net@v0.32.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-operator:v0.79.0 | true | Rancher head | bin/operator | golang.org/x/net@v0.32.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-attacher:v4.5.0 | true | Rancher head | csi-attacher | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.44.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-attacher:v4.5.0 | true | Rancher head | csi-attacher | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-attacher:v4.5.0 | true | Rancher head | csi-attacher | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-attacher:v4.5.0 | true | Rancher head | csi-attacher | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-attacher:v4.7.0 | true | Rancher head | csi-attacher | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.10.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.10.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.10.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.12.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.0 | true | Rancher head | csi-provisioner | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.0 | true | Rancher head | csi-provisioner | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.0 | true | Rancher head | csi-provisioner | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.1 | true | Rancher head | csi-provisioner | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.1 | true | Rancher head | csi-provisioner | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.1 | true | Rancher head | csi-provisioner | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.0 | true | Rancher head | csi-resizer | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.44.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.0 | true | Rancher head | csi-resizer | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.0 | true | Rancher head | csi-resizer | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.0 | true | Rancher head | csi-resizer | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.1 | true | Rancher head | csi-resizer | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.44.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.1 | true | Rancher head | csi-resizer | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.1 | true | Rancher head | csi-resizer | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.1 | true | Rancher head | csi-resizer | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.1 | true | Rancher head | csi-snapshotter | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.1 | true | Rancher head | csi-snapshotter | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.1 | true | Rancher head | csi-snapshotter | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.2 | true | Rancher head | csi-snapshotter | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.2 | true | Rancher head | csi-snapshotter | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.2 | true | Rancher head | csi-snapshotter | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.12.0 | true | Rancher head | livenessprobe | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.12.0 | true | Rancher head | livenessprobe | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.12.0 | true | Rancher head | livenessprobe | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.14.0 | true | Rancher head | livenessprobe | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/nginx-ingress-controller:nginx-1.11.3-rancher1 | false | Rancher head | libcrypto3 | libcrypto3@3.3.2-r1 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.11.3-rancher1 | false | Rancher head | libssl3 | libssl3@3.3.2-r1 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.11.3-rancher1 | false | Rancher head | libxml2 | libxml2@2.12.7-r0 | CVE-2024-56171 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.11.3-rancher1 | false | Rancher head | libxml2 | libxml2@2.12.7-r0 | CVE-2025-24928 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.11.3-rancher1 | false | Rancher head | libxml2 | libxml2@2.12.7-r0 | CVE-2025-27113 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.11.3-rancher1 | false | Rancher head | openssl | openssl@3.3.2-r1 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.12.0-rancher1 | false | Rancher head | libcrypto3 | libcrypto3@3.3.2-r4 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.12.0-rancher1 | false | Rancher head | libssl3 | libssl3@3.3.2-r4 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.12.0-rancher1 | false | Rancher head | libxml2 | libxml2@2.13.4-r3 | CVE-2024-56171 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.12.0-rancher1 | false | Rancher head | libxml2 | libxml2@2.13.4-r3 | CVE-2025-24928 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.12.0-rancher1 | false | Rancher head | libxml2 | libxml2@2.13.4-r3 | CVE-2025-27113 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.12.0-rancher1 | false | Rancher head | openssl | openssl@3.3.2-r4 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:v1.12.0-hardened2 | false | Rancher head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.12.0-hardened2 | false | Rancher head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.12.0-hardened2 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.12.0-hardened2 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.12.0-hardened2 | false | Rancher head | libxml2-tools | libxml2-tools@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.12.0-hardened2 | false | Rancher head | libxml2-tools | libxml2-tools@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.12.0-hardened6 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.20.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.12.0-hardened6 | false | Rancher head | libxml2-tools | libxml2-tools@2.10.3-150500.5.20.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/pushprox-client:v0.1.4-rancher2-client | false | Rancher head | libcrypto3 | libcrypto3@3.3.2-r0 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/pushprox-client:v0.1.4-rancher2-client | false | Rancher head | libssl3 | libssl3@3.3.2-r0 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/pushprox-proxy:v0.1.4-rancher2-proxy | false | Rancher head | libcrypto3 | libcrypto3@3.3.2-r0 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/pushprox-proxy:v0.1.4-rancher2-proxy | false | Rancher head | libssl3 | libssl3@3.3.2-r0 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/rancher-agent:head | false | Rancher head | usr/bin/kubectl | stdlib@v1.20.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher-agent:head | false | Rancher head | usr/bin/kubectl | stdlib@v1.20.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher-agent:head | false | Rancher head | usr/bin/kubectl | stdlib@v1.20.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:head | false | Rancher head | opt/drivers/management-state/bin/docker-machine-driver-linode | github.com/docker/docker@v20.10.27+incompatible | CVE-2024-41110 | CRITICAL | affected | gobinary | |
rancher/rancher:head | false | Rancher head | opt/drivers/management-state/bin/docker-machine-driver-linode | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:head | false | Rancher head | opt/drivers/management-state/bin/docker-machine-driver-linode | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:head | false | Rancher head | opt/drivers/management-state/bin/docker-machine-driver-linode | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:head | false | Rancher head | opt/drivers/management-state/bin/docker-machine-driver-linode | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:head | false | Rancher head | opt/drivers/management-state/bin/docker-machine-driver-linode | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:head | false | Rancher head | usr/share/rancher/ui/assets/wins.exe | golang.org/x/crypto@v0.30.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:head | false | Rancher head | usr/share/rancher/ui/assets/wins.exe | golang.org/x/net@v0.32.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.111 | false | Rancher head | libxml2 | libxml2@2.12.7-r0 | CVE-2024-56171 | HIGH | affected | alpine | |
rancher/rke-tools:v0.1.111 | false | Rancher head | libxml2 | libxml2@2.12.7-r0 | CVE-2025-24928 | HIGH | affected | alpine | |
rancher/rke-tools:v0.1.111 | false | Rancher head | libxml2 | libxml2@2.12.7-r0 | CVE-2025-27113 | HIGH | affected | alpine | |
rancher/rke-tools:v0.1.111 | false | Rancher head | opt/rke-tools/bin/docker | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.111 | false | Rancher head | usr/local/bin/kubectl | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/ui-plugin-catalog:3.4.2 | false | Rancher head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/ui-plugin-catalog:3.4.2 | false | Rancher head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/ui-plugin-catalog:3.4.2 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/ui-plugin-catalog:3.4.2 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/backup-restore-operator:v7.0.0-alpha.8 | false | Rancher head | usr/bin/backup-restore-operator | golang.org/x/crypto@v0.27.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/calico | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/calico | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/calico-ipam | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher head | opt/cni/bin/install | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/calico | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/calico | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/calico-ipam | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher head | opt/cni/bin/install | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-addon-resizer:1.8.22-build20250110 | false | Rancher head | pod_nanny | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | calicoctl | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | calicoctl | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/calico | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/calico | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/calico-ipam | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/dhcp | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/install | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | usr/bin/calico-node | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | usr/bin/calico-node | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | usr/bin/kube-controllers | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | usr/bin/kube-controllers | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | opt/cni/bin/dhcp | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-cluster-autoscaler:v1.9.0-build20241126 | false | Rancher head | cluster-proportional-autoscaler | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-cni-plugins:v1.6.0-build20241022 | false | Rancher head | opt/cni/bin/dhcp | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-cni-plugins:v1.6.2-build20250124 | false | Rancher head | opt/cni/bin/dhcp | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-coredns:v1.12.0-build20241126 | false | Rancher head | coredns | golang.org/x/crypto@v0.29.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-coredns:v1.12.0-build20241126 | false | Rancher head | coredns | golang.org/x/net@v0.31.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-dns-node-cache:1.24.0-build20241211 | false | Rancher head | node-cache | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-dns-node-cache:1.24.0-build20241211 | false | Rancher head | node-cache | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-etcd:v3.5.16-k3s1-build20241106 | false | Rancher head | usr/local/bin/etcd | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.16-k3s1-build20241106 | false | Rancher head | usr/local/bin/etcd | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.16-k3s1-build20241106 | false | Rancher head | usr/local/bin/etcdctl | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.16-k3s1-build20241106 | false | Rancher head | usr/local/bin/etcdctl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-k8s-metrics-server:v0.7.2-build20250110 | false | Rancher head | metrics-server | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-k8s-metrics-server:v0.7.2-build20250110 | false | Rancher head | metrics-server | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.30.10-rke2r1-build20250213 | false | Rancher head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-kubernetes:v1.30.10-rke2r1-build20250213 | false | Rancher head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-kubernetes:v1.30.10-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kube-apiserver | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.10-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kube-apiserver | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.10-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kube-apiserver | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.10-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kube-controller-manager | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.10-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kube-controller-manager | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.10-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kube-controller-manager | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.10-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kube-proxy | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.10-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kube-proxy | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.10-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kube-proxy | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.10-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kube-scheduler | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.10-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kube-scheduler | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.10-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kube-scheduler | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.10-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kubeadm | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.10-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kubeadm | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.10-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.10-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.30.10-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.10-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kubelet | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.10-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kubelet | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.6-rke2r1-build20250213 | false | Rancher head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-kubernetes:v1.31.6-rke2r1-build20250213 | false | Rancher head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-kubernetes:v1.31.6-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kube-apiserver | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.6-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kube-apiserver | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.6-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kube-controller-manager | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.6-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kube-controller-manager | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.6-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kube-proxy | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.6-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kube-proxy | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.6-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kube-scheduler | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.6-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kube-scheduler | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.6-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kubeadm | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.6-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kubeadm | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.6-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kubectl | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.6-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.31.6-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kubelet | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.6-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kubelet | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.32.2-rke2r1-build20250213 | false | Rancher head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-kubernetes:v1.32.2-rke2r1-build20250213 | false | Rancher head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-kubernetes:v1.32.2-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kube-apiserver | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.32.2-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kube-apiserver | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.32.2-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kube-controller-manager | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.32.2-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kube-controller-manager | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.32.2-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kube-proxy | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.32.2-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kube-proxy | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.32.2-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kube-scheduler | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.32.2-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kube-scheduler | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.32.2-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kubeadm | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.32.2-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kubeadm | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.32.2-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kubectl | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.32.2-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.32.2-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kubelet | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.32.2-rke2r1-build20250213 | false | Rancher head | usr/local/bin/kubelet | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-multus-cni:v4.1.4-build20250108 | false | Rancher head | cert-approver | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-multus-cni:v4.1.4-build20250108 | false | Rancher head | kubeconfig_generator | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-multus-cni:v4.1.4-build20250108 | false | Rancher head | usr/src/multus-cni/bin/multus | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-whereabouts:v0.8.0-build20250131 | false | Rancher head | ip-control-loop | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-whereabouts:v0.8.0-build20250131 | false | Rancher head | whereabouts | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher head | usr/bin/harvester-cloud-provider | github.com/rancher/apiserver@v0.0.0-20230120214941-e88c32739dc7 | CVE-2023-32192 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher head | usr/bin/harvester-cloud-provider | github.com/rancher/norman@v0.0.0-20221205184727-32ef2e185b99 | CVE-2023-32193 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher head | usr/bin/harvester-cloud-provider | golang.org/x/crypto@v0.16.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher head | usr/bin/harvester-cloud-provider | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | usr/bin/harvester-csi-driver | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.30.10-rancher1 | false | Rancher head | usr/local/bin/kube-apiserver | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.10-rancher1 | false | Rancher head | usr/local/bin/kube-apiserver | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.10-rancher1 | false | Rancher head | usr/local/bin/kube-apiserver | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.10-rancher1 | false | Rancher head | usr/local/bin/kube-controller-manager | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.10-rancher1 | false | Rancher head | usr/local/bin/kube-controller-manager | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.10-rancher1 | false | Rancher head | usr/local/bin/kube-controller-manager | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.10-rancher1 | false | Rancher head | usr/local/bin/kube-proxy | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.10-rancher1 | false | Rancher head | usr/local/bin/kube-proxy | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.10-rancher1 | false | Rancher head | usr/local/bin/kube-proxy | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.10-rancher1 | false | Rancher head | usr/local/bin/kube-scheduler | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.10-rancher1 | false | Rancher head | usr/local/bin/kube-scheduler | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.10-rancher1 | false | Rancher head | usr/local/bin/kube-scheduler | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.10-rancher1 | false | Rancher head | usr/local/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.10-rancher1 | false | Rancher head | usr/local/bin/kubelet | github.com/docker/docker@v20.10.27+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.30.10-rancher1 | false | Rancher head | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.30.10-rancher1 | false | Rancher head | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.10-rancher1 | false | Rancher head | usr/local/bin/kubelet | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.10-rancher1 | false | Rancher head | usr/local/bin/kubelet | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.31.6-rancher1 | false | Rancher head | usr/local/bin/kube-apiserver | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.31.6-rancher1 | false | Rancher head | usr/local/bin/kube-apiserver | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.31.6-rancher1 | false | Rancher head | usr/local/bin/kube-controller-manager | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.31.6-rancher1 | false | Rancher head | usr/local/bin/kube-controller-manager | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.31.6-rancher1 | false | Rancher head | usr/local/bin/kube-proxy | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.31.6-rancher1 | false | Rancher head | usr/local/bin/kube-proxy | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.31.6-rancher1 | false | Rancher head | usr/local/bin/kube-scheduler | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.31.6-rancher1 | false | Rancher head | usr/local/bin/kube-scheduler | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.31.6-rancher1 | false | Rancher head | usr/local/bin/kubectl | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.31.6-rancher1 | false | Rancher head | usr/local/bin/kubelet | github.com/docker/docker@v20.10.27+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.31.6-rancher1 | false | Rancher head | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.31.6-rancher1 | false | Rancher head | usr/local/bin/kubelet | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.31.6-rancher1 | false | Rancher head | usr/local/bin/kubelet | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.32.2-rancher1 | false | Rancher head | usr/local/bin/kube-apiserver | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.32.2-rancher1 | false | Rancher head | usr/local/bin/kube-apiserver | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.32.2-rancher1 | false | Rancher head | usr/local/bin/kube-controller-manager | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.32.2-rancher1 | false | Rancher head | usr/local/bin/kube-controller-manager | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.32.2-rancher1 | false | Rancher head | usr/local/bin/kube-proxy | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.32.2-rancher1 | false | Rancher head | usr/local/bin/kube-proxy | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.32.2-rancher1 | false | Rancher head | usr/local/bin/kube-scheduler | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.32.2-rancher1 | false | Rancher head | usr/local/bin/kube-scheduler | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.32.2-rancher1 | false | Rancher head | usr/local/bin/kubectl | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.32.2-rancher1 | false | Rancher head | usr/local/bin/kubelet | github.com/docker/docker@v26.1.4+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.32.2-rancher1 | false | Rancher head | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.32.2-rancher1 | false | Rancher head | usr/local/bin/kubelet | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.32.2-rancher1 | false | Rancher head | usr/local/bin/kubelet | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher head | usr/bin/istioctl | github.com/docker/docker@v25.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher head | usr/bin/istioctl | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher head | usr/bin/istioctl | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher head | usr/local/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/istio-installer:1.23.2-rancher1 | false | Rancher head | usr/bin/istioctl | github.com/docker/docker@v26.1.4+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/istio-installer:1.23.2-rancher1 | false | Rancher head | usr/bin/istioctl | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/istio-installer:1.23.2-rancher1 | false | Rancher head | usr/bin/istioctl | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/istio-installer:1.23.2-rancher1 | false | Rancher head | usr/local/bin/kubectl | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/istio-installer:1.24.1-rancher1 | false | Rancher head | usr/bin/istioctl | golang.org/x/crypto@v0.27.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/istio-installer:1.24.1-rancher1 | false | Rancher head | usr/bin/istioctl | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/istio-installer:1.24.1-rancher1 | false | Rancher head | usr/local/bin/kubectl | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/k3s-upgrade:v1.30.10-k3s1 | false | Rancher head | opt/k3s | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/k3s-upgrade:v1.31.6-k3s1 | false | Rancher head | opt/k3s | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/k3s-upgrade:v1.32.2-k3s1 | false | Rancher head | opt/k3s | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher head | libcrypto3 | libcrypto3@3.3.2-r0 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher head | libssl3 | libssl3@3.3.2-r0 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | golang.org/x/crypto@v0.25.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher head | usr/bin/helm | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher head | usr/bin/helm | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.4-build20250113 | false | Rancher head | libcrypto3 | libcrypto3@3.3.2-r4 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/klipper-helm:v0.9.4-build20250113 | false | Rancher head | libssl3 | libssl3@3.3.2-r4 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/klipper-helm:v0.9.4-build20250113 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.4-build20250113 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.4-build20250113 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | golang.org/x/crypto@v0.25.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.4-build20250113 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.4-build20250113 | false | Rancher head | usr/bin/helm | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-lb:v0.4.10 | false | Rancher head | libcrypto3 | libcrypto3@3.3.2-r4 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/klipper-lb:v0.4.10 | false | Rancher head | libssl3 | libssl3@3.3.2-r4 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/klipper-lb:v0.4.9 | false | Rancher head | libcrypto3 | libcrypto3@3.3.1-r3 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/klipper-lb:v0.4.9 | false | Rancher head | libssl3 | libssl3@3.3.1-r3 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/kube-api-auth:v0.2.4 | false | Rancher head | usr/bin/kube-api-auth | github.com/docker/docker@v20.10.27+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/kube-api-auth:v0.2.4 | false | Rancher head | usr/bin/kube-api-auth | github.com/rancher/rancher@v0.0.0-20241004204441-d3c434633444 | CVE-2019-12274 | none | not affected | inline mitigations already exist | gobinary |
rancher/kube-api-auth:v0.2.4 | false | Rancher head | usr/bin/kube-api-auth | github.com/rancher/rancher@v0.0.0-20241004204441-d3c434633444 | CVE-2021-36775 | none | not affected | inline mitigations already exist | gobinary |
rancher/kube-api-auth:v0.2.4 | false | Rancher head | usr/bin/kube-api-auth | github.com/rancher/steve@v0.0.0-20240913181958-99e479ba0f08 | CVE-2024-52280 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/kube-api-auth:v0.2.4 | false | Rancher head | usr/bin/kube-api-auth | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/kube-api-auth:v0.2.4 | false | Rancher head | usr/bin/kube-api-auth | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/kubectl:v1.31.6 | false | Rancher head | bin/kubectl | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/kubectl:v1.32.2 | false | Rancher head | bin/kubectl | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/kuberlr-kubectl:v4.0.1 | false | Rancher head | bin/kuberlr | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/kuberlr-kubectl:v4.0.1 | false | Rancher head | usr/bin/kubectl1.30.8 | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/kuberlr-kubectl:v4.0.1 | false | Rancher head | usr/bin/kubectl1.31.4 | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/kuberlr-kubectl:v4.0.1 | false | Rancher head | usr/bin/kubectl1.32.0 | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/kuberlr-kubectl:v4.0.2 | false | Rancher head | usr/bin/kubectl1.30.8 | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/kuberlr-kubectl:v4.0.2 | false | Rancher head | usr/bin/kubectl1.31.4 | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/kuberlr-kubectl:v4.0.2 | false | Rancher head | usr/bin/kubectl1.32.0 | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/local-path-provisioner:v0.0.30 | false | Rancher head | libcrypto3 | libcrypto3@3.3.2-r0 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/local-path-provisioner:v0.0.30 | false | Rancher head | libssl3 | libssl3@3.3.2-r0 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/local-path-provisioner:v0.0.30 | false | Rancher head | usr/bin/local-path-provisioner | golang.org/x/crypto@v0.25.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/local-path-provisioner:v0.0.30 | false | Rancher head | usr/bin/local-path-provisioner | golang.org/x/net@v0.27.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/local-path-provisioner:v0.0.31 | false | Rancher head | libcrypto3 | libcrypto3@3.3.2-r4 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/local-path-provisioner:v0.0.31 | false | Rancher head | libssl3 | libssl3@3.3.2-r4 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/machine:v0.15.0-rancher125 | false | Rancher head | usr/local/bin/rancher-machine | github.com/moby/moby@v1.4.2-0.20170731201646-1009e6a40b29 | CVE-2024-36621 | none | not affected | vulnerable code not present | gobinary |
rancher/machine:v0.15.0-rancher125 | false | Rancher head | usr/local/bin/rancher-machine | github.com/moby/moby@v1.4.2-0.20170731201646-1009e6a40b29 | CVE-2024-36623 | none | not affected | vulnerable code not present | gobinary |
rancher/machine:v0.15.0-rancher125 | false | Rancher head | usr/local/bin/rancher-machine | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/machine:v0.15.0-rancher125 | false | Rancher head | usr/local/bin/rancher-machine | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-brancz-kube-rbac-proxy:v0.18.2 | true | Rancher head | usr/local/bin/kube-rbac-proxy | golang.org/x/crypto@v0.29.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-brancz-kube-rbac-proxy:v0.18.2 | true | Rancher head | usr/local/bin/kube-rbac-proxy | golang.org/x/net@v0.31.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-apiserver:v3.29.1 | true | Rancher head | code/apiserver | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-apiserver:v3.29.1 | true | Rancher head | code/apiserver | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.1 | true | Rancher head | opt/cni/bin/calico | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.1 | true | Rancher head | opt/cni/bin/calico | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.1 | true | Rancher head | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.1 | true | Rancher head | opt/cni/bin/calico-ipam | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.1 | true | Rancher head | opt/cni/bin/install | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.28.1 | true | Rancher head | usr/bin/kube-controllers | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.28.1 | true | Rancher head | usr/bin/kube-controllers | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.29.0 | true | Rancher head | usr/bin/kube-controllers | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.29.0 | true | Rancher head | usr/bin/kube-controllers | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.29.1 | true | Rancher head | usr/bin/kube-controllers | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.29.1 | true | Rancher head | usr/bin/kube-controllers | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-typha:v3.29.1 | true | Rancher head | usr/bin/calico-typha | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-typha:v3.29.1 | true | Rancher head | usr/bin/calico-typha | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-cilium:v1.16.5 | true | Rancher head | opt/cni/bin/cilium-cni | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.5 | true | Rancher head | usr/bin/cilium-agent | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.5 | true | Rancher head | usr/bin/cilium-bugtool | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.5 | true | Rancher head | usr/bin/cilium-dbg | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.5 | true | Rancher head | usr/bin/hubble | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.5 | true | Rancher head | usr/bin/clustermesh-apiserver | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.5 | true | Rancher head | usr/bin/etcd | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.5 | true | Rancher head | usr/bin/etcd | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.17.0 | true | Rancher head | usr/bin/etcd | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.17.0 | true | Rancher head | usr/bin/etcd | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.16.5 | true | Rancher head | bin/grpc_health_probe | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.16.5 | true | Rancher head | bin/grpc_health_probe | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.16.5 | true | Rancher head | usr/bin/hubble-relay | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-aws:v1.16.5 | true | Rancher head | usr/bin/cilium-operator-aws | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-azure:v1.16.5 | true | Rancher head | usr/bin/cilium-operator-azure | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-generic:v1.16.5 | true | Rancher head | usr/bin/cilium-operator-generic | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-coredns-coredns:1.11.1 | true | Rancher head | coredns | golang.org/x/crypto@v0.12.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coredns-coredns:1.11.1 | true | Rancher head | coredns | golang.org/x/net@v0.14.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-coredns-coredns:1.11.1 | true | Rancher head | coredns | golang.org/x/net@v0.14.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coredns-coredns:1.11.3 | true | Rancher head | coredns | golang.org/x/crypto@v0.23.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coredns-coredns:1.11.3 | true | Rancher head | coredns | golang.org/x/net@v0.25.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coredns-coredns:1.12.0 | true | Rancher head | coredns | golang.org/x/crypto@v0.29.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coredns-coredns:1.12.0 | true | Rancher head | coredns | golang.org/x/net@v0.31.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher head | usr/local/bin/etcd | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher head | usr/local/bin/etcd | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher head | usr/local/bin/etcdctl | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher head | usr/local/bin/etcdctl | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher head | usr/local/bin/etcdutl | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher head | usr/local/bin/etcdutl | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.15 | true | Rancher head | usr/local/bin/etcd | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.15 | true | Rancher head | usr/local/bin/etcd | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.15 | true | Rancher head | usr/local/bin/etcdctl | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.15 | true | Rancher head | usr/local/bin/etcdctl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.15 | true | Rancher head | usr/local/bin/etcdutl | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.15 | true | Rancher head | usr/local/bin/etcdutl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.16 | true | Rancher head | usr/local/bin/etcd | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.16 | true | Rancher head | usr/local/bin/etcd | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.16 | true | Rancher head | usr/local/bin/etcdctl | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.16 | true | Rancher head | usr/local/bin/etcdctl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.16 | true | Rancher head | usr/local/bin/etcdutl | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.16 | true | Rancher head | usr/local/bin/etcdutl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-grafana-grafana:10.4.9 | true | Rancher head | usr/share/grafana/bin/grafana | github.com/grafana/grafana-plugin-sdk-go@v0.218.0 | CVE-2024-8986 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-grafana-grafana:10.4.9 | true | Rancher head | usr/share/grafana/bin/grafana | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-grafana-grafana:10.4.9 | true | Rancher head | usr/share/grafana/bin/grafana | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-istio-install-cni:1.22.1-distroless | true | Rancher head | opt/cni/bin/istio-cni | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-install-cni:1.22.1-distroless | true | Rancher head | opt/cni/bin/istio-cni | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-istio-install-cni:1.22.1-distroless | true | Rancher head | usr/local/bin/install-cni | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-install-cni:1.22.1-distroless | true | Rancher head | usr/local/bin/install-cni | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-istio-install-cni:1.23.2-distroless | true | Rancher head | opt/cni/bin/istio-cni | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-install-cni:1.23.2-distroless | true | Rancher head | opt/cni/bin/istio-cni | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-istio-install-cni:1.23.2-distroless | true | Rancher head | usr/local/bin/install-cni | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-install-cni:1.23.2-distroless | true | Rancher head | usr/local/bin/install-cni | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-istio-install-cni:1.24.1-distroless | true | Rancher head | opt/cni/bin/istio-cni | golang.org/x/crypto@v0.27.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-install-cni:1.24.1-distroless | true | Rancher head | opt/cni/bin/istio-cni | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-istio-install-cni:1.24.1-distroless | true | Rancher head | usr/local/bin/install-cni | golang.org/x/crypto@v0.27.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-install-cni:1.24.1-distroless | true | Rancher head | usr/local/bin/install-cni | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-istio-pilot:1.22.1-distroless | true | Rancher head | usr/local/bin/pilot-discovery | github.com/docker/docker@v25.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-pilot:1.22.1-distroless | true | Rancher head | usr/local/bin/pilot-discovery | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-pilot:1.22.1-distroless | true | Rancher head | usr/local/bin/pilot-discovery | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-istio-pilot:1.23.2-distroless | true | Rancher head | usr/local/bin/pilot-discovery | github.com/docker/docker@v26.1.4+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-pilot:1.23.2-distroless | true | Rancher head | usr/local/bin/pilot-discovery | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-pilot:1.23.2-distroless | true | Rancher head | usr/local/bin/pilot-discovery | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-istio-pilot:1.24.1-distroless | true | Rancher head | usr/local/bin/pilot-discovery | golang.org/x/crypto@v0.27.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-pilot:1.24.1-distroless | true | Rancher head | usr/local/bin/pilot-discovery | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-istio-proxyv2:1.22.1-distroless | true | Rancher head | usr/local/bin/pilot-agent | github.com/docker/docker@v25.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-proxyv2:1.22.1-distroless | true | Rancher head | usr/local/bin/pilot-agent | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-proxyv2:1.22.1-distroless | true | Rancher head | usr/local/bin/pilot-agent | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-istio-proxyv2:1.23.2-distroless | true | Rancher head | usr/local/bin/pilot-agent | github.com/docker/docker@v26.1.4+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-proxyv2:1.23.2-distroless | true | Rancher head | usr/local/bin/pilot-agent | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-proxyv2:1.23.2-distroless | true | Rancher head | usr/local/bin/pilot-agent | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-istio-proxyv2:1.24.1-distroless | true | Rancher head | usr/local/bin/pilot-agent | golang.org/x/crypto@v0.27.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-proxyv2:1.24.1-distroless | true | Rancher head | usr/local/bin/pilot-agent | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-jaegertracing-all-in-one:1.57.0 | true | Rancher head | go/bin/all-in-one-linux | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-jaegertracing-all-in-one:1.57.0 | true | Rancher head | go/bin/all-in-one-linux | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-jaegertracing-all-in-one:1.60.0 | true | Rancher head | go/bin/all-in-one-linux | golang.org/x/crypto@v0.25.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-jaegertracing-all-in-one:1.60.0 | true | Rancher head | go/bin/all-in-one-linux | golang.org/x/net@v0.27.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-jaegertracing-all-in-one:1.63.0 | true | Rancher head | go/bin/all-in-one-linux | golang.org/x/crypto@v0.29.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-jaegertracing-all-in-one:1.63.0 | true | Rancher head | go/bin/all-in-one-linux | golang.org/x/net@v0.31.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-dnsmasq-nanny:1.23.0 | true | Rancher head | dnsmasq-nanny | github.com/coredns/coredns@v1.10.0 | CVE-2023-28452 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-dnsmasq-nanny:1.23.0 | true | Rancher head | dnsmasq-nanny | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-kube-dns:1.23.0 | true | Rancher head | kube-dns | github.com/coredns/coredns@v1.10.0 | CVE-2023-28452 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-kube-dns:1.23.0 | true | Rancher head | kube-dns | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | node-cache | github.com/coredns/coredns@v1.10.0 | CVE-2023-28452 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | node-cache | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher head | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-sidecar:1.23.0 | true | Rancher head | sidecar | github.com/coredns/coredns@v1.10.0 | CVE-2023-28452 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-sidecar:1.23.0 | true | Rancher head | sidecar | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kiali-kiali:v1.86.0 | true | Rancher head | opt/kiali/kiali | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kiali-kiali:v1.86.0 | true | Rancher head | opt/kiali/kiali | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-kiali-kiali:v1.89.3 | true | Rancher head | opt/kiali/kiali | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kiali-kiali:v1.89.3 | true | Rancher head | opt/kiali/kiali | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-kiali-kiali:v2.1.0 | true | Rancher head | opt/kiali/kiali | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kiali-kiali:v2.1.0 | true | Rancher head | opt/kiali/kiali | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-kube-logging-logging-operator:4.10.0 | true | Rancher head | manager | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.8.7 | true | Rancher head | kube-vip | golang.org/x/crypto@v0.23.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.8.7 | true | Rancher head | kube-vip | golang.org/x/net@v0.25.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-library-traefik:2.11.10 | true | Rancher head | usr/local/bin/traefik | golang.org/x/crypto@v0.27.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-library-traefik:2.11.10 | true | Rancher head | usr/local/bin/traefik | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-longhornio-csi-attacher:v4.8.0 | true | Rancher head | csi-attacher | golang.org/x/net@v0.32.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.13.0 | true | Rancher head | csi-node-driver-registrar | golang.org/x/net@v0.32.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-longhornio-csi-provisioner:v4.0.1-20250204 | true | Rancher head | csi-provisioner | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-longhornio-csi-snapshotter:v7.0.2-20250204 | true | Rancher head | csi-snapshotter | golang.org/x/net@v0.20.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-longhornio-livenessprobe:v2.15.0 | true | Rancher head | livenessprobe | golang.org/x/net@v0.32.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | golang.org/x/net@v0.0.0-20210726213435-c6fcb2dbf985 | CVE-2022-27664 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | golang.org/x/net@v0.0.0-20210726213435-c6fcb2dbf985 | CVE-2022-41723 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | golang.org/x/net@v0.0.0-20210726213435-c6fcb2dbf985 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | golang.org/x/net@v0.0.0-20210726213435-c6fcb2dbf985 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher head | usr/local/bin/sachet | gopkg.in/yaml.v3@v3.0.0-20210107192922-496545a6307b | CVE-2022-28948 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-metrics-server:v0.7.1 | true | Rancher head | metrics-server | golang.org/x/crypto@v0.18.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-metrics-server:v0.7.1 | true | Rancher head | metrics-server | golang.org/x/net@v0.20.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-metrics-server:v0.7.2 | true | Rancher head | metrics-server | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-metrics-server:v0.7.2 | true | Rancher head | metrics-server | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.12.0 | true | Rancher head | adapter | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.12.0 | true | Rancher head | adapter | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-alertmanager:v0.27.0 | true | Rancher head | bin/alertmanager | golang.org/x/crypto@v0.18.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-alertmanager:v0.27.0 | true | Rancher head | bin/alertmanager | golang.org/x/net@v0.20.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-alertmanager:v0.27.0 | true | Rancher head | bin/amtool | golang.org/x/crypto@v0.18.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-alertmanager:v0.27.0 | true | Rancher head | bin/amtool | golang.org/x/net@v0.20.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-attacher:v4.5.0 | true | Rancher head | csi-attacher | golang.org/x/net@v0.18.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-attacher:v4.7.0 | true | Rancher head | csi-attacher | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.10.0 | true | Rancher head | csi-node-driver-registrar | golang.org/x/net@v0.18.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.12.0 | true | Rancher head | csi-node-driver-registrar | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.0 | true | Rancher head | csi-provisioner | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.1 | true | Rancher head | csi-provisioner | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-resizer:v1.10.0 | true | Rancher head | csi-resizer | golang.org/x/net@v0.18.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-resizer:v1.10.1 | true | Rancher head | csi-resizer | golang.org/x/net@v0.18.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.1 | true | Rancher head | csi-snapshotter | golang.org/x/net@v0.20.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.2 | true | Rancher head | csi-snapshotter | golang.org/x/net@v0.20.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-livenessprobe:v2.12.0 | true | Rancher head | livenessprobe | golang.org/x/net@v0.18.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-livenessprobe:v2.14.0 | true | Rancher head | livenessprobe | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-snapshot-controller:v8.2.0 | true | Rancher head | snapshot-controller | golang.org/x/net@v0.31.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-thanos-thanos:v0.37.2 | true | Rancher head | bin/thanos | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-thanos-thanos:v0.37.2 | true | Rancher head | bin/thanos | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/nginx-ingress-controller:nginx-1.11.3-rancher1 | false | Rancher head | nginx-ingress-controller | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/prom-prometheus:v2.55.1 | false | Rancher head | bin/prometheus | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/prom-prometheus:v2.55.1 | false | Rancher head | bin/prometheus | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/prom-prometheus:v2.55.1 | false | Rancher head | bin/promtool | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/prom-prometheus:v2.55.1 | false | Rancher head | bin/promtool | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher-agent:head | false | Rancher head | usr/bin/agent | github.com/docker/docker@v20.10.27+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher-agent:head | false | Rancher head | usr/bin/kubectl | github.com/docker/distribution@v2.8.1+incompatible | CVE-2023-2253 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher-agent:head | false | Rancher head | usr/bin/kubectl | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:head | false | Rancher head | opt/drivers/management-state/bin/docker-machine-driver-harvester | github.com/moby/moby@v1.4.2-0.20170731201646-1009e6a40b29 | CVE-2024-36621 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:head | false | Rancher head | opt/drivers/management-state/bin/docker-machine-driver-harvester | github.com/moby/moby@v1.4.2-0.20170731201646-1009e6a40b29 | CVE-2024-36623 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:head | false | Rancher head | opt/drivers/management-state/bin/docker-machine-driver-harvester | golang.org/x/crypto@v0.27.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:head | false | Rancher head | opt/drivers/management-state/bin/docker-machine-driver-harvester | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:head | false | Rancher head | usr/bin/containerd | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:head | false | Rancher head | usr/bin/containerd | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:head | false | Rancher head | usr/bin/containerd-shim-runc-v2 | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:head | false | Rancher head | usr/bin/etcdctl | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:head | false | Rancher head | usr/bin/etcdctl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:head | false | Rancher head | usr/bin/k3s | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:head | false | Rancher head | usr/bin/k3s | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:head | false | Rancher head | usr/bin/rancher | github.com/docker/docker@v20.10.27+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:head | false | Rancher head | usr/bin/rancher-machine | github.com/moby/moby@v1.4.2-0.20170731201646-1009e6a40b29 | CVE-2024-36621 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:head | false | Rancher head | usr/bin/rancher-machine | github.com/moby/moby@v1.4.2-0.20170731201646-1009e6a40b29 | CVE-2024-36623 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:head | false | Rancher head | usr/bin/rancher-machine | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:head | false | Rancher head | usr/bin/rancher-machine | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:head | false | Rancher head | usr/bin/runc | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/remotedialer-proxy:v0.4.4-rc.2 | false | Rancher head | proxy | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/remotedialer-proxy:v0.4.4-rc.2 | false | Rancher head | proxy | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.111 | false | Rancher head | opt/rke-tools/bin/cri-dockerd | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.111 | false | Rancher head | opt/rke-tools/bin/cri-dockerd | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke-tools:v0.1.111 | false | Rancher head | opt/rke-tools/rke-etcd-backup | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.111 | false | Rancher head | opt/rke-tools/rke-etcd-backup | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.111 | false | Rancher head | usr/bin/confd | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.111 | false | Rancher head | usr/bin/confd | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.111 | false | Rancher head | usr/bin/confd | google.golang.org/grpc@v1.26.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke-tools:v0.1.111 | false | Rancher head | usr/local/bin/etcdctl | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.111 | false | Rancher head | usr/local/bin/etcdctl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.111 | false | Rancher head | usr/local/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-cloud-provider:v1.30.6-0.20241016053533-5ec454f50e7a-build20241016 | false | Rancher head | usr/local/bin/rke2-cloud-provider | golang.org/x/crypto@v0.27.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-cloud-provider:v1.30.6-0.20241016053533-5ec454f50e7a-build20241016 | false | Rancher head | usr/local/bin/rke2-cloud-provider | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-cloud-provider:v1.31.2-0.20241016053446-0955fa330f90-build20241016 | false | Rancher head | usr/local/bin/rke2-cloud-provider | golang.org/x/crypto@v0.27.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-cloud-provider:v1.31.2-0.20241016053446-0955fa330f90-build20241016 | false | Rancher head | usr/local/bin/rke2-cloud-provider | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-cloud-provider:v1.32.0-rc3.0.20241220224140-68fbd1a6b543-build20250101 | false | Rancher head | usr/local/bin/rke2-cloud-provider | golang.org/x/crypto@v0.29.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-cloud-provider:v1.32.0-rc3.0.20241220224140-68fbd1a6b543-build20250101 | false | Rancher head | usr/local/bin/rke2-cloud-provider | golang.org/x/net@v0.31.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.30.10-rke2r1 | false | Rancher head | bin/containerd | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.45.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.30.10-rke2r1 | false | Rancher head | bin/containerd | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.30.10-rke2r1 | false | Rancher head | bin/containerd | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.30.10-rke2r1 | false | Rancher head | bin/containerd-shim-runc-v2 | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.30.10-rke2r1 | false | Rancher head | bin/crictl | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.30.10-rke2r1 | false | Rancher head | bin/crictl | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.30.10-rke2r1 | false | Rancher head | bin/ctr | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.30.10-rke2r1 | false | Rancher head | bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.30.10-rke2r1 | false | Rancher head | bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.30.10-rke2r1 | false | Rancher head | bin/kubelet | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.30.10-rke2r1 | false | Rancher head | bin/kubelet | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.30.10-rke2r1 | false | Rancher head | bin/kubelet | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.30.10-rke2r1 | false | Rancher head | bin/runc | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.31.6-rke2r1 | false | Rancher head | bin/containerd | golang.org/x/crypto@v0.30.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.31.6-rke2r1 | false | Rancher head | bin/containerd | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.31.6-rke2r1 | false | Rancher head | bin/containerd-shim-runc-v2 | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.31.6-rke2r1 | false | Rancher head | bin/crictl | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.31.6-rke2r1 | false | Rancher head | bin/ctr | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.31.6-rke2r1 | false | Rancher head | bin/kubectl | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.31.6-rke2r1 | false | Rancher head | bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.31.6-rke2r1 | false | Rancher head | bin/kubelet | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.31.6-rke2r1 | false | Rancher head | bin/kubelet | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.31.6-rke2r1 | false | Rancher head | bin/runc | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.32.2-rke2r1 | false | Rancher head | bin/containerd | golang.org/x/crypto@v0.30.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.32.2-rke2r1 | false | Rancher head | bin/containerd | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.32.2-rke2r1 | false | Rancher head | bin/containerd-shim-runc-v2 | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.32.2-rke2r1 | false | Rancher head | bin/crictl | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.32.2-rke2r1 | false | Rancher head | bin/ctr | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.32.2-rke2r1 | false | Rancher head | bin/kubectl | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.32.2-rke2r1 | false | Rancher head | bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.32.2-rke2r1 | false | Rancher head | bin/kubelet | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.32.2-rke2r1 | false | Rancher head | bin/kubelet | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.32.2-rke2r1 | false | Rancher head | bin/runc | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-upgrade:v1.30.10-rke2r1 | false | Rancher head | opt/rke2 | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.45.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-upgrade:v1.30.10-rke2r1 | false | Rancher head | opt/rke2 | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-upgrade:v1.30.10-rke2r1 | false | Rancher head | opt/rke2 | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-upgrade:v1.30.10-rke2r1 | false | Rancher head | usr/local/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-upgrade:v1.31.6-rke2r1 | false | Rancher head | opt/rke2 | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-upgrade:v1.31.6-rke2r1 | false | Rancher head | opt/rke2 | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-upgrade:v1.31.6-rke2r1 | false | Rancher head | usr/local/bin/kubectl | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-upgrade:v1.32.2-rke2r1 | false | Rancher head | opt/rke2 | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-upgrade:v1.32.2-rke2r1 | false | Rancher head | opt/rke2 | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-upgrade:v1.32.2-rke2r1 | false | Rancher head | usr/local/bin/kubectl | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/security-scan:v0.6.0-rc.3 | false | Rancher head | usr/local/bin/kubectl | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/shell:v0.4.0 | false | Rancher head | usr/local/bin/kubectl | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/system-agent:v0.3.12-rc.1-suc | false | Rancher head | opt/rancher-system-agent-suc/rancher-system-agent | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/system-agent:v0.3.12-rc.1-suc | false | Rancher head | opt/rancher-system-agent-suc/rancher-system-agent | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/system-agent:v0.3.12-rc.1-suc | false | Rancher head | usr/bin/kubectl | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/system-upgrade-controller:v0.15.2 | false | Rancher head | bin/system-upgrade-controller | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |