Search:
Image | Mirrored | Release | Binary/Package | Dependency | Vulnerability ID (CVE) | Severity | Status | Justification (for status not affected) | Type (language or OS) |
---|---|---|---|---|---|---|---|---|---|
rancher/hardened-addon-resizer:1.8.22-build20250110 | false | Rancher head | pod_nanny | stdlib@v1.22.9 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-addon-resizer:1.8.23-build20250507 | false | Rancher head | pod_nanny | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/hardened-addon-resizer:1.8.23-build20250507 | false | Rancher head | pod_nanny | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-addon-resizer:1.8.23-build20250612 | false | Rancher head | pod_nanny | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.8.1 | SUSE-SU-2025:02167-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | liblzma5 | liblzma5@5.4.1-150600.1.2 | SUSE-SU-2025:1137-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.1.4-150600.5.21.1 | SUSE-SU-2025:1550-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | libopenssl3 | libopenssl3@3.1.4-150600.5.21.1 | SUSE-SU-2025:1550-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | libsqlite3-0 | libsqlite3-0@3.44.0-150000.3.23.1 | SUSE-SU-2025:1456-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | libssh-config | libssh-config@0.9.8-150600.9.1 | SUSE-SU-2025:02229-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | libssh4 | libssh4@0.9.8-150600.9.1 | SUSE-SU-2025:02229-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:02314-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:02758-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | openssl-3 | openssl-3@3.1.4-150600.5.21.1 | SUSE-SU-2025:1550-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | calicoctl | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/bandwidth | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/bridge | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/calico | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/calico-ipam | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/dhcp | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/dummy | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/firewall | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/flannel | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/host-device | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/host-local | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/install | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/ipvlan | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/loopback | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/macvlan | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/ptp | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/sbr | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/static | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/tap | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/tuning | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/vlan | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/vrf | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | usr/bin/calico-node | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | usr/bin/check-status | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | usr/bin/kube-controllers | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | usr/local/bin/flexvol/flexvoldriver | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.8.1 | SUSE-SU-2025:02167-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | liblzma5 | liblzma5@5.4.1-150600.1.2 | SUSE-SU-2025:1137-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.1.4-150600.5.24.1 | SUSE-SU-2025:1550-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | libopenssl3 | libopenssl3@3.1.4-150600.5.24.1 | SUSE-SU-2025:1550-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | libsqlite3-0 | libsqlite3-0@3.44.0-150000.3.23.1 | SUSE-SU-2025:1456-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | libssh-config | libssh-config@0.9.8-150600.9.1 | SUSE-SU-2025:02229-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | libssh4 | libssh4@0.9.8-150600.9.1 | SUSE-SU-2025:02229-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.20.1 | SUSE-SU-2025:02314-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.20.1 | SUSE-SU-2025:02758-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.20.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | openssl-3 | openssl-3@3.1.4-150600.5.24.1 | SUSE-SU-2025:1550-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | calicoctl | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | opt/cni/bin/bandwidth | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | opt/cni/bin/bridge | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | opt/cni/bin/calico | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | opt/cni/bin/calico-ipam | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | opt/cni/bin/dhcp | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | opt/cni/bin/dummy | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | opt/cni/bin/firewall | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | opt/cni/bin/flannel | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | opt/cni/bin/host-device | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | opt/cni/bin/host-local | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | opt/cni/bin/install | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | opt/cni/bin/ipvlan | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | opt/cni/bin/loopback | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | opt/cni/bin/macvlan | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | opt/cni/bin/ptp | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | opt/cni/bin/sbr | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | opt/cni/bin/static | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | opt/cni/bin/tap | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | opt/cni/bin/tuning | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | opt/cni/bin/vlan | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | opt/cni/bin/vrf | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | usr/bin/calico-node | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | usr/bin/check-status | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | usr/bin/kube-controllers | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | usr/local/bin/flexvol/flexvoldriver | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.8.1 | SUSE-SU-2025:02167-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | liblzma5 | liblzma5@5.4.1-150600.1.2 | SUSE-SU-2025:1137-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.1.4-150600.5.24.1 | SUSE-SU-2025:1550-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | libopenssl3 | libopenssl3@3.1.4-150600.5.24.1 | SUSE-SU-2025:1550-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | libsqlite3-0 | libsqlite3-0@3.44.0-150000.3.23.1 | SUSE-SU-2025:1456-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | libssh-config | libssh-config@0.9.8-150600.9.1 | SUSE-SU-2025:02229-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | libssh4 | libssh4@0.9.8-150600.9.1 | SUSE-SU-2025:02229-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.23.1 | SUSE-SU-2025:02314-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.23.1 | SUSE-SU-2025:02758-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | openssl-3 | openssl-3@3.1.4-150600.5.24.1 | SUSE-SU-2025:1550-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | calicoctl | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | opt/cni/bin/bandwidth | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | opt/cni/bin/bridge | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | opt/cni/bin/calico | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | opt/cni/bin/calico-ipam | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | opt/cni/bin/dhcp | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | opt/cni/bin/dummy | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | opt/cni/bin/firewall | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | opt/cni/bin/flannel | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | opt/cni/bin/host-device | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | opt/cni/bin/host-local | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | opt/cni/bin/install | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | opt/cni/bin/ipvlan | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | opt/cni/bin/loopback | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | opt/cni/bin/macvlan | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | opt/cni/bin/ptp | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | opt/cni/bin/sbr | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | opt/cni/bin/static | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | opt/cni/bin/tap | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | opt/cni/bin/tuning | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | opt/cni/bin/vlan | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | opt/cni/bin/vrf | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | usr/bin/calico-node | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | usr/bin/check-status | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | usr/bin/kube-controllers | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | usr/local/bin/flexvol/flexvoldriver | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.11.1 | SUSE-SU-2025:02167-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | libssh-config | libssh-config@0.9.8-150600.9.1 | SUSE-SU-2025:02229-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | libssh4 | libssh4@0.9.8-150600.9.1 | SUSE-SU-2025:02229-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.26.1 | SUSE-SU-2025:02314-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.26.1 | SUSE-SU-2025:02758-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | calicoctl | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | calicoctl | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | opt/cni/bin/bandwidth | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | opt/cni/bin/bond | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | opt/cni/bin/bridge | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | opt/cni/bin/calico | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | opt/cni/bin/calico | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | opt/cni/bin/calico-ipam | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | opt/cni/bin/calico-ipam | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | opt/cni/bin/dhcp | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | opt/cni/bin/dummy | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | opt/cni/bin/firewall | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | opt/cni/bin/flannel | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | opt/cni/bin/host-device | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | opt/cni/bin/host-local | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | opt/cni/bin/install | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | opt/cni/bin/install | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | opt/cni/bin/ipvlan | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | opt/cni/bin/loopback | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | opt/cni/bin/macvlan | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | opt/cni/bin/ptp | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | opt/cni/bin/sbr | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | opt/cni/bin/static | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | opt/cni/bin/tap | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | opt/cni/bin/tuning | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | opt/cni/bin/vlan | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | opt/cni/bin/vrf | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | usr/bin/calico-node | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | usr/bin/calico-node | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | usr/bin/check-status | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | usr/bin/check-status | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | usr/bin/kube-controllers | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | usr/bin/kube-controllers | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | usr/local/bin/flexvol/flexvoldriver | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | usr/local/bin/flexvol/flexvoldriver | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.2-build20250711 | false | Rancher head | calicoctl | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.2-build20250711 | false | Rancher head | opt/cni/bin/bandwidth | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.2-build20250711 | false | Rancher head | opt/cni/bin/bond | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.2-build20250711 | false | Rancher head | opt/cni/bin/bridge | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.2-build20250711 | false | Rancher head | opt/cni/bin/calico | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.2-build20250711 | false | Rancher head | opt/cni/bin/calico-ipam | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.2-build20250711 | false | Rancher head | opt/cni/bin/dhcp | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.2-build20250711 | false | Rancher head | opt/cni/bin/dummy | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.2-build20250711 | false | Rancher head | opt/cni/bin/firewall | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.2-build20250711 | false | Rancher head | opt/cni/bin/flannel | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.2-build20250711 | false | Rancher head | opt/cni/bin/host-device | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.2-build20250711 | false | Rancher head | opt/cni/bin/host-local | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.2-build20250711 | false | Rancher head | opt/cni/bin/install | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.2-build20250711 | false | Rancher head | opt/cni/bin/ipvlan | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.2-build20250711 | false | Rancher head | opt/cni/bin/loopback | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.2-build20250711 | false | Rancher head | opt/cni/bin/macvlan | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.2-build20250711 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.2-build20250711 | false | Rancher head | opt/cni/bin/ptp | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.2-build20250711 | false | Rancher head | opt/cni/bin/sbr | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.2-build20250711 | false | Rancher head | opt/cni/bin/static | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.2-build20250711 | false | Rancher head | opt/cni/bin/tap | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.2-build20250711 | false | Rancher head | opt/cni/bin/tuning | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.2-build20250711 | false | Rancher head | opt/cni/bin/vlan | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.2-build20250711 | false | Rancher head | opt/cni/bin/vrf | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.2-build20250711 | false | Rancher head | usr/bin/calico-node | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.2-build20250711 | false | Rancher head | usr/bin/check-status | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.2-build20250711 | false | Rancher head | usr/bin/kube-controllers | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.30.2-build20250711 | false | Rancher head | usr/local/bin/flexvol/flexvoldriver | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cluster-autoscaler:v1.10.2-build20250611 | false | Rancher head | cluster-proportional-autoscaler | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cluster-autoscaler:v1.9.0-build20241126 | false | Rancher head | cluster-proportional-autoscaler | github.com/golang/glog@v1.2.3 | CVE-2024-45339 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cluster-autoscaler:v1.9.0-build20241126 | false | Rancher head | cluster-proportional-autoscaler | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.6.0-build20241022 | false | Rancher head | glibc | glibc@2.38-150600.14.14.2 | SUSE-SU-2025:01702-1 | HIGH | affected | sles | |
rancher/hardened-cni-plugins:v1.6.0-build20241022 | false | Rancher head | opt/cni/bin/bandwidth | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.6.0-build20241022 | false | Rancher head | opt/cni/bin/bridge | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.6.0-build20241022 | false | Rancher head | opt/cni/bin/dhcp | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.6.0-build20241022 | false | Rancher head | opt/cni/bin/dummy | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.6.0-build20241022 | false | Rancher head | opt/cni/bin/firewall | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.6.0-build20241022 | false | Rancher head | opt/cni/bin/flannel | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.6.0-build20241022 | false | Rancher head | opt/cni/bin/host-device | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.6.0-build20241022 | false | Rancher head | opt/cni/bin/host-local | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.6.0-build20241022 | false | Rancher head | opt/cni/bin/ipvlan | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.6.0-build20241022 | false | Rancher head | opt/cni/bin/loopback | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.6.0-build20241022 | false | Rancher head | opt/cni/bin/macvlan | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.6.0-build20241022 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.6.0-build20241022 | false | Rancher head | opt/cni/bin/ptp | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.6.0-build20241022 | false | Rancher head | opt/cni/bin/sbr | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.6.0-build20241022 | false | Rancher head | opt/cni/bin/static | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.6.0-build20241022 | false | Rancher head | opt/cni/bin/tap | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.6.0-build20241022 | false | Rancher head | opt/cni/bin/tuning | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.6.0-build20241022 | false | Rancher head | opt/cni/bin/vlan | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.6.0-build20241022 | false | Rancher head | opt/cni/bin/vrf | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.6.2-build20250124 | false | Rancher head | glibc | glibc@2.38-150600.14.20.3 | SUSE-SU-2025:01702-1 | HIGH | affected | sles | |
rancher/hardened-cni-plugins:v1.6.2-build20250124 | false | Rancher head | opt/cni/bin/bandwidth | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.6.2-build20250124 | false | Rancher head | opt/cni/bin/bridge | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.6.2-build20250124 | false | Rancher head | opt/cni/bin/dhcp | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.6.2-build20250124 | false | Rancher head | opt/cni/bin/dummy | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.6.2-build20250124 | false | Rancher head | opt/cni/bin/firewall | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.6.2-build20250124 | false | Rancher head | opt/cni/bin/flannel | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.6.2-build20250124 | false | Rancher head | opt/cni/bin/host-device | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.6.2-build20250124 | false | Rancher head | opt/cni/bin/host-local | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.6.2-build20250124 | false | Rancher head | opt/cni/bin/ipvlan | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.6.2-build20250124 | false | Rancher head | opt/cni/bin/loopback | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.6.2-build20250124 | false | Rancher head | opt/cni/bin/macvlan | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.6.2-build20250124 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.6.2-build20250124 | false | Rancher head | opt/cni/bin/ptp | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.6.2-build20250124 | false | Rancher head | opt/cni/bin/sbr | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.6.2-build20250124 | false | Rancher head | opt/cni/bin/static | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.6.2-build20250124 | false | Rancher head | opt/cni/bin/tap | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.6.2-build20250124 | false | Rancher head | opt/cni/bin/tuning | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.6.2-build20250124 | false | Rancher head | opt/cni/bin/vlan | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.6.2-build20250124 | false | Rancher head | opt/cni/bin/vrf | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.7.1-build20250611 | false | Rancher head | opt/cni/bin/bandwidth | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.7.1-build20250611 | false | Rancher head | opt/cni/bin/bond | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.7.1-build20250611 | false | Rancher head | opt/cni/bin/bridge | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.7.1-build20250611 | false | Rancher head | opt/cni/bin/dhcp | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.7.1-build20250611 | false | Rancher head | opt/cni/bin/dummy | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.7.1-build20250611 | false | Rancher head | opt/cni/bin/firewall | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.7.1-build20250611 | false | Rancher head | opt/cni/bin/flannel | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.7.1-build20250611 | false | Rancher head | opt/cni/bin/host-device | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.7.1-build20250611 | false | Rancher head | opt/cni/bin/host-local | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.7.1-build20250611 | false | Rancher head | opt/cni/bin/ipvlan | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.7.1-build20250611 | false | Rancher head | opt/cni/bin/loopback | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.7.1-build20250611 | false | Rancher head | opt/cni/bin/macvlan | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.7.1-build20250611 | false | Rancher head | opt/cni/bin/portmap | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.7.1-build20250611 | false | Rancher head | opt/cni/bin/ptp | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.7.1-build20250611 | false | Rancher head | opt/cni/bin/sbr | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.7.1-build20250611 | false | Rancher head | opt/cni/bin/static | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.7.1-build20250611 | false | Rancher head | opt/cni/bin/tap | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.7.1-build20250611 | false | Rancher head | opt/cni/bin/tuning | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.7.1-build20250611 | false | Rancher head | opt/cni/bin/vlan | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.7.1-build20250611 | false | Rancher head | opt/cni/bin/vrf | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-coredns:v1.12.0-build20241126 | false | Rancher head | coredns | github.com/expr-lang/expr@v1.16.9 | CVE-2025-29786 | HIGH | affected | gobinary | |
rancher/hardened-coredns:v1.12.0-build20241126 | false | Rancher head | coredns | stdlib@v1.22.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-coredns:v1.12.1-build20250401 | false | Rancher head | coredns | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-coredns:v1.12.1-build20250507 | false | Rancher head | coredns | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-coredns:v1.12.2-build20250611 | false | Rancher head | coredns | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-dns-node-cache:1.24.0-build20241211 | false | Rancher head | node-cache | github.com/coredns/coredns@v1.11.3 | CVE-2025-47950 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-dns-node-cache:1.24.0-build20241211 | false | Rancher head | node-cache | stdlib@v1.22.9 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-dns-node-cache:1.26.0-build20250515 | false | Rancher head | node-cache | github.com/coredns/coredns@v1.11.3 | CVE-2025-47950 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-dns-node-cache:1.26.0-build20250515 | false | Rancher head | node-cache | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-dns-node-cache:1.26.0-build20250611 | false | Rancher head | node-cache | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-etcd:v3.5.16-k3s1-build20241106 | false | Rancher head | usr/local/bin/etcd | stdlib@v1.22.7 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-etcd:v3.5.16-k3s1-build20241106 | false | Rancher head | usr/local/bin/etcdctl | stdlib@v1.22.7 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-etcd:v3.5.18-k3s1-build20250210 | false | Rancher head | usr/local/bin/etcd | stdlib@v1.22.7 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-etcd:v3.5.18-k3s1-build20250210 | false | Rancher head | usr/local/bin/etcdctl | stdlib@v1.22.7 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-etcd:v3.5.19-k3s1-build20250306 | false | Rancher head | usr/local/bin/etcd | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-etcd:v3.5.19-k3s1-build20250306 | false | Rancher head | usr/local/bin/etcdctl | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-etcd:v3.5.21-k3s1-build20250411 | false | Rancher head | usr/local/bin/etcd | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-etcd:v3.5.21-k3s1-build20250411 | false | Rancher head | usr/local/bin/etcdctl | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-etcd:v3.5.21-k3s1-build20250612 | false | Rancher head | usr/local/bin/etcd | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-etcd:v3.5.21-k3s1-build20250612 | false | Rancher head | usr/local/bin/etcdctl | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | glib2-tools | glib2-tools@2.78.6-150600.4.8.1 | SUSE-SU-2025:02167-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | libexpat1 | libexpat1@2.4.4-150400.3.25.1 | SUSE-SU-2025:1201-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | libgio-2_0-0 | libgio-2_0-0@2.78.6-150600.4.8.1 | SUSE-SU-2025:02167-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.8.1 | SUSE-SU-2025:02167-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | libgmodule-2_0-0 | libgmodule-2_0-0@2.78.6-150600.4.8.1 | SUSE-SU-2025:02167-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | libgobject-2_0-0 | libgobject-2_0-0@2.78.6-150600.4.8.1 | SUSE-SU-2025:02167-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | liblzma5 | liblzma5@5.4.1-150600.1.2 | SUSE-SU-2025:1137-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.1.4-150600.5.21.1 | SUSE-SU-2025:1550-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | libopenssl3 | libopenssl3@3.1.4-150600.5.21.1 | SUSE-SU-2025:1550-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | libsoup-2_4-1 | libsoup-2_4-1@2.74.3-150600.4.3.1 | SUSE-SU-2025:01802-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | libsoup-2_4-1 | libsoup-2_4-1@2.74.3-150600.4.3.1 | SUSE-SU-2025:1503-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | libsqlite3-0 | libsqlite3-0@3.44.0-150000.3.23.1 | SUSE-SU-2025:1456-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | libssh-config | libssh-config@0.9.8-150600.9.1 | SUSE-SU-2025:02229-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | libssh4 | libssh4@0.9.8-150600.9.1 | SUSE-SU-2025:02229-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:02314-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:02758-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | openssl-3 | openssl-3@3.1.4-150600.5.21.1 | SUSE-SU-2025:1550-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | opt/bin/flanneld | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-flannel:v0.26.4-build20250218 | false | Rancher head | glib2-tools | glib2-tools@2.78.6-150600.4.8.1 | SUSE-SU-2025:02167-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.4-build20250218 | false | Rancher head | libexpat1 | libexpat1@2.4.4-150400.3.25.1 | SUSE-SU-2025:1201-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.4-build20250218 | false | Rancher head | libgio-2_0-0 | libgio-2_0-0@2.78.6-150600.4.8.1 | SUSE-SU-2025:02167-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.4-build20250218 | false | Rancher head | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.8.1 | SUSE-SU-2025:02167-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.4-build20250218 | false | Rancher head | libgmodule-2_0-0 | libgmodule-2_0-0@2.78.6-150600.4.8.1 | SUSE-SU-2025:02167-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.4-build20250218 | false | Rancher head | libgobject-2_0-0 | libgobject-2_0-0@2.78.6-150600.4.8.1 | SUSE-SU-2025:02167-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.4-build20250218 | false | Rancher head | liblzma5 | liblzma5@5.4.1-150600.1.2 | SUSE-SU-2025:1137-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.4-build20250218 | false | Rancher head | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.1.4-150600.5.24.1 | SUSE-SU-2025:1550-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.4-build20250218 | false | Rancher head | libopenssl3 | libopenssl3@3.1.4-150600.5.24.1 | SUSE-SU-2025:1550-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.4-build20250218 | false | Rancher head | libsoup-2_4-1 | libsoup-2_4-1@2.74.3-150600.4.3.1 | SUSE-SU-2025:01802-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.4-build20250218 | false | Rancher head | libsoup-2_4-1 | libsoup-2_4-1@2.74.3-150600.4.3.1 | SUSE-SU-2025:1503-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.4-build20250218 | false | Rancher head | libsqlite3-0 | libsqlite3-0@3.44.0-150000.3.23.1 | SUSE-SU-2025:1456-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.4-build20250218 | false | Rancher head | libssh-config | libssh-config@0.9.8-150600.9.1 | SUSE-SU-2025:02229-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.4-build20250218 | false | Rancher head | libssh4 | libssh4@0.9.8-150600.9.1 | SUSE-SU-2025:02229-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.4-build20250218 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.20.1 | SUSE-SU-2025:02314-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.4-build20250218 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.20.1 | SUSE-SU-2025:02758-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.4-build20250218 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.20.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.4-build20250218 | false | Rancher head | openssl-3 | openssl-3@3.1.4-150600.5.24.1 | SUSE-SU-2025:1550-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.4-build20250218 | false | Rancher head | opt/bin/flanneld | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-flannel:v0.26.5-build20250306 | false | Rancher head | glib2-tools | glib2-tools@2.78.6-150600.4.8.1 | SUSE-SU-2025:02167-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.5-build20250306 | false | Rancher head | libexpat1 | libexpat1@2.4.4-150400.3.25.1 | SUSE-SU-2025:1201-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.5-build20250306 | false | Rancher head | libgio-2_0-0 | libgio-2_0-0@2.78.6-150600.4.8.1 | SUSE-SU-2025:02167-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.5-build20250306 | false | Rancher head | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.8.1 | SUSE-SU-2025:02167-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.5-build20250306 | false | Rancher head | libgmodule-2_0-0 | libgmodule-2_0-0@2.78.6-150600.4.8.1 | SUSE-SU-2025:02167-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.5-build20250306 | false | Rancher head | libgobject-2_0-0 | libgobject-2_0-0@2.78.6-150600.4.8.1 | SUSE-SU-2025:02167-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.5-build20250306 | false | Rancher head | liblzma5 | liblzma5@5.4.1-150600.1.2 | SUSE-SU-2025:1137-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.5-build20250306 | false | Rancher head | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.1.4-150600.5.24.1 | SUSE-SU-2025:1550-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.5-build20250306 | false | Rancher head | libopenssl3 | libopenssl3@3.1.4-150600.5.24.1 | SUSE-SU-2025:1550-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.5-build20250306 | false | Rancher head | libsoup-2_4-1 | libsoup-2_4-1@2.74.3-150600.4.3.1 | SUSE-SU-2025:01802-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.5-build20250306 | false | Rancher head | libsoup-2_4-1 | libsoup-2_4-1@2.74.3-150600.4.3.1 | SUSE-SU-2025:1503-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.5-build20250306 | false | Rancher head | libsqlite3-0 | libsqlite3-0@3.44.0-150000.3.23.1 | SUSE-SU-2025:1456-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.5-build20250306 | false | Rancher head | libssh-config | libssh-config@0.9.8-150600.9.1 | SUSE-SU-2025:02229-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.5-build20250306 | false | Rancher head | libssh4 | libssh4@0.9.8-150600.9.1 | SUSE-SU-2025:02229-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.5-build20250306 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.23.1 | SUSE-SU-2025:02314-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.5-build20250306 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.23.1 | SUSE-SU-2025:02758-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.5-build20250306 | false | Rancher head | openssl-3 | openssl-3@3.1.4-150600.5.24.1 | SUSE-SU-2025:1550-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.5-build20250306 | false | Rancher head | opt/bin/flanneld | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-flannel:v0.27.1-build20250710 | false | Rancher head | opt/bin/flanneld | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-k8s-metrics-server:v0.7.2-build20250110 | false | Rancher head | metrics-server | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-k8s-metrics-server:v0.7.2-build20250507 | false | Rancher head | metrics-server | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/hardened-k8s-metrics-server:v0.7.2-build20250507 | false | Rancher head | metrics-server | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-k8s-metrics-server:v0.7.2-build20250612 | false | Rancher head | metrics-server | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-k8s-metrics-server:v0.8.0-build20250704 | false | Rancher head | metrics-server | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | libssh-config | libssh-config@0.9.8-150400.3.6.1 | SUSE-SU-2025:02278-1 | HIGH | affected | sles | |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | libssh4 | libssh4@0.9.8-150400.3.6.1 | SUSE-SU-2025:02278-1 | HIGH | affected | sles | |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.26.1 | SUSE-SU-2025:02314-1 | HIGH | affected | sles | |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kube-apiserver | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kube-controller-manager | github.com/opencontainers/runc@v1.1.12 | CVE-2024-45310 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kube-controller-manager | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kube-proxy | github.com/opencontainers/runc@v1.1.12 | CVE-2024-45310 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kube-proxy | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kube-scheduler | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kubectl | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kubelet | github.com/opencontainers/runc@v1.1.12 | CVE-2024-45310 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kubelet | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-apiserver | github.com/opencontainers/runc@v1.1.13 | CVE-2024-45310 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-apiserver | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-controller-manager | github.com/opencontainers/runc@v1.1.13 | CVE-2024-45310 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-controller-manager | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-proxy | github.com/opencontainers/runc@v1.1.13 | CVE-2024-45310 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-proxy | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-scheduler | github.com/opencontainers/runc@v1.1.13 | CVE-2024-45310 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-scheduler | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kubectl | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kubelet | github.com/opencontainers/runc@v1.1.13 | CVE-2024-45310 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kubelet | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-apiserver | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-controller-manager | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-proxy | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-scheduler | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kubectl | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kubelet | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.33.3-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-apiserver | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.33.3-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-controller-manager | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.33.3-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-proxy | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.33.3-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-scheduler | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.33.3-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kubectl | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.33.3-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kubelet | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.1.4-build20250108 | false | Rancher head | cert-approver | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.1.4-build20250108 | false | Rancher head | cert-approver | stdlib@v1.21.11 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.1.4-build20250108 | false | Rancher head | install_multus | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.1.4-build20250108 | false | Rancher head | install_multus | stdlib@v1.21.11 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.1.4-build20250108 | false | Rancher head | kubeconfig_generator | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.1.4-build20250108 | false | Rancher head | kubeconfig_generator | stdlib@v1.21.11 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.1.4-build20250108 | false | Rancher head | thin_entrypoint | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.1.4-build20250108 | false | Rancher head | thin_entrypoint | stdlib@v1.21.11 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.1.4-build20250108 | false | Rancher head | usr/src/multus-cni/bin/multus | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.1.4-build20250108 | false | Rancher head | usr/src/multus-cni/bin/multus | stdlib@v1.21.11 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.2.1-build20250627 | false | Rancher head | cert-approver | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.2.1-build20250627 | false | Rancher head | cert-approver | stdlib@v1.21.11 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.2.1-build20250627 | false | Rancher head | install_multus | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.2.1-build20250627 | false | Rancher head | install_multus | stdlib@v1.21.11 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.2.1-build20250627 | false | Rancher head | kubeconfig_generator | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.2.1-build20250627 | false | Rancher head | kubeconfig_generator | stdlib@v1.21.11 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.2.1-build20250627 | false | Rancher head | thin_entrypoint | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.2.1-build20250627 | false | Rancher head | thin_entrypoint | stdlib@v1.21.11 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.2.1-build20250627 | false | Rancher head | usr/src/multus-cni/bin/multus | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.2.1-build20250627 | false | Rancher head | usr/src/multus-cni/bin/multus | stdlib@v1.21.11 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-dynamic-networks-controller:v0.3.7-build20250711 | false | Rancher head | dynamic-networks-controller | stdlib@v1.22.12 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-thick:v4.2.1-build20250627 | false | Rancher head | glibc | glibc@2.38-150600.14.29.1 | SUSE-SU-2025:01702-2 | HIGH | affected | sles | |
rancher/hardened-multus-thick:v4.2.1-build20250627 | false | Rancher head | install_multus | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-thick:v4.2.1-build20250627 | false | Rancher head | install_multus | stdlib@v1.21.11 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-thick:v4.2.1-build20250627 | false | Rancher head | usr/src/multus-cni/bin/multus-daemon | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-thick:v4.2.1-build20250627 | false | Rancher head | usr/src/multus-cni/bin/multus-daemon | stdlib@v1.21.11 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-thick:v4.2.1-build20250627 | false | Rancher head | usr/src/multus-cni/bin/multus-shim | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-thick:v4.2.1-build20250627 | false | Rancher head | usr/src/multus-cni/bin/multus-shim | stdlib@v1.21.11 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-thick:v4.2.1-build20250627 | false | Rancher head | usr/src/multus-cni/bin/passthru | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-thick:v4.2.1-build20250627 | false | Rancher head | usr/src/multus-cni/bin/passthru | stdlib@v1.21.11 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-whereabouts:v0.8.0-build20241011 | false | Rancher head | glibc | glibc@2.38-150600.14.11.2 | SUSE-SU-2025:01702-1 | HIGH | affected | sles | |
rancher/hardened-whereabouts:v0.8.0-build20241011 | false | Rancher head | ip-control-loop | stdlib@v1.22.7 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-whereabouts:v0.8.0-build20241011 | false | Rancher head | whereabouts | stdlib@v1.22.7 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-whereabouts:v0.8.0-build20250131 | false | Rancher head | glibc | glibc@2.38-150600.14.20.3 | SUSE-SU-2025:01702-1 | HIGH | affected | sles | |
rancher/hardened-whereabouts:v0.8.0-build20250131 | false | Rancher head | ip-control-loop | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-whereabouts:v0.8.0-build20250131 | false | Rancher head | whereabouts | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-whereabouts:v0.9.0-build20250612 | false | Rancher head | ip-control-loop | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-whereabouts:v0.9.0-build20250612 | false | Rancher head | whereabouts | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-whereabouts:v0.9.1-build20250704 | false | Rancher head | glibc | glibc@2.38-150600.14.29.1 | SUSE-SU-2025:01702-2 | HIGH | affected | sles | |
rancher/hardened-whereabouts:v0.9.1-build20250704 | false | Rancher head | ip-control-loop | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-whereabouts:v0.9.1-build20250704 | false | Rancher head | node-slice-controller | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-whereabouts:v0.9.1-build20250704 | false | Rancher head | whereabouts | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher head | glibc | glibc@2.38-150600.14.17.2 | SUSE-SU-2025:01702-1 | HIGH | affected | sles | |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher head | usr/bin/harvester-cloud-provider | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2023-22651 | CRITICAL | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher head | usr/bin/harvester-cloud-provider | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2019-12274 | HIGH | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher head | usr/bin/harvester-cloud-provider | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2021-36775 | HIGH | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher head | usr/bin/harvester-cloud-provider | github.com/rancher/steve@v0.0.0-20221209194631-acf9d31ce0dd | CVE-2024-52280 | HIGH | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher head | usr/bin/harvester-cloud-provider | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher head | usr/bin/harvester-cloud-provider | stdlib@v1.22.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | glibc | glibc@2.38-150600.14.14.2 | SUSE-SU-2025:01702-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | libexpat1 | libexpat1@2.4.4-150400.3.22.1 | SUSE-SU-2025:1201-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2025:02167-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | liblzma5 | liblzma5@5.4.1-150600.1.2 | SUSE-SU-2025:1137-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.1.4-150600.5.21.1 | SUSE-SU-2025:1550-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | libopenssl3 | libopenssl3@3.1.4-150600.5.21.1 | SUSE-SU-2025:1550-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | libsqlite3-0 | libsqlite3-0@3.44.0-150000.3.23.1 | SUSE-SU-2025:02672-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | libsqlite3-0 | libsqlite3-0@3.44.0-150000.3.23.1 | SUSE-SU-2025:1456-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | libssh-config | libssh-config@0.9.8-150600.9.1 | SUSE-SU-2025:02229-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | libssh4 | libssh4@0.9.8-150600.9.1 | SUSE-SU-2025:02229-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:02314-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:02758-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | openssl-3 | openssl-3@3.1.4-150600.5.21.1 | SUSE-SU-2025:1550-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | pam | pam@1.3.0-150000.6.71.2 | SUSE-SU-2025:02013-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | pam-config | pam-config@1.1-150600.16.3.1 | SUSE-SU-2025:02080-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | usr/bin/harvester-csi-driver | stdlib@v1.22.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-csi-driver:v0.2.3 | false | Rancher head | libsqlite3-0 | libsqlite3-0@3.49.1-150000.3.27.1 | SUSE-SU-2025:02672-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.3 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.26.1 | SUSE-SU-2025:02314-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.3 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.26.1 | SUSE-SU-2025:02758-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.3 | false | Rancher head | usr/bin/harvester-csi-driver | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/k3s-upgrade:v1.30.14-k3s1 | false | Rancher head | opt/k3s | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/k3s-upgrade:v1.31.11-k3s1 | false | Rancher head | opt/k3s | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/k3s-upgrade:v1.32.7-k3s1 | false | Rancher head | opt/k3s | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/k3s-upgrade:v1.33.3-k3s1 | false | Rancher head | opt/k3s | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | golang.org/x/oauth2@v0.10.0 | CVE-2025-22868 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | helm.sh/helm/v3@v3.15.4 | CVE-2025-53547 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher head | usr/bin/helm | stdlib@v1.22.7 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.9.4-build20250113 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.9.4-build20250113 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | golang.org/x/oauth2@v0.10.0 | CVE-2025-22868 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.9.4-build20250113 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | helm.sh/helm/v3@v3.15.4 | CVE-2025-53547 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.9.4-build20250113 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.9.4-build20250113 | false | Rancher head | usr/bin/helm | stdlib@v1.22.7 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.9.5-build20250306 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | stdlib@v1.24.1 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.9.5-build20250306 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | stdlib@v1.24.1 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.9.5-build20250306 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | golang.org/x/oauth2@v0.10.0 | CVE-2025-22868 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.9.5-build20250306 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | helm.sh/helm/v3@v3.15.4 | CVE-2025-53547 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.9.5-build20250306 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | stdlib@v1.24.1 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.9.5-build20250306 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | stdlib@v1.24.1 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.9.5-build20250306 | false | Rancher head | usr/bin/helm | stdlib@v1.22.7 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.9.7-build20250616 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.9.7-build20250616 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | helm.sh/helm/v3@v3.18.3 | CVE-2025-53547 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.9.7-build20250616 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.9.7-build20250616 | false | Rancher head | usr/bin/helm | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.9.8-build20250709 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | stdlib@v1.24.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.9.8-build20250709 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | stdlib@v1.24.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.9.8-build20250709 | false | Rancher head | usr/bin/helm | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-lb:v0.4.9 | false | Rancher head | libcrypto3 | libcrypto3@3.3.1-r3 | CVE-2024-6119 | HIGH | affected | alpine | |
rancher/klipper-lb:v0.4.9 | false | Rancher head | libssl3 | libssl3@3.3.1-r3 | CVE-2024-6119 | HIGH | affected | alpine | |
rancher/local-path-provisioner:v0.0.30 | false | Rancher head | usr/bin/local-path-provisioner | stdlib@v1.23.1 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/local-path-provisioner:v0.0.31 | false | Rancher head | usr/bin/local-path-provisioner | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/machine:v0.15.0-rancher131 | false | Rancher head | usr/local/bin/rancher-machine | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/machine:v0.15.0-rancher131 | false | Rancher head | usr/local/bin/rancher-machine | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-bci-busybox:15.6.24.2 | true | Rancher head | glibc | glibc@2.38-150600.14.5.1 | SUSE-SU-2025:01702-1 | HIGH | affected | sles | |
rancher/mirrored-bci-micro:15.6.24.2 | true | Rancher head | glibc | glibc@2.38-150600.14.5.1 | SUSE-SU-2025:01702-1 | HIGH | affected | sles | |
rancher/mirrored-calico-apiserver:v3.29.1 | true | Rancher head | code/apiserver | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.29.2 | true | Rancher head | code/apiserver | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.29.3 | true | Rancher head | code/apiserver | stdlib@v1.23.7 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.30.0 | true | Rancher head | code/apiserver | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.30.0 | true | Rancher head | code/apiserver | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.30.1 | true | Rancher head | code/apiserver | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.30.1 | true | Rancher head | code/apiserver | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.29.1 | true | Rancher head | opt/cni/bin/bandwidth | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.29.1 | true | Rancher head | opt/cni/bin/calico | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.29.1 | true | Rancher head | opt/cni/bin/calico-ipam | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.29.1 | true | Rancher head | opt/cni/bin/flannel | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.29.1 | true | Rancher head | opt/cni/bin/host-local | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.29.1 | true | Rancher head | opt/cni/bin/install | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.29.1 | true | Rancher head | opt/cni/bin/loopback | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.29.1 | true | Rancher head | opt/cni/bin/portmap | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.29.1 | true | Rancher head | opt/cni/bin/tuning | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.29.2 | true | Rancher head | opt/cni/bin/bandwidth | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.29.2 | true | Rancher head | opt/cni/bin/calico | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.29.2 | true | Rancher head | opt/cni/bin/calico-ipam | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.29.2 | true | Rancher head | opt/cni/bin/flannel | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.29.2 | true | Rancher head | opt/cni/bin/host-local | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.29.2 | true | Rancher head | opt/cni/bin/install | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.29.2 | true | Rancher head | opt/cni/bin/loopback | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.29.2 | true | Rancher head | opt/cni/bin/portmap | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.29.2 | true | Rancher head | opt/cni/bin/tuning | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.29.3 | true | Rancher head | opt/cni/bin/bandwidth | stdlib@v1.23.7 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.29.3 | true | Rancher head | opt/cni/bin/calico | stdlib@v1.23.7 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.29.3 | true | Rancher head | opt/cni/bin/calico-ipam | stdlib@v1.23.7 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.29.3 | true | Rancher head | opt/cni/bin/flannel | stdlib@v1.23.7 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.29.3 | true | Rancher head | opt/cni/bin/host-local | stdlib@v1.23.7 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.29.3 | true | Rancher head | opt/cni/bin/install | stdlib@v1.23.7 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.29.3 | true | Rancher head | opt/cni/bin/loopback | stdlib@v1.23.7 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.29.3 | true | Rancher head | opt/cni/bin/portmap | stdlib@v1.23.7 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.29.3 | true | Rancher head | opt/cni/bin/tuning | stdlib@v1.23.7 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.30.1 | true | Rancher head | opt/cni/bin/calico | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-calico-cni:v3.30.1 | true | Rancher head | opt/cni/bin/calico | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.30.1 | true | Rancher head | opt/cni/bin/flannel | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-calico-cni:v3.30.1 | true | Rancher head | opt/cni/bin/flannel | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.30.1 | true | Rancher head | opt/cni/bin/host-local | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-calico-cni:v3.30.1 | true | Rancher head | opt/cni/bin/host-local | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.30.1 | true | Rancher head | opt/cni/bin/install | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-calico-cni:v3.30.1 | true | Rancher head | opt/cni/bin/install | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.30.1 | true | Rancher head | opt/cni/bin/loopback | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-calico-cni:v3.30.1 | true | Rancher head | opt/cni/bin/loopback | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.30.1 | true | Rancher head | opt/cni/bin/portmap | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-calico-cni:v3.30.1 | true | Rancher head | opt/cni/bin/portmap | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.30.1 | true | Rancher head | opt/cni/bin/tuning | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-calico-cni:v3.30.1 | true | Rancher head | opt/cni/bin/tuning | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-csi:v3.29.1 | true | Rancher head | usr/bin/csi-driver | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-csi:v3.29.2 | true | Rancher head | usr/bin/csi-driver | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-csi:v3.29.3 | true | Rancher head | usr/bin/csi-driver | stdlib@v1.23.7 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-csi:v3.30.0 | true | Rancher head | usr/bin/csi-driver | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-calico-csi:v3.30.0 | true | Rancher head | usr/bin/csi-driver | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-csi:v3.30.1 | true | Rancher head | usr/bin/csi-driver | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-calico-csi:v3.30.1 | true | Rancher head | usr/bin/csi-driver | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.29.1 | true | Rancher head | usr/bin/calicoctl | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.29.1 | true | Rancher head | usr/bin/calicoctl | golang.org/x/crypto@v0.24.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-calico-ctl:v3.29.1 | true | Rancher head | usr/bin/calicoctl | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | HIGH | affected | gobinary | |
rancher/mirrored-calico-ctl:v3.29.1 | true | Rancher head | usr/bin/calicoctl | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.29.2 | true | Rancher head | usr/bin/calicoctl | golang.org/x/crypto@v0.32.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-calico-ctl:v3.29.2 | true | Rancher head | usr/bin/calicoctl | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | HIGH | affected | gobinary | |
rancher/mirrored-calico-ctl:v3.29.2 | true | Rancher head | usr/bin/calicoctl | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.29.3 | true | Rancher head | usr/bin/calicoctl | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | HIGH | affected | gobinary | |
rancher/mirrored-calico-ctl:v3.29.3 | true | Rancher head | usr/bin/calicoctl | stdlib@v1.23.7 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.30.0 | true | Rancher head | usr/bin/calicoctl | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-calico-ctl:v3.30.0 | true | Rancher head | usr/bin/calicoctl | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.30.1 | true | Rancher head | usr/bin/calicoctl | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-calico-ctl:v3.30.1 | true | Rancher head | usr/bin/calicoctl | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.29.1 | true | Rancher head | usr/bin/check-status | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.29.1 | true | Rancher head | usr/bin/kube-controllers | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.29.2 | true | Rancher head | usr/bin/check-status | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.29.2 | true | Rancher head | usr/bin/kube-controllers | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.29.3 | true | Rancher head | usr/bin/check-status | stdlib@v1.23.7 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.29.3 | true | Rancher head | usr/bin/kube-controllers | stdlib@v1.23.7 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.30.1 | true | Rancher head | usr/bin/check-status | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.30.1 | true | Rancher head | usr/bin/check-status | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.30.1 | true | Rancher head | usr/bin/kube-controllers | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.30.1 | true | Rancher head | usr/bin/kube-controllers | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.30.1 | true | Rancher head | usr/bin/wrapper | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.30.1 | true | Rancher head | usr/bin/wrapper | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node-driver-registrar:v3.29.1 | true | Rancher head | usr/bin/node-driver-registrar | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node-driver-registrar:v3.29.2 | true | Rancher head | usr/bin/node-driver-registrar | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node-driver-registrar:v3.29.3 | true | Rancher head | usr/bin/node-driver-registrar | stdlib@v1.23.7 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node-driver-registrar:v3.30.0 | true | Rancher head | usr/bin/node-driver-registrar | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-calico-node-driver-registrar:v3.30.0 | true | Rancher head | usr/bin/node-driver-registrar | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node-driver-registrar:v3.30.1 | true | Rancher head | usr/bin/node-driver-registrar | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-calico-node-driver-registrar:v3.30.1 | true | Rancher head | usr/bin/node-driver-registrar | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.29.1 | true | Rancher head | usr/bin/calico-node | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.29.1 | true | Rancher head | usr/bin/calico-node | golang.org/x/crypto@v0.24.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-calico-node:v3.29.1 | true | Rancher head | usr/bin/calico-node | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | HIGH | affected | gobinary | |
rancher/mirrored-calico-node:v3.29.1 | true | Rancher head | usr/bin/calico-node | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.29.1 | true | Rancher head | usr/bin/mountns | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.29.2 | true | Rancher head | usr/bin/calico-node | golang.org/x/crypto@v0.32.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-calico-node:v3.29.2 | true | Rancher head | usr/bin/calico-node | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | HIGH | affected | gobinary | |
rancher/mirrored-calico-node:v3.29.2 | true | Rancher head | usr/bin/calico-node | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.29.2 | true | Rancher head | usr/bin/mountns | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.29.3 | true | Rancher head | usr/bin/calico-node | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | HIGH | affected | gobinary | |
rancher/mirrored-calico-node:v3.29.3 | true | Rancher head | usr/bin/calico-node | stdlib@v1.23.7 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.29.3 | true | Rancher head | usr/bin/mountns | stdlib@v1.23.7 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.30.0 | true | Rancher head | usr/bin/calico-node | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-calico-node:v3.30.0 | true | Rancher head | usr/bin/calico-node | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.30.0 | true | Rancher head | usr/bin/mountns | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-calico-node:v3.30.0 | true | Rancher head | usr/bin/mountns | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.30.1 | true | Rancher head | usr/bin/calico-node | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-calico-node:v3.30.1 | true | Rancher head | usr/bin/calico-node | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.30.1 | true | Rancher head | usr/bin/mountns | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-calico-node:v3.30.1 | true | Rancher head | usr/bin/mountns | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.36.2 | true | Rancher head | usr/bin/operator | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.36.2 | true | Rancher head | usr/bin/operator | golang.org/x/crypto@v0.22.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-calico-operator:v1.36.2 | true | Rancher head | usr/bin/operator | golang.org/x/oauth2@v0.19.0 | CVE-2025-22868 | HIGH | affected | gobinary | |
rancher/mirrored-calico-operator:v1.36.2 | true | Rancher head | usr/bin/operator | stdlib@v1.22.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.36.5 | true | Rancher head | usr/bin/operator | golang.org/x/crypto@v0.32.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-calico-operator:v1.36.5 | true | Rancher head | usr/bin/operator | golang.org/x/oauth2@v0.19.0 | CVE-2025-22868 | HIGH | affected | gobinary | |
rancher/mirrored-calico-operator:v1.36.5 | true | Rancher head | usr/bin/operator | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.38.0 | true | Rancher head | usr/bin/operator | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-calico-operator:v1.38.0 | true | Rancher head | usr/bin/operator | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.38.1 | true | Rancher head | usr/bin/operator | stdlib@v1.24.3 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-calico-operator:v1.38.1 | true | Rancher head | usr/bin/operator | stdlib@v1.24.3 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-pod2daemon-flexvol:v3.29.1 | true | Rancher head | usr/local/bin/flexvol | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-pod2daemon-flexvol:v3.29.2 | true | Rancher head | usr/local/bin/flexvol | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-pod2daemon-flexvol:v3.29.3 | true | Rancher head | usr/local/bin/flexvol | stdlib@v1.23.7 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-pod2daemon-flexvol:v3.30.1 | true | Rancher head | usr/local/bin/flexvol | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-calico-pod2daemon-flexvol:v3.30.1 | true | Rancher head | usr/local/bin/flexvol | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-typha:v3.29.1 | true | Rancher head | usr/bin/calico-typha | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-typha:v3.29.2 | true | Rancher head | usr/bin/calico-typha | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-typha:v3.29.3 | true | Rancher head | usr/bin/calico-typha | stdlib@v1.23.7 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-typha:v3.30.1 | true | Rancher head | usr/bin/calico-typha | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-calico-typha:v3.30.1 | true | Rancher head | usr/bin/calico-typha | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-certgen:v0.2.0 | true | Rancher head | usr/bin/cilium-certgen | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-certgen:v0.2.0 | true | Rancher head | usr/bin/cilium-certgen | golang.org/x/crypto@v0.22.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-certgen:v0.2.0 | true | Rancher head | usr/bin/cilium-certgen | golang.org/x/oauth2@v0.18.0 | CVE-2025-22868 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-certgen:v0.2.0 | true | Rancher head | usr/bin/cilium-certgen | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-certgen:v0.2.0 | true | Rancher head | usr/bin/cilium-certgen | stdlib@v1.22.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-certgen:v0.2.1 | true | Rancher head | usr/bin/cilium-certgen | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-certgen:v0.2.1 | true | Rancher head | usr/bin/cilium-certgen | golang.org/x/crypto@v0.22.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-certgen:v0.2.1 | true | Rancher head | usr/bin/cilium-certgen | golang.org/x/oauth2@v0.18.0 | CVE-2025-22868 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-certgen:v0.2.1 | true | Rancher head | usr/bin/cilium-certgen | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-certgen:v0.2.1 | true | Rancher head | usr/bin/cilium-certgen | stdlib@v1.22.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.5 | true | Rancher head | cni/loopback | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.5 | true | Rancher head | opt/cni/bin/cilium-cni | stdlib@v1.22.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.5 | true | Rancher head | usr/bin/cilium-agent | github.com/osrg/gobgp/v3@v3.27.0 | CVE-2025-43971 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.5 | true | Rancher head | usr/bin/cilium-agent | golang.org/x/crypto@v0.31.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.5 | true | Rancher head | usr/bin/cilium-agent | stdlib@v1.22.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.5 | true | Rancher head | usr/bin/cilium-bugtool | stdlib@v1.22.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.5 | true | Rancher head | usr/bin/cilium-dbg | github.com/osrg/gobgp/v3@v3.27.0 | CVE-2025-43971 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.5 | true | Rancher head | usr/bin/cilium-dbg | stdlib@v1.22.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.5 | true | Rancher head | usr/bin/cilium-health | stdlib@v1.22.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.5 | true | Rancher head | usr/bin/cilium-health-responder | stdlib@v1.22.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.5 | true | Rancher head | usr/bin/cilium-mount | stdlib@v1.22.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.5 | true | Rancher head | usr/bin/cilium-sysctlfix | stdlib@v1.22.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.5 | true | Rancher head | usr/bin/gops | stdlib@v1.22.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.5 | true | Rancher head | usr/bin/hubble | stdlib@v1.22.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.0 | true | Rancher head | cni/loopback | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.0 | true | Rancher head | opt/cni/bin/cilium-cni | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.0 | true | Rancher head | usr/bin/cilium-agent | github.com/osrg/gobgp/v3@v3.32.0 | CVE-2025-43971 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.0 | true | Rancher head | usr/bin/cilium-agent | golang.org/x/crypto@v0.31.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.0 | true | Rancher head | usr/bin/cilium-agent | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.0 | true | Rancher head | usr/bin/cilium-bugtool | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.0 | true | Rancher head | usr/bin/cilium-dbg | github.com/osrg/gobgp/v3@v3.32.0 | CVE-2025-43971 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.0 | true | Rancher head | usr/bin/cilium-dbg | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.0 | true | Rancher head | usr/bin/cilium-health | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.0 | true | Rancher head | usr/bin/cilium-health-responder | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.0 | true | Rancher head | usr/bin/cilium-mount | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.0 | true | Rancher head | usr/bin/cilium-sysctlfix | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.0 | true | Rancher head | usr/bin/gops | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.0 | true | Rancher head | usr/bin/hubble | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.1 | true | Rancher head | cni/loopback | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.1 | true | Rancher head | opt/cni/bin/cilium-cni | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.1 | true | Rancher head | usr/bin/cilium-agent | github.com/osrg/gobgp/v3@v3.32.0 | CVE-2025-43971 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.1 | true | Rancher head | usr/bin/cilium-agent | golang.org/x/crypto@v0.31.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.1 | true | Rancher head | usr/bin/cilium-agent | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.1 | true | Rancher head | usr/bin/cilium-bugtool | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.1 | true | Rancher head | usr/bin/cilium-dbg | github.com/osrg/gobgp/v3@v3.32.0 | CVE-2025-43971 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.1 | true | Rancher head | usr/bin/cilium-dbg | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.1 | true | Rancher head | usr/bin/cilium-health | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.1 | true | Rancher head | usr/bin/cilium-health-responder | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.1 | true | Rancher head | usr/bin/cilium-mount | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.1 | true | Rancher head | usr/bin/cilium-sysctlfix | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.1 | true | Rancher head | usr/bin/gops | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.1 | true | Rancher head | usr/bin/hubble | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.3 | true | Rancher head | cni/loopback | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.3 | true | Rancher head | opt/cni/bin/cilium-cni | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.3 | true | Rancher head | usr/bin/cilium-agent | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.3 | true | Rancher head | usr/bin/cilium-bugtool | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.3 | true | Rancher head | usr/bin/cilium-dbg | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.3 | true | Rancher head | usr/bin/cilium-health | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.3 | true | Rancher head | usr/bin/cilium-health-responder | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.3 | true | Rancher head | usr/bin/cilium-mount | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.3 | true | Rancher head | usr/bin/cilium-sysctlfix | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.3 | true | Rancher head | usr/bin/gops | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.3 | true | Rancher head | usr/bin/hubble | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.4 | true | Rancher head | cni/loopback | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.4 | true | Rancher head | cni/loopback | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.4 | true | Rancher head | opt/cni/bin/cilium-cni | stdlib@v1.24.3 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.4 | true | Rancher head | opt/cni/bin/cilium-cni | stdlib@v1.24.3 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.4 | true | Rancher head | usr/bin/cilium-agent | stdlib@v1.24.3 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.4 | true | Rancher head | usr/bin/cilium-agent | stdlib@v1.24.3 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.4 | true | Rancher head | usr/bin/cilium-bugtool | stdlib@v1.24.3 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.4 | true | Rancher head | usr/bin/cilium-bugtool | stdlib@v1.24.3 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.4 | true | Rancher head | usr/bin/cilium-dbg | stdlib@v1.24.3 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.4 | true | Rancher head | usr/bin/cilium-dbg | stdlib@v1.24.3 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.4 | true | Rancher head | usr/bin/cilium-health | stdlib@v1.24.3 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.4 | true | Rancher head | usr/bin/cilium-health | stdlib@v1.24.3 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.4 | true | Rancher head | usr/bin/cilium-health-responder | stdlib@v1.24.3 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.4 | true | Rancher head | usr/bin/cilium-health-responder | stdlib@v1.24.3 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.4 | true | Rancher head | usr/bin/cilium-mount | stdlib@v1.24.3 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.4 | true | Rancher head | usr/bin/cilium-mount | stdlib@v1.24.3 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.4 | true | Rancher head | usr/bin/cilium-sysctlfix | stdlib@v1.24.3 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.4 | true | Rancher head | usr/bin/cilium-sysctlfix | stdlib@v1.24.3 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.4 | true | Rancher head | usr/bin/gops | stdlib@v1.24.3 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.4 | true | Rancher head | usr/bin/gops | stdlib@v1.24.3 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.4 | true | Rancher head | usr/bin/hubble | stdlib@v1.24.3 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.4 | true | Rancher head | usr/bin/hubble | stdlib@v1.24.3 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.6 | true | Rancher head | cni/loopback | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.6 | true | Rancher head | cni/loopback | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.6 | true | Rancher head | opt/cni/bin/cilium-cni | stdlib@v1.24.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.6 | true | Rancher head | usr/bin/cilium-agent | stdlib@v1.24.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.6 | true | Rancher head | usr/bin/cilium-bugtool | stdlib@v1.24.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.6 | true | Rancher head | usr/bin/cilium-dbg | stdlib@v1.24.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.6 | true | Rancher head | usr/bin/cilium-health | stdlib@v1.24.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.6 | true | Rancher head | usr/bin/cilium-health-responder | stdlib@v1.24.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.6 | true | Rancher head | usr/bin/cilium-mount | stdlib@v1.24.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.6 | true | Rancher head | usr/bin/cilium-sysctlfix | stdlib@v1.24.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.6 | true | Rancher head | usr/bin/gops | stdlib@v1.24.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.17.6 | true | Rancher head | usr/bin/hubble | stdlib@v1.24.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.5 | true | Rancher head | bin/gops | stdlib@v1.22.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.5 | true | Rancher head | usr/bin/clustermesh-apiserver | github.com/osrg/gobgp/v3@v3.27.0 | CVE-2025-43971 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.5 | true | Rancher head | usr/bin/clustermesh-apiserver | stdlib@v1.22.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.5 | true | Rancher head | usr/bin/etcd | stdlib@v1.22.9 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-clustermesh-apiserver:v1.17.0 | true | Rancher head | bin/gops | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-clustermesh-apiserver:v1.17.0 | true | Rancher head | usr/bin/clustermesh-apiserver | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-clustermesh-apiserver:v1.17.0 | true | Rancher head | usr/bin/etcd | stdlib@v1.22.9 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-clustermesh-apiserver:v1.17.1 | true | Rancher head | bin/gops | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-clustermesh-apiserver:v1.17.1 | true | Rancher head | usr/bin/clustermesh-apiserver | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-clustermesh-apiserver:v1.17.1 | true | Rancher head | usr/bin/etcd | stdlib@v1.22.11 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-clustermesh-apiserver:v1.17.3 | true | Rancher head | bin/gops | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-clustermesh-apiserver:v1.17.3 | true | Rancher head | usr/bin/clustermesh-apiserver | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-clustermesh-apiserver:v1.17.3 | true | Rancher head | usr/bin/etcd | stdlib@v1.23.7 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-clustermesh-apiserver:v1.17.4 | true | Rancher head | bin/gops | stdlib@v1.24.3 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-clustermesh-apiserver:v1.17.4 | true | Rancher head | bin/gops | stdlib@v1.24.3 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-clustermesh-apiserver:v1.17.4 | true | Rancher head | usr/bin/clustermesh-apiserver | stdlib@v1.24.3 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-clustermesh-apiserver:v1.17.4 | true | Rancher head | usr/bin/clustermesh-apiserver | stdlib@v1.24.3 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-clustermesh-apiserver:v1.17.4 | true | Rancher head | usr/bin/etcd | stdlib@v1.23.7 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-clustermesh-apiserver:v1.17.6 | true | Rancher head | bin/gops | stdlib@v1.24.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-clustermesh-apiserver:v1.17.6 | true | Rancher head | usr/bin/clustermesh-apiserver | stdlib@v1.24.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-clustermesh-apiserver:v1.17.6 | true | Rancher head | usr/bin/etcd | stdlib@v1.23.7 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-relay:v1.16.5 | true | Rancher head | bin/gops | stdlib@v1.22.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-relay:v1.16.5 | true | Rancher head | bin/grpc_health_probe | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-relay:v1.16.5 | true | Rancher head | usr/bin/hubble-relay | stdlib@v1.22.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-relay:v1.17.0 | true | Rancher head | bin/gops | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-relay:v1.17.0 | true | Rancher head | bin/grpc_health_probe | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-relay:v1.17.0 | true | Rancher head | usr/bin/hubble-relay | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-relay:v1.17.1 | true | Rancher head | bin/gops | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-relay:v1.17.1 | true | Rancher head | bin/grpc_health_probe | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-relay:v1.17.1 | true | Rancher head | usr/bin/hubble-relay | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-relay:v1.17.3 | true | Rancher head | bin/gops | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-relay:v1.17.3 | true | Rancher head | usr/bin/hubble-relay | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-relay:v1.17.4 | true | Rancher head | bin/gops | stdlib@v1.24.3 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-hubble-relay:v1.17.4 | true | Rancher head | bin/gops | stdlib@v1.24.3 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-relay:v1.17.4 | true | Rancher head | usr/bin/hubble-relay | stdlib@v1.24.3 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-hubble-relay:v1.17.4 | true | Rancher head | usr/bin/hubble-relay | stdlib@v1.24.3 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-relay:v1.17.6 | true | Rancher head | bin/gops | stdlib@v1.24.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-relay:v1.17.6 | true | Rancher head | usr/bin/hubble-relay | stdlib@v1.24.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-ui-backend:v0.13.1 | true | Rancher head | usr/bin/backend | github.com/cilium/cilium@v1.15.5 | CVE-2024-37307 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-hubble-ui-backend:v0.13.1 | true | Rancher head | usr/bin/backend | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-hubble-ui-backend:v0.13.1 | true | Rancher head | usr/bin/backend | stdlib@v1.22.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-ui-backend:v0.13.1 | true | Rancher head | usr/bin/backend | stdlib@v1.22.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-ui-backend:v0.13.1 | true | Rancher head | usr/bin/backend | stdlib@v1.22.3 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-ui-backend:v0.13.2 | true | Rancher head | usr/bin/backend | golang.org/x/oauth2@v0.26.0 | CVE-2025-22868 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-hubble-ui-backend:v0.13.2 | true | Rancher head | usr/bin/backend | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-ui:v0.13.1 | true | Rancher head | libcrypto3 | libcrypto3@3.1.5-r0 | CVE-2024-6119 | HIGH | affected | alpine | |
rancher/mirrored-cilium-hubble-ui:v0.13.1 | true | Rancher head | libssl3 | libssl3@3.1.5-r0 | CVE-2024-6119 | HIGH | affected | alpine | |
rancher/mirrored-cilium-operator-aws:v1.16.5 | true | Rancher head | bin/gops | stdlib@v1.22.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-aws:v1.16.5 | true | Rancher head | usr/bin/cilium-operator-aws | github.com/osrg/gobgp/v3@v3.27.0 | CVE-2025-43971 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-operator-aws:v1.16.5 | true | Rancher head | usr/bin/cilium-operator-aws | golang.org/x/crypto@v0.31.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-operator-aws:v1.16.5 | true | Rancher head | usr/bin/cilium-operator-aws | stdlib@v1.22.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-aws:v1.17.0 | true | Rancher head | bin/gops | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-aws:v1.17.0 | true | Rancher head | usr/bin/cilium-operator-aws | github.com/osrg/gobgp/v3@v3.32.0 | CVE-2025-43971 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-operator-aws:v1.17.0 | true | Rancher head | usr/bin/cilium-operator-aws | golang.org/x/crypto@v0.31.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-operator-aws:v1.17.0 | true | Rancher head | usr/bin/cilium-operator-aws | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-aws:v1.17.1 | true | Rancher head | bin/gops | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-aws:v1.17.1 | true | Rancher head | usr/bin/cilium-operator-aws | github.com/osrg/gobgp/v3@v3.32.0 | CVE-2025-43971 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-operator-aws:v1.17.1 | true | Rancher head | usr/bin/cilium-operator-aws | golang.org/x/crypto@v0.31.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-operator-aws:v1.17.1 | true | Rancher head | usr/bin/cilium-operator-aws | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-aws:v1.17.3 | true | Rancher head | bin/gops | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-aws:v1.17.3 | true | Rancher head | usr/bin/cilium-operator-aws | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-aws:v1.17.4 | true | Rancher head | bin/gops | stdlib@v1.24.3 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-operator-aws:v1.17.4 | true | Rancher head | bin/gops | stdlib@v1.24.3 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-aws:v1.17.4 | true | Rancher head | usr/bin/cilium-operator-aws | stdlib@v1.24.3 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-operator-aws:v1.17.4 | true | Rancher head | usr/bin/cilium-operator-aws | stdlib@v1.24.3 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-aws:v1.17.6 | true | Rancher head | bin/gops | stdlib@v1.24.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-aws:v1.17.6 | true | Rancher head | usr/bin/cilium-operator-aws | stdlib@v1.24.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-azure:v1.16.5 | true | Rancher head | bin/gops | stdlib@v1.22.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-azure:v1.16.5 | true | Rancher head | usr/bin/cilium-operator-azure | github.com/osrg/gobgp/v3@v3.27.0 | CVE-2025-43971 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-operator-azure:v1.16.5 | true | Rancher head | usr/bin/cilium-operator-azure | golang.org/x/crypto@v0.31.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-operator-azure:v1.16.5 | true | Rancher head | usr/bin/cilium-operator-azure | stdlib@v1.22.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-azure:v1.17.0 | true | Rancher head | bin/gops | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-azure:v1.17.0 | true | Rancher head | usr/bin/cilium-operator-azure | github.com/osrg/gobgp/v3@v3.32.0 | CVE-2025-43971 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-operator-azure:v1.17.0 | true | Rancher head | usr/bin/cilium-operator-azure | golang.org/x/crypto@v0.31.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-operator-azure:v1.17.0 | true | Rancher head | usr/bin/cilium-operator-azure | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-azure:v1.17.1 | true | Rancher head | bin/gops | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-azure:v1.17.1 | true | Rancher head | usr/bin/cilium-operator-azure | github.com/osrg/gobgp/v3@v3.32.0 | CVE-2025-43971 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-operator-azure:v1.17.1 | true | Rancher head | usr/bin/cilium-operator-azure | golang.org/x/crypto@v0.31.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-operator-azure:v1.17.1 | true | Rancher head | usr/bin/cilium-operator-azure | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-azure:v1.17.3 | true | Rancher head | bin/gops | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-azure:v1.17.3 | true | Rancher head | usr/bin/cilium-operator-azure | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-azure:v1.17.4 | true | Rancher head | bin/gops | stdlib@v1.24.3 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-operator-azure:v1.17.4 | true | Rancher head | bin/gops | stdlib@v1.24.3 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-azure:v1.17.4 | true | Rancher head | usr/bin/cilium-operator-azure | stdlib@v1.24.3 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-operator-azure:v1.17.4 | true | Rancher head | usr/bin/cilium-operator-azure | stdlib@v1.24.3 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-azure:v1.17.6 | true | Rancher head | bin/gops | stdlib@v1.24.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-azure:v1.17.6 | true | Rancher head | usr/bin/cilium-operator-azure | stdlib@v1.24.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-generic:v1.16.5 | true | Rancher head | bin/gops | stdlib@v1.22.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-generic:v1.16.5 | true | Rancher head | usr/bin/cilium-operator-generic | github.com/osrg/gobgp/v3@v3.27.0 | CVE-2025-43971 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-operator-generic:v1.16.5 | true | Rancher head | usr/bin/cilium-operator-generic | golang.org/x/crypto@v0.31.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-operator-generic:v1.16.5 | true | Rancher head | usr/bin/cilium-operator-generic | stdlib@v1.22.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-generic:v1.17.0 | true | Rancher head | bin/gops | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-generic:v1.17.0 | true | Rancher head | usr/bin/cilium-operator-generic | github.com/osrg/gobgp/v3@v3.32.0 | CVE-2025-43971 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-operator-generic:v1.17.0 | true | Rancher head | usr/bin/cilium-operator-generic | golang.org/x/crypto@v0.31.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-operator-generic:v1.17.0 | true | Rancher head | usr/bin/cilium-operator-generic | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-generic:v1.17.1 | true | Rancher head | bin/gops | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-generic:v1.17.1 | true | Rancher head | usr/bin/cilium-operator-generic | github.com/osrg/gobgp/v3@v3.32.0 | CVE-2025-43971 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-operator-generic:v1.17.1 | true | Rancher head | usr/bin/cilium-operator-generic | golang.org/x/crypto@v0.31.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-operator-generic:v1.17.1 | true | Rancher head | usr/bin/cilium-operator-generic | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-generic:v1.17.3 | true | Rancher head | bin/gops | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-generic:v1.17.3 | true | Rancher head | usr/bin/cilium-operator-generic | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-generic:v1.17.4 | true | Rancher head | bin/gops | stdlib@v1.24.3 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-operator-generic:v1.17.4 | true | Rancher head | bin/gops | stdlib@v1.24.3 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-generic:v1.17.4 | true | Rancher head | usr/bin/cilium-operator-generic | stdlib@v1.24.3 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-operator-generic:v1.17.4 | true | Rancher head | usr/bin/cilium-operator-generic | stdlib@v1.24.3 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-generic:v1.17.6 | true | Rancher head | bin/gops | stdlib@v1.24.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-generic:v1.17.6 | true | Rancher head | usr/bin/cilium-operator-generic | stdlib@v1.24.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | github.com/golang-jwt/jwt/v4@v4.5.0 | CVE-2025-30204 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.41.1 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.41.1 | CVE-2023-45142 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.8.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/net@v0.10.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/net@v0.10.0 | CVE-2023-44487 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/oauth2@v0.7.0 | CVE-2025-22868 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | google.golang.org/protobuf@v1.30.0 | CVE-2024-24786 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-29409 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-39326 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-45289 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-45290 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2024-24783 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2024-24784 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2024-24785 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | github.com/golang-jwt/jwt/v4@v4.5.0 | CVE-2025-30204 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.41.1 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.41.1 | CVE-2023-45142 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.11.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.11.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/net@v0.13.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/net@v0.13.0 | CVE-2023-44487 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/oauth2@v0.8.0 | CVE-2025-22868 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | google.golang.org/protobuf@v1.30.0 | CVE-2024-24786 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.7 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.7 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.7 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.7 | CVE-2023-39326 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.7 | CVE-2023-45289 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.7 | CVE-2023-45290 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.7 | CVE-2024-24783 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.7 | CVE-2024-24784 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.7 | CVE-2024-24785 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.29.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | github.com/golang-jwt/jwt/v4@v4.5.0 | CVE-2025-30204 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.29.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.29.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.29.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.14.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.29.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/oauth2@v0.10.0 | CVE-2025-22868 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.29.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | google.golang.org/protobuf@v1.31.0 | CVE-2024-24786 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.29.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.21.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.29.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.21.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.29.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.21.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.29.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.21.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.29.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.21.6 | CVE-2023-45289 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.29.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.21.6 | CVE-2023-45290 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.29.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.21.6 | CVE-2024-24783 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.29.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.21.6 | CVE-2024-24784 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.29.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.21.6 | CVE-2024-24785 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.30.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | github.com/golang-jwt/jwt/v4@v4.5.0 | CVE-2025-30204 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.30.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.30.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.30.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.21.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.30.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/oauth2@v0.18.0 | CVE-2025-22868 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.30.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.22.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.30.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.22.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.30.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.22.3 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | curl | curl@8.1.2-7.ph4 | CVE-2024-2398 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | curl | curl@8.1.2-7.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | curl-libs | curl-libs@8.1.2-7.ph4 | CVE-2024-2398 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | curl-libs | curl-libs@8.1.2-7.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | expat | expat@2.2.9-11.ph4 | CVE-2024-45491 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | expat | expat@2.2.9-11.ph4 | CVE-2024-45492 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | expat | expat@2.2.9-11.ph4 | CVE-2023-52425 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | expat | expat@2.2.9-11.ph4 | CVE-2024-28757 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | expat | expat@2.2.9-11.ph4 | CVE-2024-45490 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | expat | expat@2.2.9-11.ph4 | CVE-2024-8176 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-45491 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-45492 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2023-52425 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-28757 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-45490 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-8176 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | glib | glib@2.68.4-1.ph4 | CVE-2024-52533 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | glibc | glibc@2.32-15.ph4 | CVE-2024-2961 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | glibc | glibc@2.32-15.ph4 | CVE-2024-33599 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | glibc | glibc@2.32-15.ph4 | CVE-2024-33601 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | glibc | glibc@2.32-15.ph4 | CVE-2024-33602 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | glibc | glibc@2.32-15.ph4 | CVE-2025-4802 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | glibc-iconv | glibc-iconv@2.32-15.ph4 | CVE-2024-2961 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | glibc-iconv | glibc-iconv@2.32-15.ph4 | CVE-2024-33599 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | glibc-iconv | glibc-iconv@2.32-15.ph4 | CVE-2024-33601 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | glibc-iconv | glibc-iconv@2.32-15.ph4 | CVE-2024-33602 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | glibc-iconv | glibc-iconv@2.32-15.ph4 | CVE-2025-4802 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | gnutls | gnutls@3.7.10-2.ph4 | CVE-2025-32990 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | krb5 | krb5@1.17-10.ph4 | CVE-2024-3596 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | krb5 | krb5@1.17-10.ph4 | CVE-2024-37371 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | krb5 | krb5@1.17-10.ph4 | CVE-2024-26461 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | krb5 | krb5@1.17-10.ph4 | CVE-2024-37370 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | libarchive | libarchive@3.4.3-10.ph4 | CVE-2025-25724 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | libarchive | libarchive@3.4.3-10.ph4 | CVE-2025-5914 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2025-49794 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2025-49796 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2022-49043 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2024-34459 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2024-56171 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2025-24928 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2025-27113 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2025-32414 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2025-32415 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2025-6021 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | nss-libs | nss-libs@3.72-4.ph4 | CVE-2024-0743 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | openssl | openssl@3.0.13-2.ph4 | CVE-2024-5535 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | openssl | openssl@3.0.13-2.ph4 | CVE-2024-4741 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | openssl | openssl@3.0.13-2.ph4 | CVE-2024-6119 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | python3 | python3@3.10.11-7.ph4 | CVE-2025-4517 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | python3 | python3@3.10.11-7.ph4 | CVE-2023-6597 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | python3 | python3@3.10.11-7.ph4 | CVE-2024-6232 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | python3 | python3@3.10.11-7.ph4 | CVE-2025-4138 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | python3 | python3@3.10.11-7.ph4 | CVE-2025-4330 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | python3 | python3@3.10.11-7.ph4 | cve-2024-7592 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | python3-libs | python3-libs@3.10.11-7.ph4 | CVE-2025-4517 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | python3-libs | python3-libs@3.10.11-7.ph4 | CVE-2023-6597 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | python3-libs | python3-libs@3.10.11-7.ph4 | CVE-2024-6232 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | python3-libs | python3-libs@3.10.11-7.ph4 | CVE-2025-4138 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | python3-libs | python3-libs@3.10.11-7.ph4 | CVE-2025-4330 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | python3-libs | python3-libs@3.10.11-7.ph4 | cve-2024-7592 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | usr/bin/vsphere-csi | golang.org/x/oauth2@v0.13.0 | CVE-2025-22868 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | usr/bin/vsphere-csi | google.golang.org/protobuf@v1.31.0 | CVE-2024-24786 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | usr/bin/vsphere-csi | k8s.io/kubernetes@v1.26.10 | CVE-2023-5528 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | usr/bin/vsphere-csi | k8s.io/kubernetes@v1.26.10 | CVE-2024-0793 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | usr/bin/vsphere-csi | k8s.io/kubernetes@v1.26.10 | CVE-2024-10220 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | usr/bin/vsphere-csi | k8s.io/kubernetes@v1.26.10 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | usr/bin/vsphere-csi | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | usr/bin/vsphere-csi | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | usr/bin/vsphere-csi | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher head | usr/bin/vsphere-csi | stdlib@v1.21.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | curl | curl@8.7.1-1.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | curl-libs | curl-libs@8.7.1-1.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | expat | expat@2.4.9-2.ph4 | CVE-2024-45491 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | expat | expat@2.4.9-2.ph4 | CVE-2024-45492 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | expat | expat@2.4.9-2.ph4 | CVE-2024-45490 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | expat | expat@2.4.9-2.ph4 | CVE-2024-8176 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | expat-libs | expat-libs@2.4.9-2.ph4 | CVE-2024-45491 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | expat-libs | expat-libs@2.4.9-2.ph4 | CVE-2024-45492 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | expat-libs | expat-libs@2.4.9-2.ph4 | CVE-2024-45490 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | expat-libs | expat-libs@2.4.9-2.ph4 | CVE-2024-8176 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | glib | glib@2.68.4-2.ph4 | CVE-2024-52533 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | glibc | glibc@2.32-19.ph4 | CVE-2025-4802 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | glibc-iconv | glibc-iconv@2.32-19.ph4 | CVE-2025-4802 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | gnutls | gnutls@3.7.10-3.ph4 | CVE-2025-32990 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | krb5 | krb5@1.17-11.ph4 | CVE-2024-3596 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | krb5 | krb5@1.17-11.ph4 | CVE-2024-37371 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | krb5 | krb5@1.17-11.ph4 | CVE-2024-37370 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | libarchive | libarchive@3.4.3-10.ph4 | CVE-2025-25724 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | libarchive | libarchive@3.4.3-10.ph4 | CVE-2025-5914 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | libxml2 | libxml2@2.9.12-14.ph4 | CVE-2025-49794 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | libxml2 | libxml2@2.9.12-14.ph4 | CVE-2025-49796 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | libxml2 | libxml2@2.9.12-14.ph4 | CVE-2022-49043 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | libxml2 | libxml2@2.9.12-14.ph4 | CVE-2024-56171 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | libxml2 | libxml2@2.9.12-14.ph4 | CVE-2025-24928 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | libxml2 | libxml2@2.9.12-14.ph4 | CVE-2025-27113 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | libxml2 | libxml2@2.9.12-14.ph4 | CVE-2025-32414 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | libxml2 | libxml2@2.9.12-14.ph4 | CVE-2025-32415 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | libxml2 | libxml2@2.9.12-14.ph4 | CVE-2025-6021 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | nss-libs | nss-libs@3.72-5.ph4 | CVE-2024-0743 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | openssl | openssl@3.0.14-2.ph4 | CVE-2024-6119 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | python3 | python3@3.10.11-8.ph4 | CVE-2025-4517 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | python3 | python3@3.10.11-8.ph4 | CVE-2023-6597 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | python3 | python3@3.10.11-8.ph4 | CVE-2024-6232 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | python3 | python3@3.10.11-8.ph4 | CVE-2025-4138 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | python3 | python3@3.10.11-8.ph4 | CVE-2025-4330 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | python3 | python3@3.10.11-8.ph4 | cve-2024-7592 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | python3-libs | python3-libs@3.10.11-8.ph4 | CVE-2025-4517 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | python3-libs | python3-libs@3.10.11-8.ph4 | CVE-2023-6597 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | python3-libs | python3-libs@3.10.11-8.ph4 | CVE-2024-6232 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | python3-libs | python3-libs@3.10.11-8.ph4 | CVE-2025-4138 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | python3-libs | python3-libs@3.10.11-8.ph4 | CVE-2025-4330 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | python3-libs | python3-libs@3.10.11-8.ph4 | cve-2024-7592 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | usr/bin/vsphere-csi | golang.org/x/oauth2@v0.13.0 | CVE-2025-22868 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | usr/bin/vsphere-csi | k8s.io/kubernetes@v1.27.10 | CVE-2024-10220 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | usr/bin/vsphere-csi | k8s.io/kubernetes@v1.27.10 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | usr/bin/vsphere-csi | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher head | usr/bin/vsphere-csi | stdlib@v1.21.12 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | curl | curl@8.1.2-7.ph4 | CVE-2024-2398 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | curl | curl@8.1.2-7.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | curl-libs | curl-libs@8.1.2-7.ph4 | CVE-2024-2398 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | curl-libs | curl-libs@8.1.2-7.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-45491 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-45492 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2023-52425 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-28757 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-45490 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-8176 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | glibc | glibc@2.32-15.ph4 | CVE-2024-2961 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | glibc | glibc@2.32-15.ph4 | CVE-2024-33599 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | glibc | glibc@2.32-15.ph4 | CVE-2024-33601 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | glibc | glibc@2.32-15.ph4 | CVE-2024-33602 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | glibc | glibc@2.32-15.ph4 | CVE-2025-4802 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | krb5 | krb5@1.17-10.ph4 | CVE-2024-3596 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | krb5 | krb5@1.17-10.ph4 | CVE-2024-37371 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | krb5 | krb5@1.17-10.ph4 | CVE-2024-26461 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | krb5 | krb5@1.17-10.ph4 | CVE-2024-37370 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2025-49794 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2025-49796 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2022-49043 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2024-34459 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2024-56171 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2025-24928 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2025-27113 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2025-32414 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2025-32415 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2025-6021 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | nss-libs | nss-libs@3.72-4.ph4 | CVE-2024-0743 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | openssl | openssl@3.0.13-2.ph4 | CVE-2024-5535 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | openssl | openssl@3.0.13-2.ph4 | CVE-2024-4741 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | openssl | openssl@3.0.13-2.ph4 | CVE-2024-6119 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | usr/bin/vsphere-syncer | golang.org/x/oauth2@v0.13.0 | CVE-2025-22868 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | usr/bin/vsphere-syncer | google.golang.org/protobuf@v1.31.0 | CVE-2024-24786 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | usr/bin/vsphere-syncer | k8s.io/kubernetes@v1.26.10 | CVE-2023-5528 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | usr/bin/vsphere-syncer | k8s.io/kubernetes@v1.26.10 | CVE-2024-0793 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | usr/bin/vsphere-syncer | k8s.io/kubernetes@v1.26.10 | CVE-2024-10220 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | usr/bin/vsphere-syncer | k8s.io/kubernetes@v1.26.10 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | usr/bin/vsphere-syncer | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | usr/bin/vsphere-syncer | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | usr/bin/vsphere-syncer | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher head | usr/bin/vsphere-syncer | stdlib@v1.21.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | curl | curl@8.7.1-1.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | curl-libs | curl-libs@8.7.1-1.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | expat-libs | expat-libs@2.4.9-2.ph4 | CVE-2024-45491 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | expat-libs | expat-libs@2.4.9-2.ph4 | CVE-2024-45492 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | expat-libs | expat-libs@2.4.9-2.ph4 | CVE-2024-45490 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | expat-libs | expat-libs@2.4.9-2.ph4 | CVE-2024-8176 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | glibc | glibc@2.32-19.ph4 | CVE-2025-4802 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | krb5 | krb5@1.17-11.ph4 | CVE-2024-3596 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | krb5 | krb5@1.17-11.ph4 | CVE-2024-37371 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | krb5 | krb5@1.17-11.ph4 | CVE-2024-37370 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | libxml2 | libxml2@2.9.12-14.ph4 | CVE-2025-49794 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | libxml2 | libxml2@2.9.12-14.ph4 | CVE-2025-49796 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | libxml2 | libxml2@2.9.12-14.ph4 | CVE-2022-49043 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | libxml2 | libxml2@2.9.12-14.ph4 | CVE-2024-56171 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | libxml2 | libxml2@2.9.12-14.ph4 | CVE-2025-24928 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | libxml2 | libxml2@2.9.12-14.ph4 | CVE-2025-27113 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | libxml2 | libxml2@2.9.12-14.ph4 | CVE-2025-32414 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | libxml2 | libxml2@2.9.12-14.ph4 | CVE-2025-32415 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | libxml2 | libxml2@2.9.12-14.ph4 | CVE-2025-6021 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | nss-libs | nss-libs@3.72-5.ph4 | CVE-2024-0743 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | openssl | openssl@3.0.14-2.ph4 | CVE-2024-6119 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | usr/bin/vsphere-syncer | golang.org/x/oauth2@v0.13.0 | CVE-2025-22868 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | usr/bin/vsphere-syncer | k8s.io/kubernetes@v1.27.10 | CVE-2024-10220 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | usr/bin/vsphere-syncer | k8s.io/kubernetes@v1.27.10 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | usr/bin/vsphere-syncer | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher head | usr/bin/vsphere-syncer | stdlib@v1.21.12 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.31.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | github.com/golang-jwt/jwt/v4@v4.5.0 | CVE-2025-30204 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.31.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.31.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.24.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.31.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/oauth2@v0.21.0 | CVE-2025-22868 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.31.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.22.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.31.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.22.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.31.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | github.com/golang-jwt/jwt/v4@v4.5.0 | CVE-2025-30204 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.31.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.31.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.24.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.31.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/oauth2@v0.21.0 | CVE-2025-22868 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.31.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.22.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.32.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | github.com/golang-jwt/jwt/v4@v4.5.0 | CVE-2025-30204 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.32.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.30.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.32.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.30.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.32.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/oauth2@v0.23.0 | CVE-2025-22868 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.32.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.23.0 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.32.1 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.23.0 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.32.2 | true | Rancher head | bin/vsphere-cloud-controller-manager | github.com/golang-jwt/jwt/v4@v4.5.1 | CVE-2025-30204 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.32.2 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.31.0 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.32.2 | true | Rancher head | bin/vsphere-cloud-controller-manager | golang.org/x/oauth2@v0.23.0 | CVE-2025-22868 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.32.2 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.23.0 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.32.2 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.23.0 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.33.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.24.0 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.33.0 | true | Rancher head | bin/vsphere-cloud-controller-manager | stdlib@v1.24.0 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.12.0 | true | Rancher head | coredns | github.com/expr-lang/expr@v1.16.9 | CVE-2025-29786 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.12.0 | true | Rancher head | coredns | stdlib@v1.23.3 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.12.1 | true | Rancher head | coredns | github.com/coredns/coredns@v0.0.0-20250331195236-707c7c10acd5 | CVE-2023-28452 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.12.1 | true | Rancher head | coredns | github.com/coredns/coredns@v0.0.0-20250331195236-707c7c10acd5 | CVE-2025-47950 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.12.1 | true | Rancher head | coredns | stdlib@v1.24.1 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.12.1 | true | Rancher head | coredns | stdlib@v1.24.1 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v1.6.0 | true | Rancher head | kube-webhook-certgen | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.8.7 | true | Rancher head | libcrypto3 | libcrypto3@3.3.2-r1 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.8.7 | true | Rancher head | libssl3 | libssl3@3.3.2-r1 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.8.7 | true | Rancher head | kube-vip | github.com/osrg/gobgp/v3@v3.27.0 | CVE-2025-43971 | HIGH | affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.8.7 | true | Rancher head | kube-vip | stdlib@v1.23.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-library-traefik:2.11.10 | true | Rancher head | libcrypto3 | libcrypto3@3.3.2-r0 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-library-traefik:2.11.10 | true | Rancher head | libssl3 | libssl3@3.3.2-r0 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-library-traefik:2.11.10 | true | Rancher head | usr/local/bin/traefik | stdlib@v1.23.1 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-library-traefik:2.11.18 | true | Rancher head | libcrypto3 | libcrypto3@3.3.2-r4 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-library-traefik:2.11.18 | true | Rancher head | libssl3 | libssl3@3.3.2-r4 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-library-traefik:2.11.18 | true | Rancher head | usr/local/bin/traefik | stdlib@v1.23.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-library-traefik:2.11.20 | true | Rancher head | usr/local/bin/traefik | stdlib@v1.23.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-library-traefik:2.11.24 | true | Rancher head | usr/local/bin/traefik | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-library-traefik:3.3.6 | true | Rancher head | usr/local/bin/traefik | stdlib@v1.23.8 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | github.com/prometheus/client_golang@v1.9.0 | CVE-2022-21698 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | golang.org/x/net@v0.0.0-20210410081132-afb366fc7cd1 | CVE-2021-33194 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | golang.org/x/net@v0.0.0-20210410081132-afb366fc7cd1 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | golang.org/x/net@v0.0.0-20210410081132-afb366fc7cd1 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | golang.org/x/net@v0.0.0-20210410081132-afb366fc7cd1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | golang.org/x/net@v0.0.0-20210410081132-afb366fc7cd1 | CVE-2022-41717 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | golang.org/x/net@v0.0.0-20210410081132-afb366fc7cd1 | CVE-2023-44487 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | golang.org/x/oauth2@v0.0.0-20210313182246-cd4f82c27b84 | CVE-2025-22868 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | golang.org/x/text@v0.3.6 | CVE-2021-38561 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | golang.org/x/text@v0.3.6 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | google.golang.org/grpc@v1.36.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | google.golang.org/protobuf@v1.26.0 | CVE-2024-24786 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | gopkg.in/yaml.v3@v3.0.0-20210107192922-496545a6307b | CVE-2022-28948 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2021-27918 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2021-33195 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2021-33196 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2021-33198 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2021-39293 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2021-33197 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2022-41717 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-24532 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-29409 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-39326 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-45289 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2023-45290 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2024-24783 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2024-24784 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher head | csi-attacher | stdlib@v1.16 | CVE-2024-24785 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | github.com/prometheus/client_golang@v1.11.0 | CVE-2022-21698 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | golang.org/x/net@v0.0.0-20210520170846-37e1c6afe023 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | golang.org/x/net@v0.0.0-20210520170846-37e1c6afe023 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | golang.org/x/net@v0.0.0-20210520170846-37e1c6afe023 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | golang.org/x/net@v0.0.0-20210520170846-37e1c6afe023 | CVE-2022-41717 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | golang.org/x/net@v0.0.0-20210520170846-37e1c6afe023 | CVE-2023-44487 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | golang.org/x/text@v0.3.6 | CVE-2021-38561 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | golang.org/x/text@v0.3.6 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | google.golang.org/grpc@v1.38.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | google.golang.org/protobuf@v1.26.0 | CVE-2024-24786 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-33195 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-33196 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-33198 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-39293 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-33197 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41717 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-24532 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-29409 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-39326 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-45289 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-45290 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2024-24783 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2024-24784 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2024-24785 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | github.com/gogo/protobuf@v1.3.1 | CVE-2021-3121 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | github.com/prometheus/client_golang@v1.8.0 | CVE-2022-21698 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | golang.org/x/crypto@v0.0.0-20201208171446-5f87f3452ae9 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | golang.org/x/crypto@v0.0.0-20201208171446-5f87f3452ae9 | CVE-2020-29652 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | golang.org/x/crypto@v0.0.0-20201208171446-5f87f3452ae9 | CVE-2021-43565 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | golang.org/x/crypto@v0.0.0-20201208171446-5f87f3452ae9 | CVE-2022-27191 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | golang.org/x/crypto@v0.0.0-20201208171446-5f87f3452ae9 | CVE-2025-22869 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | golang.org/x/net@v0.0.0-20201209123823-ac852fbbde11 | CVE-2021-33194 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | golang.org/x/net@v0.0.0-20201209123823-ac852fbbde11 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | golang.org/x/net@v0.0.0-20201209123823-ac852fbbde11 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | golang.org/x/net@v0.0.0-20201209123823-ac852fbbde11 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | golang.org/x/net@v0.0.0-20201209123823-ac852fbbde11 | CVE-2022-41717 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | golang.org/x/net@v0.0.0-20201209123823-ac852fbbde11 | CVE-2023-44487 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | golang.org/x/oauth2@v0.0.0-20201208152858-08078c50e5b5 | CVE-2025-22868 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | golang.org/x/text@v0.3.4 | CVE-2021-38561 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | golang.org/x/text@v0.3.4 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | google.golang.org/grpc@v1.34.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | google.golang.org/protobuf@v1.25.0 | CVE-2024-24786 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | gopkg.in/yaml.v3@v3.0.0-20200615113413-eeeca48fe776 | CVE-2022-28948 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2020-28362 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2021-27918 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2021-33195 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2021-33196 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2021-33198 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2021-39293 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2021-33197 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2022-41717 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-24532 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-29409 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-39326 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-45289 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2023-45290 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2024-24783 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2024-24784 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher head | csi-provisioner | stdlib@v1.15 | CVE-2024-24785 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | github.com/prometheus/client_golang@v1.9.0 | CVE-2022-21698 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | golang.org/x/net@v0.0.0-20210316092652-d523dce5a7f4 | CVE-2021-33194 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | golang.org/x/net@v0.0.0-20210316092652-d523dce5a7f4 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | golang.org/x/net@v0.0.0-20210316092652-d523dce5a7f4 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | golang.org/x/net@v0.0.0-20210316092652-d523dce5a7f4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | golang.org/x/net@v0.0.0-20210316092652-d523dce5a7f4 | CVE-2022-41717 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | golang.org/x/net@v0.0.0-20210316092652-d523dce5a7f4 | CVE-2023-44487 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | golang.org/x/oauth2@v0.0.0-20210313182246-cd4f82c27b84 | CVE-2025-22868 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | golang.org/x/text@v0.3.5 | CVE-2021-38561 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | golang.org/x/text@v0.3.5 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | google.golang.org/grpc@v1.36.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | google.golang.org/protobuf@v1.26.0 | CVE-2024-24786 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | gopkg.in/yaml.v3@v3.0.0-20210107192922-496545a6307b | CVE-2022-28948 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2021-27918 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2021-33195 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2021-33196 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2021-33198 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2021-39293 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2021-33197 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2022-41717 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-24532 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-29409 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-39326 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-45289 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2023-45290 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2024-24783 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2024-24784 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher head | csi-resizer | stdlib@v1.16 | CVE-2024-24785 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.7.2 | true | Rancher head | metrics-server | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.7.2 | true | Rancher head | metrics-server | stdlib@v1.22.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-attacher:v4.5.0 | true | Rancher head | csi-attacher | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.44.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-attacher:v4.5.0 | true | Rancher head | csi-attacher | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-attacher:v4.5.0 | true | Rancher head | csi-attacher | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-attacher:v4.5.0 | true | Rancher head | csi-attacher | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-attacher:v4.5.0 | true | Rancher head | csi-attacher | stdlib@v1.21.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-attacher:v4.5.0 | true | Rancher head | csi-attacher | stdlib@v1.21.5 | CVE-2023-45289 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-attacher:v4.5.0 | true | Rancher head | csi-attacher | stdlib@v1.21.5 | CVE-2023-45290 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-attacher:v4.5.0 | true | Rancher head | csi-attacher | stdlib@v1.21.5 | CVE-2024-24783 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-attacher:v4.5.0 | true | Rancher head | csi-attacher | stdlib@v1.21.5 | CVE-2024-24784 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-attacher:v4.5.0 | true | Rancher head | csi-attacher | stdlib@v1.21.5 | CVE-2024-24785 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-attacher:v4.7.0 | true | Rancher head | csi-attacher | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-attacher:v4.7.0 | true | Rancher head | csi-attacher | stdlib@v1.22.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.10.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.10.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.10.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.10.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.21.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.10.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.21.5 | CVE-2023-45289 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.10.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.21.5 | CVE-2023-45290 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.10.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.21.5 | CVE-2024-24783 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.10.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.21.5 | CVE-2024-24784 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.10.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.21.5 | CVE-2024-24785 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.12.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.12.0 | true | Rancher head | csi-node-driver-registrar | stdlib@v1.22.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.0 | true | Rancher head | csi-provisioner | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.0 | true | Rancher head | csi-provisioner | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.0 | true | Rancher head | csi-provisioner | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.0 | true | Rancher head | csi-provisioner | stdlib@v1.21.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.0 | true | Rancher head | csi-provisioner | stdlib@v1.21.5 | CVE-2023-45289 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.0 | true | Rancher head | csi-provisioner | stdlib@v1.21.5 | CVE-2023-45290 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.0 | true | Rancher head | csi-provisioner | stdlib@v1.21.5 | CVE-2024-24783 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.0 | true | Rancher head | csi-provisioner | stdlib@v1.21.5 | CVE-2024-24784 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.0 | true | Rancher head | csi-provisioner | stdlib@v1.21.5 | CVE-2024-24785 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.1 | true | Rancher head | csi-provisioner | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.1 | true | Rancher head | csi-provisioner | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.1 | true | Rancher head | csi-provisioner | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.1 | true | Rancher head | csi-provisioner | stdlib@v1.21.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.1 | true | Rancher head | csi-provisioner | stdlib@v1.21.5 | CVE-2023-45289 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.1 | true | Rancher head | csi-provisioner | stdlib@v1.21.5 | CVE-2023-45290 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.1 | true | Rancher head | csi-provisioner | stdlib@v1.21.5 | CVE-2024-24783 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.1 | true | Rancher head | csi-provisioner | stdlib@v1.21.5 | CVE-2024-24784 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.1 | true | Rancher head | csi-provisioner | stdlib@v1.21.5 | CVE-2024-24785 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.0 | true | Rancher head | csi-resizer | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.44.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.0 | true | Rancher head | csi-resizer | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.0 | true | Rancher head | csi-resizer | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.0 | true | Rancher head | csi-resizer | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.0 | true | Rancher head | csi-resizer | stdlib@v1.21.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.0 | true | Rancher head | csi-resizer | stdlib@v1.21.5 | CVE-2023-45289 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.0 | true | Rancher head | csi-resizer | stdlib@v1.21.5 | CVE-2023-45290 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.0 | true | Rancher head | csi-resizer | stdlib@v1.21.5 | CVE-2024-24783 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.0 | true | Rancher head | csi-resizer | stdlib@v1.21.5 | CVE-2024-24784 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.0 | true | Rancher head | csi-resizer | stdlib@v1.21.5 | CVE-2024-24785 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.1 | true | Rancher head | csi-resizer | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.44.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.1 | true | Rancher head | csi-resizer | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.1 | true | Rancher head | csi-resizer | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.1 | true | Rancher head | csi-resizer | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.1 | true | Rancher head | csi-resizer | stdlib@v1.21.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.1 | true | Rancher head | csi-resizer | stdlib@v1.21.5 | CVE-2023-45289 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.1 | true | Rancher head | csi-resizer | stdlib@v1.21.5 | CVE-2023-45290 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.1 | true | Rancher head | csi-resizer | stdlib@v1.21.5 | CVE-2024-24783 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.1 | true | Rancher head | csi-resizer | stdlib@v1.21.5 | CVE-2024-24784 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.1 | true | Rancher head | csi-resizer | stdlib@v1.21.5 | CVE-2024-24785 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.1 | true | Rancher head | csi-snapshotter | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.1 | true | Rancher head | csi-snapshotter | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.1 | true | Rancher head | csi-snapshotter | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.1 | true | Rancher head | csi-snapshotter | stdlib@v1.21.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.1 | true | Rancher head | csi-snapshotter | stdlib@v1.21.5 | CVE-2023-45289 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.1 | true | Rancher head | csi-snapshotter | stdlib@v1.21.5 | CVE-2023-45290 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.1 | true | Rancher head | csi-snapshotter | stdlib@v1.21.5 | CVE-2024-24783 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.1 | true | Rancher head | csi-snapshotter | stdlib@v1.21.5 | CVE-2024-24784 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.1 | true | Rancher head | csi-snapshotter | stdlib@v1.21.5 | CVE-2024-24785 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.2 | true | Rancher head | csi-snapshotter | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.2 | true | Rancher head | csi-snapshotter | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.2 | true | Rancher head | csi-snapshotter | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.2 | true | Rancher head | csi-snapshotter | stdlib@v1.21.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.2 | true | Rancher head | csi-snapshotter | stdlib@v1.21.5 | CVE-2023-45289 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.2 | true | Rancher head | csi-snapshotter | stdlib@v1.21.5 | CVE-2023-45290 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.2 | true | Rancher head | csi-snapshotter | stdlib@v1.21.5 | CVE-2024-24783 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.2 | true | Rancher head | csi-snapshotter | stdlib@v1.21.5 | CVE-2024-24784 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.2 | true | Rancher head | csi-snapshotter | stdlib@v1.21.5 | CVE-2024-24785 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.12.0 | true | Rancher head | livenessprobe | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.12.0 | true | Rancher head | livenessprobe | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.12.0 | true | Rancher head | livenessprobe | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.12.0 | true | Rancher head | livenessprobe | stdlib@v1.21.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.12.0 | true | Rancher head | livenessprobe | stdlib@v1.21.5 | CVE-2023-45289 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.12.0 | true | Rancher head | livenessprobe | stdlib@v1.21.5 | CVE-2023-45290 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.12.0 | true | Rancher head | livenessprobe | stdlib@v1.21.5 | CVE-2024-24783 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.12.0 | true | Rancher head | livenessprobe | stdlib@v1.21.5 | CVE-2024-24784 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.12.0 | true | Rancher head | livenessprobe | stdlib@v1.21.5 | CVE-2024-24785 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.14.0 | true | Rancher head | livenessprobe | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.14.0 | true | Rancher head | livenessprobe | stdlib@v1.22.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v8.2.0 | true | Rancher head | snapshot-controller | stdlib@v1.23.1 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/nginx-ingress-controller:v1.12.4-hardened2 | false | Rancher head | dbg | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/nginx-ingress-controller:v1.12.4-hardened2 | false | Rancher head | nginx-ingress-controller | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/nginx-ingress-controller:v1.12.4-hardened2 | false | Rancher head | wait-shutdown | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher-agent:head | false | Rancher head | usr/bin/agent | github.com/golang-jwt/jwt@v3.2.1+incompatible | CVE-2025-30204 | HIGH | affected | gobinary | |
rancher/rancher-agent:head | false | Rancher head | usr/bin/kubectl | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/rancher-agent:head | false | Rancher head | usr/bin/kubectl | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:head | false | Rancher head | opt/drivers/management-state/bin/docker-machine-driver-harvester | github.com/moby/moby@v1.4.2-0.20170731201646-1009e6a40b29 | CVE-2021-21284 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:head | false | Rancher head | opt/drivers/management-state/bin/docker-machine-driver-harvester | stdlib@v1.23.6 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:head | false | Rancher head | opt/drivers/management-state/bin/docker-machine-driver-linode | stdlib@v1.24.1 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/rancher:head | false | Rancher head | opt/drivers/management-state/bin/docker-machine-driver-linode | stdlib@v1.24.1 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:head | false | Rancher head | usr/bin/bandwidth | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/rancher:head | false | Rancher head | usr/bin/bandwidth | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:head | false | Rancher head | usr/bin/cni | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/rancher:head | false | Rancher head | usr/bin/cni | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:head | false | Rancher head | usr/bin/containerd | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/rancher:head | false | Rancher head | usr/bin/containerd | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:head | false | Rancher head | usr/bin/containerd-shim-runc-v2 | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/rancher:head | false | Rancher head | usr/bin/containerd-shim-runc-v2 | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:head | false | Rancher head | usr/bin/etcdctl | stdlib@v1.23.7 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:head | false | Rancher head | usr/bin/firewall | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/rancher:head | false | Rancher head | usr/bin/firewall | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:head | false | Rancher head | usr/bin/k3s | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/rancher:head | false | Rancher head | usr/bin/k3s | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:head | false | Rancher head | usr/bin/rancher | github.com/golang-jwt/jwt@v3.2.1+incompatible | CVE-2025-30204 | HIGH | affected | gobinary | |
rancher/rancher:head | false | Rancher head | usr/bin/rancher-machine | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/rancher:head | false | Rancher head | usr/bin/rancher-machine | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:head | false | Rancher head | usr/bin/runc | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/rancher:head | false | Rancher head | usr/bin/runc | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:head | false | Rancher head | usr/share/rancher/ui/assets/wins.exe | stdlib@v1.24.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/remotedialer-proxy:v0.5.0 | false | Rancher head | proxy | stdlib@v1.24.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-cloud-provider:v1.30.13-rc1.0.20250516172343-e77f78ee9466-build20250613 | false | Rancher head | usr/local/bin/rke2-cloud-provider | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-cloud-provider:v1.30.6-0.20241016053533-5ec454f50e7a-build20241016 | false | Rancher head | usr/local/bin/rke2-cloud-provider | stdlib@v1.22.7 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-cloud-provider:v1.31.2-0.20241016053446-0955fa330f90-build20241016 | false | Rancher head | usr/local/bin/rke2-cloud-provider | stdlib@v1.22.7 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-cloud-provider:v1.31.9-rc1.0.20250516171836-812206503b28-build20250612 | false | Rancher head | usr/local/bin/rke2-cloud-provider | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-cloud-provider:v1.32.0-rc3.0.20241220224140-68fbd1a6b543-build20250101 | false | Rancher head | usr/local/bin/rke2-cloud-provider | golang.org/x/oauth2@v0.23.0 | CVE-2025-22868 | HIGH | affected | gobinary | |
rancher/rke2-cloud-provider:v1.32.0-rc3.0.20241220224140-68fbd1a6b543-build20250101 | false | Rancher head | usr/local/bin/rke2-cloud-provider | stdlib@v1.23.3 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-cloud-provider:v1.32.5-rc1.0.20250516182639-8e8f2a4726fd-build20250612 | false | Rancher head | usr/local/bin/rke2-cloud-provider | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-cloud-provider:v1.33.0-rc1.0.20250430074337-dc03cb4b3faa-build20250430 | false | Rancher head | usr/local/bin/rke2-cloud-provider | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/rke2-cloud-provider:v1.33.0-rc1.0.20250430074337-dc03cb4b3faa-build20250430 | false | Rancher head | usr/local/bin/rke2-cloud-provider | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-cloud-provider:v1.33.1-0.20250516163953-99d91538b132-build20250612 | false | Rancher head | usr/local/bin/rke2-cloud-provider | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.30.14-rke2r1 | false | Rancher head | bin/containerd | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.30.14-rke2r1 | false | Rancher head | bin/containerd-shim-runc-v2 | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.30.14-rke2r1 | false | Rancher head | bin/crictl | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.30.14-rke2r1 | false | Rancher head | bin/ctr | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.30.14-rke2r1 | false | Rancher head | bin/kubectl | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.30.14-rke2r1 | false | Rancher head | bin/kubelet | github.com/opencontainers/runc@v1.1.12 | CVE-2024-45310 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.30.14-rke2r1 | false | Rancher head | bin/kubelet | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.30.14-rke2r1 | false | Rancher head | bin/runc | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.31.11-rke2r1 | false | Rancher head | bin/containerd | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.31.11-rke2r1 | false | Rancher head | bin/containerd-shim-runc-v2 | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.31.11-rke2r1 | false | Rancher head | bin/crictl | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.31.11-rke2r1 | false | Rancher head | bin/ctr | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.31.11-rke2r1 | false | Rancher head | bin/kubectl | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.31.11-rke2r1 | false | Rancher head | bin/kubelet | github.com/opencontainers/runc@v1.1.13 | CVE-2024-45310 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.31.11-rke2r1 | false | Rancher head | bin/kubelet | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.31.11-rke2r1 | false | Rancher head | bin/runc | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.32.7-rke2r1 | false | Rancher head | bin/containerd | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.32.7-rke2r1 | false | Rancher head | bin/containerd-shim-runc-v2 | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.32.7-rke2r1 | false | Rancher head | bin/crictl | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.32.7-rke2r1 | false | Rancher head | bin/ctr | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.32.7-rke2r1 | false | Rancher head | bin/kubectl | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.32.7-rke2r1 | false | Rancher head | bin/kubelet | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.32.7-rke2r1 | false | Rancher head | bin/runc | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.33.3-rke2r1 | false | Rancher head | bin/containerd | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.33.3-rke2r1 | false | Rancher head | bin/containerd-shim-runc-v2 | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.33.3-rke2r1 | false | Rancher head | bin/crictl | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.33.3-rke2r1 | false | Rancher head | bin/ctr | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.33.3-rke2r1 | false | Rancher head | bin/kubectl | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.33.3-rke2r1 | false | Rancher head | bin/kubelet | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.33.3-rke2r1 | false | Rancher head | bin/runc | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-upgrade:v1.30.14-rke2r1 | false | Rancher head | opt/rke2 | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-upgrade:v1.30.14-rke2r1 | false | Rancher head | usr/local/bin/kubectl | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-upgrade:v1.31.11-rke2r1 | false | Rancher head | opt/rke2 | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-upgrade:v1.31.11-rke2r1 | false | Rancher head | usr/local/bin/kubectl | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-upgrade:v1.32.7-rke2r1 | false | Rancher head | opt/rke2 | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-upgrade:v1.32.7-rke2r1 | false | Rancher head | usr/local/bin/kubectl | stdlib@v1.23.10 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-upgrade:v1.33.3-rke2r1 | false | Rancher head | opt/rke2 | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-upgrade:v1.33.3-rke2r1 | false | Rancher head | usr/local/bin/kubectl | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.5.0 | false | Rancher head | usr/local/bin/helm | stdlib@v1.24.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.5.0 | false | Rancher head | usr/local/bin/k9s | github.com/hashicorp/go-getter@v1.7.8 | CVE-2025-8959 | HIGH | affected | gobinary | |
rancher/shell:v0.5.0 | false | Rancher head | usr/local/bin/k9s | stdlib@v1.24.4 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.5.0 | false | Rancher head | usr/local/bin/kubectl | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/shell:v0.5.0 | false | Rancher head | usr/local/bin/kubectl | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.5.0 | false | Rancher head | usr/local/bin/kustomize | stdlib@v1.22.7 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-agent:v0.3.13-suc | false | Rancher head | opt/rancher-system-agent-suc/rancher-system-agent | stdlib@v1.24.5 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-agent:v0.3.13-suc | false | Rancher head | usr/bin/kubectl | stdlib@v1.24.2 | CVE-2025-22874 | HIGH | affected | gobinary | |
rancher/system-agent:v0.3.13-suc | false | Rancher head | usr/bin/kubectl | stdlib@v1.24.2 | CVE-2025-47907 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/ui-plugin-catalog:4.0.2 | false | Rancher head | glibc | glibc@2.31-150300.89.2 | SUSE-SU-2025:01784-1 | HIGH | affected | sles | |
rancher/ui-plugin-catalog:4.0.2 | false | Rancher head | libsqlite3-0 | libsqlite3-0@3.44.0-150000.3.23.1 | SUSE-SU-2025:01456-2 | HIGH | affected | sles | |
rancher/ui-plugin-catalog:4.0.2 | false | Rancher head | libsqlite3-0 | libsqlite3-0@3.44.0-150000.3.23.1 | SUSE-SU-2025:02672-1 | HIGH | affected | sles | |
rancher/ui-plugin-catalog:4.0.2 | false | Rancher head | libssh-config | libssh-config@0.9.8-150400.3.6.1 | SUSE-SU-2025:02278-1 | HIGH | affected | sles | |
rancher/ui-plugin-catalog:4.0.2 | false | Rancher head | libssh4 | libssh4@0.9.8-150400.3.6.1 | SUSE-SU-2025:02278-1 | HIGH | affected | sles | |
rancher/ui-plugin-catalog:4.0.2 | false | Rancher head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/ui-plugin-catalog:4.0.2 | false | Rancher head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/ui-plugin-catalog:4.0.2 | false | Rancher head | libtiff5 | libtiff5@4.0.9-150000.45.47.1 | SUSE-SU-2025:02815-1 | HIGH | affected | sles | |
rancher/ui-plugin-catalog:4.0.2 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:02314-1 | HIGH | affected | sles | |
rancher/ui-plugin-catalog:4.0.2 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:02758-1 | HIGH | affected | sles | |
rancher/ui-plugin-catalog:4.0.2 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/ui-plugin-catalog:4.0.2 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/ui-plugin-catalog:4.0.2 | false | Rancher head | pam | pam@1.3.0-150000.6.71.2 | SUSE-SU-2025:02013-1 | HIGH | affected | sles | |
rancher/hardened-addon-resizer:1.8.22-build20250110 | false | Rancher head | pod_nanny | golang.org/x/net@v0.23.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-addon-resizer:1.8.22-build20250110 | false | Rancher head | pod_nanny | golang.org/x/net@v0.23.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-addon-resizer:1.8.22-build20250110 | false | Rancher head | pod_nanny | golang.org/x/oauth2@v0.18.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-addon-resizer:1.8.23-build20250507 | false | Rancher head | pod_nanny | golang.org/x/net@v0.33.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-addon-resizer:1.8.23-build20250507 | false | Rancher head | pod_nanny | golang.org/x/net@v0.33.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-addon-resizer:1.8.23-build20250507 | false | Rancher head | pod_nanny | golang.org/x/oauth2@v0.24.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-addon-resizer:1.8.23-build20250612 | false | Rancher head | pod_nanny | golang.org/x/net@v0.33.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-addon-resizer:1.8.23-build20250612 | false | Rancher head | pod_nanny | golang.org/x/net@v0.33.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-addon-resizer:1.8.23-build20250612 | false | Rancher head | pod_nanny | golang.org/x/oauth2@v0.24.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | boost-license1_66_0 | boost-license1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | glibc | glibc@2.38-150600.14.17.2 | SUSE-SU-2025:01702-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | libboost_system1_66_0 | libboost_system1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | libboost_thread1_66_0 | libboost_thread1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | libsqlite3-0 | libsqlite3-0@3.44.0-150000.3.23.1 | SUSE-SU-2025:02672-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | pam | pam@1.3.0-150000.6.71.2 | SUSE-SU-2025:02013-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | calicoctl | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | calicoctl | golang.org/x/crypto@v0.24.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | calicoctl | golang.org/x/net@v0.26.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | calicoctl | golang.org/x/net@v0.26.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | calicoctl | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/calico | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/calico | golang.org/x/crypto@v0.24.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/calico | golang.org/x/net@v0.26.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/calico | golang.org/x/net@v0.26.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/calico | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.24.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/calico-ipam | golang.org/x/net@v0.26.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/calico-ipam | golang.org/x/net@v0.26.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/calico-ipam | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/dhcp | golang.org/x/net@v0.30.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/dhcp | golang.org/x/net@v0.30.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/install | golang.org/x/net@v0.26.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/install | golang.org/x/net@v0.26.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | opt/cni/bin/install | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | usr/bin/calico-node | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | usr/bin/calico-node | golang.org/x/crypto@v0.24.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | usr/bin/calico-node | golang.org/x/net@v0.26.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | usr/bin/calico-node | golang.org/x/net@v0.26.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | usr/bin/calico-node | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | usr/bin/kube-controllers | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | usr/bin/kube-controllers | golang.org/x/crypto@v0.24.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | usr/bin/kube-controllers | golang.org/x/net@v0.26.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | usr/bin/kube-controllers | golang.org/x/net@v0.26.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher head | usr/bin/kube-controllers | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | boost-license1_66_0 | boost-license1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | glibc | glibc@2.38-150600.14.20.3 | SUSE-SU-2025:01702-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | libboost_system1_66_0 | libboost_system1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | libboost_thread1_66_0 | libboost_thread1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | libsqlite3-0 | libsqlite3-0@3.44.0-150000.3.23.1 | SUSE-SU-2025:02672-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | pam | pam@1.3.0-150000.6.71.2 | SUSE-SU-2025:02013-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | calicoctl | golang.org/x/crypto@v0.32.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | calicoctl | golang.org/x/net@v0.34.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | calicoctl | golang.org/x/net@v0.34.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | calicoctl | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | opt/cni/bin/calico | golang.org/x/crypto@v0.32.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | opt/cni/bin/calico | golang.org/x/net@v0.34.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | opt/cni/bin/calico | golang.org/x/net@v0.34.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | opt/cni/bin/calico | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.32.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | opt/cni/bin/calico-ipam | golang.org/x/net@v0.34.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | opt/cni/bin/calico-ipam | golang.org/x/net@v0.34.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | opt/cni/bin/calico-ipam | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | opt/cni/bin/dhcp | golang.org/x/net@v0.30.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | opt/cni/bin/dhcp | golang.org/x/net@v0.30.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | opt/cni/bin/install | golang.org/x/net@v0.34.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | opt/cni/bin/install | golang.org/x/net@v0.34.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | opt/cni/bin/install | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | usr/bin/calico-node | golang.org/x/crypto@v0.32.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | usr/bin/calico-node | golang.org/x/net@v0.34.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | usr/bin/calico-node | golang.org/x/net@v0.34.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | usr/bin/calico-node | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | usr/bin/kube-controllers | golang.org/x/crypto@v0.32.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | usr/bin/kube-controllers | golang.org/x/net@v0.34.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | usr/bin/kube-controllers | golang.org/x/net@v0.34.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250218 | false | Rancher head | usr/bin/kube-controllers | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | boost-license1_66_0 | boost-license1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | glibc | glibc@2.38-150600.14.23.1 | SUSE-SU-2025:01702-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | libboost_system1_66_0 | libboost_system1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | libboost_thread1_66_0 | libboost_thread1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | libsqlite3-0 | libsqlite3-0@3.44.0-150000.3.23.1 | SUSE-SU-2025:02672-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | pam | pam@1.3.0-150000.6.71.2 | SUSE-SU-2025:02013-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | calicoctl | golang.org/x/crypto@v0.32.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | calicoctl | golang.org/x/net@v0.34.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | calicoctl | golang.org/x/net@v0.34.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | calicoctl | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | opt/cni/bin/calico | golang.org/x/crypto@v0.32.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | opt/cni/bin/calico | golang.org/x/net@v0.34.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | opt/cni/bin/calico | golang.org/x/net@v0.34.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | opt/cni/bin/calico | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.32.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | opt/cni/bin/calico-ipam | golang.org/x/net@v0.34.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | opt/cni/bin/calico-ipam | golang.org/x/net@v0.34.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | opt/cni/bin/calico-ipam | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | opt/cni/bin/dhcp | golang.org/x/net@v0.30.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | opt/cni/bin/dhcp | golang.org/x/net@v0.30.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | opt/cni/bin/install | golang.org/x/net@v0.34.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | opt/cni/bin/install | golang.org/x/net@v0.34.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | opt/cni/bin/install | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | usr/bin/calico-node | golang.org/x/crypto@v0.32.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | usr/bin/calico-node | golang.org/x/net@v0.34.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | usr/bin/calico-node | golang.org/x/net@v0.34.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | usr/bin/calico-node | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | usr/bin/kube-controllers | golang.org/x/crypto@v0.32.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | usr/bin/kube-controllers | golang.org/x/net@v0.34.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | usr/bin/kube-controllers | golang.org/x/net@v0.34.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.2-build20250306 | false | Rancher head | usr/bin/kube-controllers | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | boost-license1_66_0 | boost-license1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | glibc | glibc@2.38-150600.14.29.1 | SUSE-SU-2025:01702-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | libboost_system1_66_0 | libboost_system1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | libboost_thread1_66_0 | libboost_thread1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | libsqlite3-0 | libsqlite3-0@3.49.1-150000.3.27.1 | SUSE-SU-2025:02672-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-calico:v3.30.0-build20250515 | false | Rancher head | pam | pam@1.3.0-150000.6.76.1 | SUSE-SU-2025:02013-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-calico:v3.30.2-build20250711 | false | Rancher head | boost-license1_66_0 | boost-license1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-calico:v3.30.2-build20250711 | false | Rancher head | libboost_system1_66_0 | libboost_system1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-calico:v3.30.2-build20250711 | false | Rancher head | libboost_thread1_66_0 | libboost_thread1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-calico:v3.30.2-build20250711 | false | Rancher head | libsqlite3-0 | libsqlite3-0@3.49.1-150000.3.27.1 | SUSE-SU-2025:02672-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-calico:v3.30.2-build20250711 | false | Rancher head | libxml2-2 | libxml2-2@2.12.10-150700.4.3.1 | SUSE-SU-2025:02617-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-cluster-autoscaler:v1.10.2-build20250611 | false | Rancher head | cluster-proportional-autoscaler | golang.org/x/net@v0.36.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-cluster-autoscaler:v1.10.2-build20250611 | false | Rancher head | cluster-proportional-autoscaler | golang.org/x/oauth2@v0.23.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-cluster-autoscaler:v1.9.0-build20241126 | false | Rancher head | cluster-proportional-autoscaler | golang.org/x/net@v0.26.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-cluster-autoscaler:v1.9.0-build20241126 | false | Rancher head | cluster-proportional-autoscaler | golang.org/x/net@v0.26.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-cluster-autoscaler:v1.9.0-build20241126 | false | Rancher head | cluster-proportional-autoscaler | golang.org/x/oauth2@v0.21.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-cni-plugins:v1.6.0-build20241022 | false | Rancher head | opt/cni/bin/dhcp | golang.org/x/net@v0.28.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-cni-plugins:v1.6.0-build20241022 | false | Rancher head | opt/cni/bin/dhcp | golang.org/x/net@v0.28.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-cni-plugins:v1.6.2-build20250124 | false | Rancher head | opt/cni/bin/dhcp | golang.org/x/net@v0.30.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-cni-plugins:v1.6.2-build20250124 | false | Rancher head | opt/cni/bin/dhcp | golang.org/x/net@v0.30.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-coredns:v1.12.0-build20241126 | false | Rancher head | glibc | glibc@2.38-150600.14.14.2 | SUSE-SU-2025:01702-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-coredns:v1.12.0-build20241126 | false | Rancher head | coredns | github.com/golang-jwt/jwt/v4@v4.5.1 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-coredns:v1.12.0-build20241126 | false | Rancher head | coredns | golang.org/x/crypto@v0.29.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-coredns:v1.12.0-build20241126 | false | Rancher head | coredns | golang.org/x/crypto@v0.29.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-coredns:v1.12.0-build20241126 | false | Rancher head | coredns | golang.org/x/net@v0.31.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-coredns:v1.12.0-build20241126 | false | Rancher head | coredns | golang.org/x/net@v0.31.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-coredns:v1.12.0-build20241126 | false | Rancher head | coredns | golang.org/x/oauth2@v0.24.0 | CVE-2025-22868 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-coredns:v1.12.1-build20250401 | false | Rancher head | glibc | glibc@2.38-150600.14.23.1 | SUSE-SU-2025:01702-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-coredns:v1.12.1-build20250401 | false | Rancher head | coredns | golang.org/x/net@v0.37.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-coredns:v1.12.1-build20250507 | false | Rancher head | glibc | glibc@2.38-150600.14.29.1 | SUSE-SU-2025:01702-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-coredns:v1.12.1-build20250507 | false | Rancher head | coredns | golang.org/x/net@v0.37.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-dns-node-cache:1.24.0-build20241211 | false | Rancher head | glibc | glibc@2.38-150600.14.17.2 | SUSE-SU-2025:01702-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-dns-node-cache:1.24.0-build20241211 | false | Rancher head | node-cache | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-dns-node-cache:1.24.0-build20241211 | false | Rancher head | node-cache | golang.org/x/crypto@v0.22.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-dns-node-cache:1.24.0-build20241211 | false | Rancher head | node-cache | golang.org/x/net@v0.23.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-dns-node-cache:1.24.0-build20241211 | false | Rancher head | node-cache | golang.org/x/net@v0.23.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-dns-node-cache:1.24.0-build20241211 | false | Rancher head | node-cache | golang.org/x/oauth2@v0.18.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-dns-node-cache:1.26.0-build20250515 | false | Rancher head | glibc | glibc@2.38-150600.14.29.1 | SUSE-SU-2025:01702-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-dns-node-cache:1.26.0-build20250515 | false | Rancher head | node-cache | golang.org/x/net@v0.36.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-dns-node-cache:1.26.0-build20250515 | false | Rancher head | node-cache | golang.org/x/oauth2@v0.18.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.16-k3s1-build20241106 | false | Rancher head | usr/local/bin/etcd | github.com/golang-jwt/jwt/v4@v4.4.2 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-etcd:v3.5.16-k3s1-build20241106 | false | Rancher head | usr/local/bin/etcd | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.16-k3s1-build20241106 | false | Rancher head | usr/local/bin/etcd | golang.org/x/crypto@v0.21.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.16-k3s1-build20241106 | false | Rancher head | usr/local/bin/etcd | golang.org/x/net@v0.23.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.16-k3s1-build20241106 | false | Rancher head | usr/local/bin/etcd | golang.org/x/net@v0.23.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.16-k3s1-build20241106 | false | Rancher head | usr/local/bin/etcdctl | github.com/golang-jwt/jwt/v4@v4.4.2 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-etcd:v3.5.16-k3s1-build20241106 | false | Rancher head | usr/local/bin/etcdctl | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.16-k3s1-build20241106 | false | Rancher head | usr/local/bin/etcdctl | golang.org/x/crypto@v0.21.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.16-k3s1-build20241106 | false | Rancher head | usr/local/bin/etcdctl | golang.org/x/net@v0.23.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.16-k3s1-build20241106 | false | Rancher head | usr/local/bin/etcdctl | golang.org/x/net@v0.23.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.18-k3s1-build20250210 | false | Rancher head | usr/local/bin/etcd | github.com/golang-jwt/jwt/v4@v4.5.1 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-etcd:v3.5.18-k3s1-build20250210 | false | Rancher head | usr/local/bin/etcd | golang.org/x/crypto@v0.32.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.18-k3s1-build20250210 | false | Rancher head | usr/local/bin/etcd | golang.org/x/net@v0.34.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.18-k3s1-build20250210 | false | Rancher head | usr/local/bin/etcd | golang.org/x/net@v0.34.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.18-k3s1-build20250210 | false | Rancher head | usr/local/bin/etcdctl | github.com/golang-jwt/jwt/v4@v4.5.1 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-etcd:v3.5.18-k3s1-build20250210 | false | Rancher head | usr/local/bin/etcdctl | golang.org/x/crypto@v0.32.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.18-k3s1-build20250210 | false | Rancher head | usr/local/bin/etcdctl | golang.org/x/net@v0.34.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.18-k3s1-build20250210 | false | Rancher head | usr/local/bin/etcdctl | golang.org/x/net@v0.34.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.19-k3s1-build20250306 | false | Rancher head | usr/local/bin/etcd | github.com/golang-jwt/jwt/v4@v4.5.1 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-etcd:v3.5.19-k3s1-build20250306 | false | Rancher head | usr/local/bin/etcd | golang.org/x/net@v0.36.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.19-k3s1-build20250306 | false | Rancher head | usr/local/bin/etcdctl | github.com/golang-jwt/jwt/v4@v4.5.1 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-etcd:v3.5.19-k3s1-build20250306 | false | Rancher head | usr/local/bin/etcdctl | golang.org/x/net@v0.36.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | boost-license1_66_0 | boost-license1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | glibc | glibc@2.38-150600.14.17.2 | SUSE-SU-2025:01702-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | libboost_system1_66_0 | libboost_system1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | libboost_thread1_66_0 | libboost_thread1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | libgnutls30 | libgnutls30@3.8.3-150600.4.3.1 | SUSE-SU-2025:02595-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | libgnutls30 | libgnutls30@3.8.3-150600.4.3.1 | SUSE-SU-2025:0764-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | libsqlite3-0 | libsqlite3-0@3.44.0-150000.3.23.1 | SUSE-SU-2025:02672-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | pam | pam@1.3.0-150000.6.71.2 | SUSE-SU-2025:02013-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | pam-config | pam-config@1.1-150600.16.3.1 | SUSE-SU-2025:02080-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | opt/bin/flanneld | golang.org/x/crypto@v0.31.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | opt/bin/flanneld | golang.org/x/net@v0.33.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | opt/bin/flanneld | golang.org/x/net@v0.33.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher head | opt/bin/flanneld | golang.org/x/oauth2@v0.22.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-flannel:v0.26.4-build20250218 | false | Rancher head | boost-license1_66_0 | boost-license1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-flannel:v0.26.4-build20250218 | false | Rancher head | glibc | glibc@2.38-150600.14.20.3 | SUSE-SU-2025:01702-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-flannel:v0.26.4-build20250218 | false | Rancher head | libboost_system1_66_0 | libboost_system1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-flannel:v0.26.4-build20250218 | false | Rancher head | libboost_thread1_66_0 | libboost_thread1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-flannel:v0.26.4-build20250218 | false | Rancher head | libgnutls30 | libgnutls30@3.8.3-150600.4.3.1 | SUSE-SU-2025:02595-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-flannel:v0.26.4-build20250218 | false | Rancher head | libgnutls30 | libgnutls30@3.8.3-150600.4.3.1 | SUSE-SU-2025:0764-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-flannel:v0.26.4-build20250218 | false | Rancher head | libsqlite3-0 | libsqlite3-0@3.44.0-150000.3.23.1 | SUSE-SU-2025:02672-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-flannel:v0.26.4-build20250218 | false | Rancher head | pam | pam@1.3.0-150000.6.71.2 | SUSE-SU-2025:02013-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-flannel:v0.26.4-build20250218 | false | Rancher head | pam-config | pam-config@1.1-150600.16.3.1 | SUSE-SU-2025:02080-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-flannel:v0.26.4-build20250218 | false | Rancher head | opt/bin/flanneld | golang.org/x/crypto@v0.32.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-flannel:v0.26.4-build20250218 | false | Rancher head | opt/bin/flanneld | golang.org/x/net@v0.34.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-flannel:v0.26.4-build20250218 | false | Rancher head | opt/bin/flanneld | golang.org/x/net@v0.34.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-flannel:v0.26.4-build20250218 | false | Rancher head | opt/bin/flanneld | golang.org/x/oauth2@v0.22.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-flannel:v0.26.5-build20250306 | false | Rancher head | boost-license1_66_0 | boost-license1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-flannel:v0.26.5-build20250306 | false | Rancher head | glibc | glibc@2.38-150600.14.23.1 | SUSE-SU-2025:01702-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-flannel:v0.26.5-build20250306 | false | Rancher head | libboost_system1_66_0 | libboost_system1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-flannel:v0.26.5-build20250306 | false | Rancher head | libboost_thread1_66_0 | libboost_thread1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-flannel:v0.26.5-build20250306 | false | Rancher head | libgnutls30 | libgnutls30@3.8.3-150600.4.6.2 | SUSE-SU-2025:02595-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-flannel:v0.26.5-build20250306 | false | Rancher head | libsqlite3-0 | libsqlite3-0@3.44.0-150000.3.23.1 | SUSE-SU-2025:02672-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-flannel:v0.26.5-build20250306 | false | Rancher head | pam | pam@1.3.0-150000.6.71.2 | SUSE-SU-2025:02013-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-flannel:v0.26.5-build20250306 | false | Rancher head | pam-config | pam-config@1.1-150600.16.3.1 | SUSE-SU-2025:02080-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-flannel:v0.26.5-build20250306 | false | Rancher head | opt/bin/flanneld | golang.org/x/crypto@v0.32.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-flannel:v0.26.5-build20250306 | false | Rancher head | opt/bin/flanneld | golang.org/x/net@v0.34.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-flannel:v0.26.5-build20250306 | false | Rancher head | opt/bin/flanneld | golang.org/x/net@v0.34.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-flannel:v0.26.5-build20250306 | false | Rancher head | opt/bin/flanneld | golang.org/x/oauth2@v0.22.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-flannel:v0.27.1-build20250710 | false | Rancher head | boost-license1_66_0 | boost-license1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-flannel:v0.27.1-build20250710 | false | Rancher head | libboost_system1_66_0 | libboost_system1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-flannel:v0.27.1-build20250710 | false | Rancher head | libboost_thread1_66_0 | libboost_thread1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-flannel:v0.27.1-build20250710 | false | Rancher head | libgnutls30 | libgnutls30@3.8.3-150600.4.6.2 | SUSE-SU-2025:02595-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-flannel:v0.27.1-build20250710 | false | Rancher head | libsqlite3-0 | libsqlite3-0@3.49.1-150000.3.27.1 | SUSE-SU-2025:02672-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-flannel:v0.27.1-build20250710 | false | Rancher head | libxml2-2 | libxml2-2@2.12.10-150700.4.3.1 | SUSE-SU-2025:02617-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-flannel:v0.27.1-build20250710 | false | Rancher head | opt/bin/flanneld | golang.org/x/oauth2@v0.23.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-k8s-metrics-server:v0.7.2-build20250110 | false | Rancher head | metrics-server | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-k8s-metrics-server:v0.7.2-build20250110 | false | Rancher head | metrics-server | golang.org/x/crypto@v0.26.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-k8s-metrics-server:v0.7.2-build20250110 | false | Rancher head | metrics-server | golang.org/x/net@v0.28.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-k8s-metrics-server:v0.7.2-build20250110 | false | Rancher head | metrics-server | golang.org/x/net@v0.28.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-k8s-metrics-server:v0.7.2-build20250110 | false | Rancher head | metrics-server | golang.org/x/oauth2@v0.16.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-k8s-metrics-server:v0.7.2-build20250507 | false | Rancher head | metrics-server | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-k8s-metrics-server:v0.7.2-build20250507 | false | Rancher head | metrics-server | golang.org/x/crypto@v0.26.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-k8s-metrics-server:v0.7.2-build20250507 | false | Rancher head | metrics-server | golang.org/x/net@v0.28.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-k8s-metrics-server:v0.7.2-build20250507 | false | Rancher head | metrics-server | golang.org/x/net@v0.28.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-k8s-metrics-server:v0.7.2-build20250507 | false | Rancher head | metrics-server | golang.org/x/oauth2@v0.16.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-k8s-metrics-server:v0.7.2-build20250612 | false | Rancher head | metrics-server | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-k8s-metrics-server:v0.7.2-build20250612 | false | Rancher head | metrics-server | golang.org/x/crypto@v0.26.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-k8s-metrics-server:v0.7.2-build20250612 | false | Rancher head | metrics-server | golang.org/x/net@v0.28.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-k8s-metrics-server:v0.7.2-build20250612 | false | Rancher head | metrics-server | golang.org/x/net@v0.28.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-k8s-metrics-server:v0.7.2-build20250612 | false | Rancher head | metrics-server | golang.org/x/oauth2@v0.16.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | boost-license1_66_0 | boost-license1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | libboost_system1_66_0 | libboost_system1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | libboost_thread1_66_0 | libboost_thread1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | libsqlite3-0 | libsqlite3-0@3.49.1-150000.3.27.1 | SUSE-SU-2025:02672-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.26.1 | SUSE-SU-2025:02758-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | pam | pam@1.3.0-150000.6.76.1 | SUSE-SU-2025:02013-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kube-apiserver | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kube-apiserver | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kube-apiserver | golang.org/x/crypto@v0.21.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kube-apiserver | golang.org/x/net@v0.23.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kube-apiserver | golang.org/x/oauth2@v0.10.0 | CVE-2025-22868 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kube-apiserver | gopkg.in/square/go-jose.v2@v2.6.0 | CVE-2024-28180 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kube-controller-manager | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kube-controller-manager | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kube-controller-manager | golang.org/x/crypto@v0.21.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kube-controller-manager | golang.org/x/net@v0.23.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kube-controller-manager | golang.org/x/oauth2@v0.10.0 | CVE-2025-22868 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kube-controller-manager | gopkg.in/square/go-jose.v2@v2.6.0 | CVE-2024-28180 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kube-proxy | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kube-proxy | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kube-proxy | golang.org/x/crypto@v0.21.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kube-proxy | golang.org/x/net@v0.23.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kube-proxy | golang.org/x/oauth2@v0.10.0 | CVE-2025-22868 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kube-scheduler | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kube-scheduler | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kube-scheduler | golang.org/x/crypto@v0.21.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kube-scheduler | golang.org/x/net@v0.23.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kube-scheduler | golang.org/x/oauth2@v0.10.0 | CVE-2025-22868 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kubectl | golang.org/x/oauth2@v0.10.0 | CVE-2025-22868 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kubelet | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kubelet | golang.org/x/crypto@v0.21.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kubelet | golang.org/x/net@v0.23.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.14-rke2r1-build20250618 | false | Rancher head | usr/local/bin/kubelet | golang.org/x/oauth2@v0.10.0 | CVE-2025-22868 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | boost-license1_66_0 | boost-license1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | libboost_system1_66_0 | libboost_system1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | libboost_thread1_66_0 | libboost_thread1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | libsqlite3-0 | libsqlite3-0@3.49.1-150000.3.27.1 | SUSE-SU-2025:02672-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.29.1 | SUSE-SU-2025:02758-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-apiserver | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-apiserver | golang.org/x/crypto@v0.24.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-apiserver | golang.org/x/net@v0.26.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-apiserver | golang.org/x/oauth2@v0.21.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-apiserver | gopkg.in/square/go-jose.v2@v2.6.0 | CVE-2024-28180 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-controller-manager | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-controller-manager | golang.org/x/crypto@v0.24.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-controller-manager | golang.org/x/net@v0.26.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-controller-manager | golang.org/x/oauth2@v0.21.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-controller-manager | gopkg.in/square/go-jose.v2@v2.6.0 | CVE-2024-28180 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-proxy | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-proxy | golang.org/x/crypto@v0.24.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-proxy | golang.org/x/net@v0.26.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-proxy | golang.org/x/oauth2@v0.21.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-scheduler | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-scheduler | golang.org/x/crypto@v0.24.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-scheduler | golang.org/x/net@v0.26.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-scheduler | golang.org/x/oauth2@v0.21.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kubectl | golang.org/x/net@v0.26.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kubectl | golang.org/x/oauth2@v0.21.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kubelet | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kubelet | golang.org/x/crypto@v0.24.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kubelet | golang.org/x/net@v0.26.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.11-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kubelet | golang.org/x/oauth2@v0.21.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 | false | Rancher head | boost-license1_66_0 | boost-license1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 | false | Rancher head | libboost_system1_66_0 | libboost_system1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 | false | Rancher head | libboost_thread1_66_0 | libboost_thread1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 | false | Rancher head | libsqlite3-0 | libsqlite3-0@3.49.1-150000.3.27.1 | SUSE-SU-2025:02672-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.29.1 | SUSE-SU-2025:02758-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-apiserver | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-apiserver | golang.org/x/crypto@v0.28.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-apiserver | golang.org/x/net@v0.30.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-apiserver | golang.org/x/oauth2@v0.23.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-apiserver | gopkg.in/square/go-jose.v2@v2.6.0 | CVE-2024-28180 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-controller-manager | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-controller-manager | golang.org/x/crypto@v0.28.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-controller-manager | golang.org/x/net@v0.30.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-controller-manager | golang.org/x/oauth2@v0.23.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-controller-manager | gopkg.in/square/go-jose.v2@v2.6.0 | CVE-2024-28180 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-proxy | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-proxy | golang.org/x/crypto@v0.28.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-proxy | golang.org/x/net@v0.30.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-proxy | golang.org/x/oauth2@v0.23.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-scheduler | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-scheduler | golang.org/x/crypto@v0.28.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-scheduler | golang.org/x/net@v0.30.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kube-scheduler | golang.org/x/oauth2@v0.23.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kubectl | golang.org/x/net@v0.30.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kubectl | golang.org/x/oauth2@v0.23.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kubelet | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kubelet | golang.org/x/crypto@v0.28.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kubelet | golang.org/x/net@v0.30.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kubelet | golang.org/x/oauth2@v0.23.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.33.3-rke2r1-build20250716 | false | Rancher head | boost-license1_66_0 | boost-license1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-kubernetes:v1.33.3-rke2r1-build20250716 | false | Rancher head | libboost_system1_66_0 | libboost_system1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-kubernetes:v1.33.3-rke2r1-build20250716 | false | Rancher head | libboost_thread1_66_0 | libboost_thread1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-kubernetes:v1.33.3-rke2r1-build20250716 | false | Rancher head | libsqlite3-0 | libsqlite3-0@3.49.1-150000.3.27.1 | SUSE-SU-2025:02672-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-kubernetes:v1.33.3-rke2r1-build20250716 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.29.1 | SUSE-SU-2025:02758-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-kubernetes:v1.33.3-rke2r1-build20250716 | false | Rancher head | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-multus-cni:v4.1.4-build20250108 | false | Rancher head | cert-approver | golang.org/x/net@v0.23.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-multus-cni:v4.1.4-build20250108 | false | Rancher head | cert-approver | golang.org/x/net@v0.23.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-multus-cni:v4.1.4-build20250108 | false | Rancher head | cert-approver | golang.org/x/oauth2@v0.10.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-multus-cni:v4.1.4-build20250108 | false | Rancher head | kubeconfig_generator | golang.org/x/net@v0.23.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-multus-cni:v4.1.4-build20250108 | false | Rancher head | kubeconfig_generator | golang.org/x/net@v0.23.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-multus-cni:v4.1.4-build20250108 | false | Rancher head | kubeconfig_generator | golang.org/x/oauth2@v0.10.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-multus-cni:v4.1.4-build20250108 | false | Rancher head | usr/src/multus-cni/bin/multus | golang.org/x/net@v0.23.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-multus-cni:v4.1.4-build20250108 | false | Rancher head | usr/src/multus-cni/bin/multus | golang.org/x/net@v0.23.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-multus-cni:v4.1.4-build20250108 | false | Rancher head | usr/src/multus-cni/bin/multus | golang.org/x/oauth2@v0.10.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-multus-cni:v4.2.1-build20250627 | false | Rancher head | cert-approver | golang.org/x/net@v0.28.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-multus-cni:v4.2.1-build20250627 | false | Rancher head | cert-approver | golang.org/x/net@v0.28.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-multus-cni:v4.2.1-build20250627 | false | Rancher head | cert-approver | golang.org/x/oauth2@v0.10.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-multus-cni:v4.2.1-build20250627 | false | Rancher head | kubeconfig_generator | golang.org/x/net@v0.28.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-multus-cni:v4.2.1-build20250627 | false | Rancher head | kubeconfig_generator | golang.org/x/net@v0.28.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-multus-cni:v4.2.1-build20250627 | false | Rancher head | kubeconfig_generator | golang.org/x/oauth2@v0.10.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-multus-cni:v4.2.1-build20250627 | false | Rancher head | usr/src/multus-cni/bin/multus | golang.org/x/net@v0.28.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-multus-cni:v4.2.1-build20250627 | false | Rancher head | usr/src/multus-cni/bin/multus | golang.org/x/net@v0.28.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-multus-cni:v4.2.1-build20250627 | false | Rancher head | usr/src/multus-cni/bin/multus | golang.org/x/oauth2@v0.10.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-multus-dynamic-networks-controller:v0.3.7-build20250711 | false | Rancher head | dynamic-networks-controller | golang.org/x/net@v0.30.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-multus-dynamic-networks-controller:v0.3.7-build20250711 | false | Rancher head | dynamic-networks-controller | golang.org/x/net@v0.30.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-multus-dynamic-networks-controller:v0.3.7-build20250711 | false | Rancher head | dynamic-networks-controller | golang.org/x/oauth2@v0.23.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-multus-thick:v4.2.1-build20250627 | false | Rancher head | usr/src/multus-cni/bin/multus-daemon | golang.org/x/net@v0.28.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-multus-thick:v4.2.1-build20250627 | false | Rancher head | usr/src/multus-cni/bin/multus-daemon | golang.org/x/net@v0.28.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-multus-thick:v4.2.1-build20250627 | false | Rancher head | usr/src/multus-cni/bin/multus-daemon | golang.org/x/oauth2@v0.10.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-multus-thick:v4.2.1-build20250627 | false | Rancher head | usr/src/multus-cni/bin/multus-shim | golang.org/x/net@v0.28.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-multus-thick:v4.2.1-build20250627 | false | Rancher head | usr/src/multus-cni/bin/multus-shim | golang.org/x/net@v0.28.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-multus-thick:v4.2.1-build20250627 | false | Rancher head | usr/src/multus-cni/bin/multus-shim | golang.org/x/oauth2@v0.10.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-whereabouts:v0.8.0-build20241011 | false | Rancher head | ip-control-loop | golang.org/x/net@v0.24.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-whereabouts:v0.8.0-build20241011 | false | Rancher head | ip-control-loop | golang.org/x/net@v0.24.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-whereabouts:v0.8.0-build20241011 | false | Rancher head | ip-control-loop | golang.org/x/oauth2@v0.10.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-whereabouts:v0.8.0-build20241011 | false | Rancher head | whereabouts | golang.org/x/net@v0.24.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-whereabouts:v0.8.0-build20241011 | false | Rancher head | whereabouts | golang.org/x/net@v0.24.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-whereabouts:v0.8.0-build20241011 | false | Rancher head | whereabouts | golang.org/x/oauth2@v0.10.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-whereabouts:v0.8.0-build20250131 | false | Rancher head | ip-control-loop | golang.org/x/net@v0.24.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-whereabouts:v0.8.0-build20250131 | false | Rancher head | ip-control-loop | golang.org/x/net@v0.24.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-whereabouts:v0.8.0-build20250131 | false | Rancher head | ip-control-loop | golang.org/x/oauth2@v0.10.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-whereabouts:v0.8.0-build20250131 | false | Rancher head | whereabouts | golang.org/x/net@v0.24.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-whereabouts:v0.8.0-build20250131 | false | Rancher head | whereabouts | golang.org/x/net@v0.24.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-whereabouts:v0.8.0-build20250131 | false | Rancher head | whereabouts | golang.org/x/oauth2@v0.10.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-whereabouts:v0.9.0-build20250612 | false | Rancher head | ip-control-loop | golang.org/x/net@v0.36.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-whereabouts:v0.9.0-build20250612 | false | Rancher head | ip-control-loop | golang.org/x/oauth2@v0.21.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-whereabouts:v0.9.0-build20250612 | false | Rancher head | whereabouts | golang.org/x/net@v0.36.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-whereabouts:v0.9.0-build20250612 | false | Rancher head | whereabouts | golang.org/x/oauth2@v0.21.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-whereabouts:v0.9.1-build20250704 | false | Rancher head | ip-control-loop | golang.org/x/oauth2@v0.21.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-whereabouts:v0.9.1-build20250704 | false | Rancher head | node-slice-controller | golang.org/x/oauth2@v0.21.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-whereabouts:v0.9.1-build20250704 | false | Rancher head | whereabouts | golang.org/x/oauth2@v0.21.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher head | usr/bin/harvester-cloud-provider | github.com/golang/glog@v1.1.2 | CVE-2024-45339 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher head | usr/bin/harvester-cloud-provider | github.com/rancher/apiserver@v0.0.0-20230120214941-e88c32739dc7 | CVE-2023-32192 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher head | usr/bin/harvester-cloud-provider | github.com/rancher/norman@v0.0.0-20221205184727-32ef2e185b99 | CVE-2023-32193 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher head | usr/bin/harvester-cloud-provider | golang.org/x/crypto@v0.16.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher head | usr/bin/harvester-cloud-provider | golang.org/x/crypto@v0.16.0 | CVE-2025-22869 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher head | usr/bin/harvester-cloud-provider | golang.org/x/crypto@v0.16.0 | CVE-2023-48795 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher head | usr/bin/harvester-cloud-provider | golang.org/x/net@v0.19.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher head | usr/bin/harvester-cloud-provider | golang.org/x/net@v0.19.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher head | usr/bin/harvester-cloud-provider | golang.org/x/oauth2@v0.13.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher head | usr/bin/harvester-cloud-provider | google.golang.org/protobuf@v1.31.0 | CVE-2024-24786 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | boost-license1_66_0 | boost-license1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | libboost_system1_66_0 | libboost_system1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | libboost_thread1_66_0 | libboost_thread1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | usr/bin/harvester-csi-driver | github.com/golang/glog@v1.2.1 | CVE-2024-45339 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | usr/bin/harvester-csi-driver | golang.org/x/net@v0.28.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | usr/bin/harvester-csi-driver | golang.org/x/net@v0.28.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher head | usr/bin/harvester-csi-driver | golang.org/x/oauth2@v0.22.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-csi-driver:v0.2.3 | false | Rancher head | boost-license1_66_0 | boost-license1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/harvester-csi-driver:v0.2.3 | false | Rancher head | libboost_system1_66_0 | libboost_system1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/harvester-csi-driver:v0.2.3 | false | Rancher head | libboost_thread1_66_0 | libboost_thread1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/harvester-csi-driver:v0.2.3 | false | Rancher head | usr/bin/harvester-csi-driver | golang.org/x/oauth2@v0.24.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher head | libcrypto3 | libcrypto3@3.3.2-r0 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher head | libssl3 | libssl3@3.3.2-r0 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | golang.org/x/crypto@v0.26.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | golang.org/x/net@v0.28.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | golang.org/x/net@v0.28.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | golang.org/x/oauth2@v0.10.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | helm.sh/helm/v3@v3.15.4 | CVE-2025-53547 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | helm.sh/helm/v3@v3.15.4 | CVE-2025-55198 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | helm.sh/helm/v3@v3.15.4 | CVE-2025-55199 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | golang.org/x/crypto@v0.25.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | golang.org/x/crypto@v0.25.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher head | usr/bin/helm | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher head | usr/bin/helm | golang.org/x/crypto@v0.26.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher head | usr/bin/helm | golang.org/x/net@v0.26.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher head | usr/bin/helm | golang.org/x/net@v0.26.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher head | usr/bin/helm | golang.org/x/oauth2@v0.21.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.4-build20250113 | false | Rancher head | libcrypto3 | libcrypto3@3.3.2-r4 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/klipper-helm:v0.9.4-build20250113 | false | Rancher head | libssl3 | libssl3@3.3.2-r4 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/klipper-helm:v0.9.4-build20250113 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.4-build20250113 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | golang.org/x/crypto@v0.26.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.4-build20250113 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | golang.org/x/net@v0.28.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.4-build20250113 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | golang.org/x/net@v0.28.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.4-build20250113 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | golang.org/x/oauth2@v0.10.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.4-build20250113 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | helm.sh/helm/v3@v3.15.4 | CVE-2025-53547 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.4-build20250113 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | helm.sh/helm/v3@v3.15.4 | CVE-2025-55198 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.4-build20250113 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | helm.sh/helm/v3@v3.15.4 | CVE-2025-55199 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.4-build20250113 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | golang.org/x/crypto@v0.25.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.4-build20250113 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | golang.org/x/crypto@v0.25.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.4-build20250113 | false | Rancher head | usr/bin/helm | golang.org/x/crypto@v0.31.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.4-build20250113 | false | Rancher head | usr/bin/helm | golang.org/x/net@v0.26.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.4-build20250113 | false | Rancher head | usr/bin/helm | golang.org/x/net@v0.26.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.4-build20250113 | false | Rancher head | usr/bin/helm | golang.org/x/oauth2@v0.21.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.5-build20250306 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.5-build20250306 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | golang.org/x/crypto@v0.26.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.5-build20250306 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | golang.org/x/net@v0.28.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.5-build20250306 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | golang.org/x/net@v0.28.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.5-build20250306 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | golang.org/x/oauth2@v0.10.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.5-build20250306 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | helm.sh/helm/v3@v3.15.4 | CVE-2025-53547 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.5-build20250306 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | helm.sh/helm/v3@v3.15.4 | CVE-2025-55198 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.5-build20250306 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | helm.sh/helm/v3@v3.15.4 | CVE-2025-55199 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.5-build20250306 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | golang.org/x/crypto@v0.25.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.5-build20250306 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | golang.org/x/crypto@v0.25.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.5-build20250306 | false | Rancher head | usr/bin/helm | golang.org/x/crypto@v0.31.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.5-build20250306 | false | Rancher head | usr/bin/helm | golang.org/x/net@v0.26.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.5-build20250306 | false | Rancher head | usr/bin/helm | golang.org/x/net@v0.26.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.5-build20250306 | false | Rancher head | usr/bin/helm | golang.org/x/oauth2@v0.21.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.7-build20250616 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | helm.sh/helm/v3@v3.18.3 | CVE-2025-53547 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.7-build20250616 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | helm.sh/helm/v3@v3.18.3 | CVE-2025-55198 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.7-build20250616 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | helm.sh/helm/v3@v3.18.3 | CVE-2025-55199 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.8-build20250709 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | helm.sh/helm/v3@v3.18.4 | CVE-2025-55198 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.8-build20250709 | false | Rancher head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | helm.sh/helm/v3@v3.18.4 | CVE-2025-55199 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-lb:v0.4.10 | false | Rancher head | libcrypto3 | libcrypto3@3.3.2-r4 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/klipper-lb:v0.4.10 | false | Rancher head | libssl3 | libssl3@3.3.2-r4 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/klipper-lb:v0.4.9 | false | Rancher head | libcrypto3 | libcrypto3@3.3.1-r3 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/klipper-lb:v0.4.9 | false | Rancher head | libssl3 | libssl3@3.3.1-r3 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/local-path-provisioner:v0.0.30 | false | Rancher head | libcrypto3 | libcrypto3@3.3.2-r0 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/local-path-provisioner:v0.0.30 | false | Rancher head | libssl3 | libssl3@3.3.2-r0 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/local-path-provisioner:v0.0.30 | false | Rancher head | usr/bin/local-path-provisioner | golang.org/x/crypto@v0.25.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/local-path-provisioner:v0.0.30 | false | Rancher head | usr/bin/local-path-provisioner | golang.org/x/crypto@v0.25.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/local-path-provisioner:v0.0.30 | false | Rancher head | usr/bin/local-path-provisioner | golang.org/x/net@v0.27.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/local-path-provisioner:v0.0.30 | false | Rancher head | usr/bin/local-path-provisioner | golang.org/x/net@v0.27.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/local-path-provisioner:v0.0.30 | false | Rancher head | usr/bin/local-path-provisioner | golang.org/x/oauth2@v0.10.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/local-path-provisioner:v0.0.31 | false | Rancher head | libcrypto3 | libcrypto3@3.3.2-r4 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/local-path-provisioner:v0.0.31 | false | Rancher head | libssl3 | libssl3@3.3.2-r4 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/local-path-provisioner:v0.0.31 | false | Rancher head | usr/bin/local-path-provisioner | golang.org/x/net@v0.34.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/local-path-provisioner:v0.0.31 | false | Rancher head | usr/bin/local-path-provisioner | golang.org/x/net@v0.34.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/local-path-provisioner:v0.0.31 | false | Rancher head | usr/bin/local-path-provisioner | golang.org/x/oauth2@v0.25.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/machine:v0.15.0-rancher131 | false | Rancher head | usr/local/bin/rancher-machine | github.com/golang-jwt/jwt/v4@v4.5.0 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-calico-apiserver:v3.29.1 | true | Rancher head | code/apiserver | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-apiserver:v3.29.1 | true | Rancher head | code/apiserver | golang.org/x/crypto@v0.24.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-apiserver:v3.29.1 | true | Rancher head | code/apiserver | golang.org/x/net@v0.26.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-apiserver:v3.29.1 | true | Rancher head | code/apiserver | golang.org/x/net@v0.26.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-apiserver:v3.29.1 | true | Rancher head | code/apiserver | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-apiserver:v3.29.2 | true | Rancher head | code/apiserver | golang.org/x/crypto@v0.32.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-apiserver:v3.29.2 | true | Rancher head | code/apiserver | golang.org/x/net@v0.34.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-apiserver:v3.29.2 | true | Rancher head | code/apiserver | golang.org/x/net@v0.34.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-apiserver:v3.29.2 | true | Rancher head | code/apiserver | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-apiserver:v3.29.3 | true | Rancher head | code/apiserver | golang.org/x/net@v0.37.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-apiserver:v3.29.3 | true | Rancher head | code/apiserver | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.1 | true | Rancher head | opt/cni/bin/calico | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.1 | true | Rancher head | opt/cni/bin/calico | golang.org/x/crypto@v0.24.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.1 | true | Rancher head | opt/cni/bin/calico | golang.org/x/net@v0.26.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.1 | true | Rancher head | opt/cni/bin/calico | golang.org/x/net@v0.26.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.1 | true | Rancher head | opt/cni/bin/calico | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.1 | true | Rancher head | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.1 | true | Rancher head | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.24.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.1 | true | Rancher head | opt/cni/bin/calico-ipam | golang.org/x/net@v0.26.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.1 | true | Rancher head | opt/cni/bin/calico-ipam | golang.org/x/net@v0.26.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.1 | true | Rancher head | opt/cni/bin/calico-ipam | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.1 | true | Rancher head | opt/cni/bin/install | golang.org/x/net@v0.26.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.1 | true | Rancher head | opt/cni/bin/install | golang.org/x/net@v0.26.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.1 | true | Rancher head | opt/cni/bin/install | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.2 | true | Rancher head | opt/cni/bin/calico | golang.org/x/crypto@v0.32.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.2 | true | Rancher head | opt/cni/bin/calico | golang.org/x/net@v0.34.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.2 | true | Rancher head | opt/cni/bin/calico | golang.org/x/net@v0.34.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.2 | true | Rancher head | opt/cni/bin/calico | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.2 | true | Rancher head | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.32.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.2 | true | Rancher head | opt/cni/bin/calico-ipam | golang.org/x/net@v0.34.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.2 | true | Rancher head | opt/cni/bin/calico-ipam | golang.org/x/net@v0.34.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.2 | true | Rancher head | opt/cni/bin/calico-ipam | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.2 | true | Rancher head | opt/cni/bin/install | golang.org/x/net@v0.34.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.2 | true | Rancher head | opt/cni/bin/install | golang.org/x/net@v0.34.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.2 | true | Rancher head | opt/cni/bin/install | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.3 | true | Rancher head | opt/cni/bin/calico | golang.org/x/net@v0.37.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.3 | true | Rancher head | opt/cni/bin/calico | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.3 | true | Rancher head | opt/cni/bin/calico-ipam | golang.org/x/net@v0.37.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.3 | true | Rancher head | opt/cni/bin/calico-ipam | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.3 | true | Rancher head | opt/cni/bin/install | golang.org/x/net@v0.37.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.3 | true | Rancher head | opt/cni/bin/install | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.29.1 | true | Rancher head | usr/bin/kube-controllers | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.29.1 | true | Rancher head | usr/bin/kube-controllers | golang.org/x/crypto@v0.24.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.29.1 | true | Rancher head | usr/bin/kube-controllers | golang.org/x/net@v0.26.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.29.1 | true | Rancher head | usr/bin/kube-controllers | golang.org/x/net@v0.26.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.29.1 | true | Rancher head | usr/bin/kube-controllers | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.29.2 | true | Rancher head | usr/bin/kube-controllers | golang.org/x/crypto@v0.32.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.29.2 | true | Rancher head | usr/bin/kube-controllers | golang.org/x/net@v0.34.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.29.2 | true | Rancher head | usr/bin/kube-controllers | golang.org/x/net@v0.34.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.29.2 | true | Rancher head | usr/bin/kube-controllers | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.29.3 | true | Rancher head | usr/bin/kube-controllers | golang.org/x/net@v0.37.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.29.3 | true | Rancher head | usr/bin/kube-controllers | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-typha:v3.29.1 | true | Rancher head | usr/bin/calico-typha | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-typha:v3.29.1 | true | Rancher head | usr/bin/calico-typha | golang.org/x/crypto@v0.24.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-typha:v3.29.1 | true | Rancher head | usr/bin/calico-typha | golang.org/x/net@v0.26.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-typha:v3.29.1 | true | Rancher head | usr/bin/calico-typha | golang.org/x/net@v0.26.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-typha:v3.29.1 | true | Rancher head | usr/bin/calico-typha | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-typha:v3.29.2 | true | Rancher head | usr/bin/calico-typha | golang.org/x/crypto@v0.32.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-typha:v3.29.2 | true | Rancher head | usr/bin/calico-typha | golang.org/x/net@v0.34.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-typha:v3.29.2 | true | Rancher head | usr/bin/calico-typha | golang.org/x/net@v0.34.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-typha:v3.29.2 | true | Rancher head | usr/bin/calico-typha | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-typha:v3.29.3 | true | Rancher head | usr/bin/calico-typha | golang.org/x/net@v0.37.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-typha:v3.29.3 | true | Rancher head | usr/bin/calico-typha | golang.org/x/oauth2@v0.20.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-cilium:v1.16.5 | true | Rancher head | opt/cni/bin/cilium-cni | golang.org/x/net@v0.29.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.5 | true | Rancher head | opt/cni/bin/cilium-cni | golang.org/x/oauth2@v0.23.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-cilium:v1.16.5 | true | Rancher head | usr/bin/cilium-agent | github.com/osrg/gobgp/v3@v3.27.0 | CVE-2025-43970 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.5 | true | Rancher head | usr/bin/cilium-agent | golang.org/x/net@v0.29.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.5 | true | Rancher head | usr/bin/cilium-agent | golang.org/x/oauth2@v0.23.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-cilium:v1.16.5 | true | Rancher head | usr/bin/cilium-bugtool | golang.org/x/net@v0.29.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.5 | true | Rancher head | usr/bin/cilium-dbg | github.com/osrg/gobgp/v3@v3.27.0 | CVE-2025-43970 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.5 | true | Rancher head | usr/bin/cilium-dbg | golang.org/x/net@v0.29.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.5 | true | Rancher head | usr/bin/cilium-dbg | golang.org/x/oauth2@v0.23.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-cilium:v1.16.5 | true | Rancher head | usr/bin/hubble | golang.org/x/net@v0.29.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.17.0 | true | Rancher head | opt/cni/bin/cilium-cni | golang.org/x/net@v0.33.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.17.0 | true | Rancher head | opt/cni/bin/cilium-cni | golang.org/x/net@v0.33.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.17.0 | true | Rancher head | opt/cni/bin/cilium-cni | golang.org/x/oauth2@v0.24.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-cilium:v1.17.0 | true | Rancher head | usr/bin/cilium-agent | github.com/osrg/gobgp/v3@v3.32.0 | CVE-2025-43970 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.17.0 | true | Rancher head | usr/bin/cilium-agent | golang.org/x/net@v0.33.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.17.0 | true | Rancher head | usr/bin/cilium-agent | golang.org/x/net@v0.33.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.17.0 | true | Rancher head | usr/bin/cilium-agent | golang.org/x/oauth2@v0.24.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-cilium:v1.17.0 | true | Rancher head | usr/bin/cilium-bugtool | golang.org/x/net@v0.33.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.17.0 | true | Rancher head | usr/bin/cilium-bugtool | golang.org/x/net@v0.33.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.17.0 | true | Rancher head | usr/bin/cilium-dbg | github.com/osrg/gobgp/v3@v3.32.0 | CVE-2025-43970 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.17.0 | true | Rancher head | usr/bin/cilium-dbg | golang.org/x/net@v0.33.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.17.0 | true | Rancher head | usr/bin/cilium-dbg | golang.org/x/net@v0.33.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.17.0 | true | Rancher head | usr/bin/cilium-dbg | golang.org/x/oauth2@v0.24.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-cilium:v1.17.0 | true | Rancher head | usr/bin/hubble | golang.org/x/net@v0.33.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.17.0 | true | Rancher head | usr/bin/hubble | golang.org/x/net@v0.33.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.17.0 | true | Rancher head | usr/bin/hubble | golang.org/x/oauth2@v0.24.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-cilium:v1.17.1 | true | Rancher head | opt/cni/bin/cilium-cni | golang.org/x/net@v0.33.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.17.1 | true | Rancher head | opt/cni/bin/cilium-cni | golang.org/x/net@v0.33.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.17.1 | true | Rancher head | opt/cni/bin/cilium-cni | golang.org/x/oauth2@v0.24.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-cilium:v1.17.1 | true | Rancher head | usr/bin/cilium-agent | github.com/osrg/gobgp/v3@v3.32.0 | CVE-2025-43970 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.17.1 | true | Rancher head | usr/bin/cilium-agent | golang.org/x/net@v0.33.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.17.1 | true | Rancher head | usr/bin/cilium-agent | golang.org/x/net@v0.33.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.17.1 | true | Rancher head | usr/bin/cilium-agent | golang.org/x/oauth2@v0.24.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-cilium:v1.17.1 | true | Rancher head | usr/bin/cilium-bugtool | golang.org/x/net@v0.33.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.17.1 | true | Rancher head | usr/bin/cilium-bugtool | golang.org/x/net@v0.33.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.17.1 | true | Rancher head | usr/bin/cilium-dbg | github.com/osrg/gobgp/v3@v3.32.0 | CVE-2025-43970 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.17.1 | true | Rancher head | usr/bin/cilium-dbg | golang.org/x/net@v0.33.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.17.1 | true | Rancher head | usr/bin/cilium-dbg | golang.org/x/net@v0.33.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.17.1 | true | Rancher head | usr/bin/cilium-dbg | golang.org/x/oauth2@v0.24.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-cilium:v1.17.1 | true | Rancher head | usr/bin/hubble | golang.org/x/net@v0.33.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.17.1 | true | Rancher head | usr/bin/hubble | golang.org/x/net@v0.33.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.17.1 | true | Rancher head | usr/bin/hubble | golang.org/x/oauth2@v0.24.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.5 | true | Rancher head | usr/bin/clustermesh-apiserver | github.com/osrg/gobgp/v3@v3.27.0 | CVE-2025-43970 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.5 | true | Rancher head | usr/bin/clustermesh-apiserver | golang.org/x/net@v0.29.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.5 | true | Rancher head | usr/bin/clustermesh-apiserver | golang.org/x/oauth2@v0.23.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.5 | true | Rancher head | usr/bin/etcd | github.com/golang-jwt/jwt/v4@v4.4.2 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.5 | true | Rancher head | usr/bin/etcd | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.5 | true | Rancher head | usr/bin/etcd | golang.org/x/crypto@v0.21.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.5 | true | Rancher head | usr/bin/etcd | golang.org/x/net@v0.23.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.5 | true | Rancher head | usr/bin/etcd | golang.org/x/net@v0.23.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.17.0 | true | Rancher head | usr/bin/clustermesh-apiserver | golang.org/x/net@v0.33.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.17.0 | true | Rancher head | usr/bin/clustermesh-apiserver | golang.org/x/net@v0.33.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.17.0 | true | Rancher head | usr/bin/clustermesh-apiserver | golang.org/x/oauth2@v0.24.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.17.0 | true | Rancher head | usr/bin/etcd | github.com/golang-jwt/jwt/v4@v4.4.2 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.17.0 | true | Rancher head | usr/bin/etcd | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.17.0 | true | Rancher head | usr/bin/etcd | golang.org/x/crypto@v0.21.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.17.0 | true | Rancher head | usr/bin/etcd | golang.org/x/net@v0.23.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.17.0 | true | Rancher head | usr/bin/etcd | golang.org/x/net@v0.23.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.17.1 | true | Rancher head | usr/bin/clustermesh-apiserver | golang.org/x/net@v0.33.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.17.1 | true | Rancher head | usr/bin/clustermesh-apiserver | golang.org/x/net@v0.33.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.17.1 | true | Rancher head | usr/bin/clustermesh-apiserver | golang.org/x/oauth2@v0.24.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.17.1 | true | Rancher head | usr/bin/etcd | github.com/golang-jwt/jwt/v4@v4.5.1 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.17.1 | true | Rancher head | usr/bin/etcd | golang.org/x/crypto@v0.32.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.17.1 | true | Rancher head | usr/bin/etcd | golang.org/x/net@v0.34.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.17.1 | true | Rancher head | usr/bin/etcd | golang.org/x/net@v0.34.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.16.5 | true | Rancher head | bin/grpc_health_probe | github.com/go-jose/go-jose/v4@v4.0.4 | CVE-2025-27144 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.16.5 | true | Rancher head | bin/grpc_health_probe | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.16.5 | true | Rancher head | bin/grpc_health_probe | golang.org/x/crypto@v0.26.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.16.5 | true | Rancher head | bin/grpc_health_probe | golang.org/x/net@v0.28.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.16.5 | true | Rancher head | bin/grpc_health_probe | golang.org/x/net@v0.28.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.16.5 | true | Rancher head | usr/bin/hubble-relay | golang.org/x/net@v0.29.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.16.5 | true | Rancher head | usr/bin/hubble-relay | golang.org/x/oauth2@v0.23.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.17.0 | true | Rancher head | bin/grpc_health_probe | github.com/go-jose/go-jose/v4@v4.0.4 | CVE-2025-27144 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.17.0 | true | Rancher head | bin/grpc_health_probe | golang.org/x/crypto@v0.31.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.17.0 | true | Rancher head | bin/grpc_health_probe | golang.org/x/net@v0.33.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.17.0 | true | Rancher head | bin/grpc_health_probe | golang.org/x/net@v0.33.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.17.0 | true | Rancher head | usr/bin/hubble-relay | golang.org/x/net@v0.33.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.17.0 | true | Rancher head | usr/bin/hubble-relay | golang.org/x/net@v0.33.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.17.0 | true | Rancher head | usr/bin/hubble-relay | golang.org/x/oauth2@v0.24.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.17.1 | true | Rancher head | bin/grpc_health_probe | github.com/go-jose/go-jose/v4@v4.0.4 | CVE-2025-27144 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.17.1 | true | Rancher head | bin/grpc_health_probe | golang.org/x/crypto@v0.31.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.17.1 | true | Rancher head | bin/grpc_health_probe | golang.org/x/net@v0.33.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.17.1 | true | Rancher head | bin/grpc_health_probe | golang.org/x/net@v0.33.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.17.1 | true | Rancher head | usr/bin/hubble-relay | golang.org/x/net@v0.33.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.17.1 | true | Rancher head | usr/bin/hubble-relay | golang.org/x/net@v0.33.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.17.1 | true | Rancher head | usr/bin/hubble-relay | golang.org/x/oauth2@v0.24.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-operator-aws:v1.16.5 | true | Rancher head | usr/bin/cilium-operator-aws | github.com/go-jose/go-jose/v4@v4.0.2 | CVE-2025-27144 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-aws:v1.16.5 | true | Rancher head | usr/bin/cilium-operator-aws | github.com/osrg/gobgp/v3@v3.27.0 | CVE-2025-43970 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-aws:v1.16.5 | true | Rancher head | usr/bin/cilium-operator-aws | golang.org/x/net@v0.29.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-aws:v1.16.5 | true | Rancher head | usr/bin/cilium-operator-aws | golang.org/x/oauth2@v0.23.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-operator-aws:v1.17.0 | true | Rancher head | usr/bin/cilium-operator-aws | github.com/go-jose/go-jose/v4@v4.0.4 | CVE-2025-27144 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-aws:v1.17.0 | true | Rancher head | usr/bin/cilium-operator-aws | github.com/osrg/gobgp/v3@v3.32.0 | CVE-2025-43970 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-aws:v1.17.0 | true | Rancher head | usr/bin/cilium-operator-aws | golang.org/x/net@v0.33.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-aws:v1.17.0 | true | Rancher head | usr/bin/cilium-operator-aws | golang.org/x/net@v0.33.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-aws:v1.17.0 | true | Rancher head | usr/bin/cilium-operator-aws | golang.org/x/oauth2@v0.24.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-operator-aws:v1.17.1 | true | Rancher head | usr/bin/cilium-operator-aws | github.com/go-jose/go-jose/v4@v4.0.4 | CVE-2025-27144 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-aws:v1.17.1 | true | Rancher head | usr/bin/cilium-operator-aws | github.com/osrg/gobgp/v3@v3.32.0 | CVE-2025-43970 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-aws:v1.17.1 | true | Rancher head | usr/bin/cilium-operator-aws | golang.org/x/net@v0.33.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-aws:v1.17.1 | true | Rancher head | usr/bin/cilium-operator-aws | golang.org/x/net@v0.33.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-aws:v1.17.1 | true | Rancher head | usr/bin/cilium-operator-aws | golang.org/x/oauth2@v0.24.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-operator-azure:v1.16.5 | true | Rancher head | usr/bin/cilium-operator-azure | github.com/go-jose/go-jose/v4@v4.0.2 | CVE-2025-27144 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-azure:v1.16.5 | true | Rancher head | usr/bin/cilium-operator-azure | github.com/golang-jwt/jwt/v4@v4.5.0 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-azure:v1.16.5 | true | Rancher head | usr/bin/cilium-operator-azure | github.com/osrg/gobgp/v3@v3.27.0 | CVE-2025-43970 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-azure:v1.16.5 | true | Rancher head | usr/bin/cilium-operator-azure | golang.org/x/net@v0.29.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-azure:v1.16.5 | true | Rancher head | usr/bin/cilium-operator-azure | golang.org/x/oauth2@v0.23.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-operator-azure:v1.17.0 | true | Rancher head | usr/bin/cilium-operator-azure | github.com/go-jose/go-jose/v4@v4.0.4 | CVE-2025-27144 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-azure:v1.17.0 | true | Rancher head | usr/bin/cilium-operator-azure | github.com/golang-jwt/jwt/v4@v4.5.1 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-azure:v1.17.0 | true | Rancher head | usr/bin/cilium-operator-azure | github.com/osrg/gobgp/v3@v3.32.0 | CVE-2025-43970 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-azure:v1.17.0 | true | Rancher head | usr/bin/cilium-operator-azure | golang.org/x/net@v0.33.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-azure:v1.17.0 | true | Rancher head | usr/bin/cilium-operator-azure | golang.org/x/net@v0.33.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-azure:v1.17.0 | true | Rancher head | usr/bin/cilium-operator-azure | golang.org/x/oauth2@v0.24.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-operator-azure:v1.17.1 | true | Rancher head | usr/bin/cilium-operator-azure | github.com/go-jose/go-jose/v4@v4.0.4 | CVE-2025-27144 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-azure:v1.17.1 | true | Rancher head | usr/bin/cilium-operator-azure | github.com/golang-jwt/jwt/v4@v4.5.1 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-azure:v1.17.1 | true | Rancher head | usr/bin/cilium-operator-azure | github.com/osrg/gobgp/v3@v3.32.0 | CVE-2025-43970 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-azure:v1.17.1 | true | Rancher head | usr/bin/cilium-operator-azure | golang.org/x/net@v0.33.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-azure:v1.17.1 | true | Rancher head | usr/bin/cilium-operator-azure | golang.org/x/net@v0.33.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-azure:v1.17.1 | true | Rancher head | usr/bin/cilium-operator-azure | golang.org/x/oauth2@v0.24.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-operator-azure:v1.17.3 | true | Rancher head | usr/bin/cilium-operator-azure | github.com/golang-jwt/jwt/v4@v4.5.1 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-generic:v1.16.5 | true | Rancher head | usr/bin/cilium-operator-generic | github.com/go-jose/go-jose/v4@v4.0.2 | CVE-2025-27144 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-generic:v1.16.5 | true | Rancher head | usr/bin/cilium-operator-generic | github.com/osrg/gobgp/v3@v3.27.0 | CVE-2025-43970 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-generic:v1.16.5 | true | Rancher head | usr/bin/cilium-operator-generic | golang.org/x/net@v0.29.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-generic:v1.16.5 | true | Rancher head | usr/bin/cilium-operator-generic | golang.org/x/oauth2@v0.23.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-operator-generic:v1.17.0 | true | Rancher head | usr/bin/cilium-operator-generic | github.com/go-jose/go-jose/v4@v4.0.4 | CVE-2025-27144 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-generic:v1.17.0 | true | Rancher head | usr/bin/cilium-operator-generic | github.com/osrg/gobgp/v3@v3.32.0 | CVE-2025-43970 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-generic:v1.17.0 | true | Rancher head | usr/bin/cilium-operator-generic | golang.org/x/net@v0.33.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-generic:v1.17.0 | true | Rancher head | usr/bin/cilium-operator-generic | golang.org/x/net@v0.33.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-generic:v1.17.0 | true | Rancher head | usr/bin/cilium-operator-generic | golang.org/x/oauth2@v0.24.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-operator-generic:v1.17.1 | true | Rancher head | usr/bin/cilium-operator-generic | github.com/go-jose/go-jose/v4@v4.0.4 | CVE-2025-27144 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-generic:v1.17.1 | true | Rancher head | usr/bin/cilium-operator-generic | github.com/osrg/gobgp/v3@v3.32.0 | CVE-2025-43970 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-generic:v1.17.1 | true | Rancher head | usr/bin/cilium-operator-generic | golang.org/x/net@v0.33.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-generic:v1.17.1 | true | Rancher head | usr/bin/cilium-operator-generic | golang.org/x/net@v0.33.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-generic:v1.17.1 | true | Rancher head | usr/bin/cilium-operator-generic | golang.org/x/oauth2@v0.24.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coredns-coredns:1.12.0 | true | Rancher head | coredns | github.com/golang-jwt/jwt/v4@v4.5.1 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-coredns-coredns:1.12.0 | true | Rancher head | coredns | golang.org/x/crypto@v0.29.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coredns-coredns:1.12.0 | true | Rancher head | coredns | golang.org/x/crypto@v0.29.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coredns-coredns:1.12.0 | true | Rancher head | coredns | golang.org/x/net@v0.31.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coredns-coredns:1.12.0 | true | Rancher head | coredns | golang.org/x/net@v0.31.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coredns-coredns:1.12.0 | true | Rancher head | coredns | golang.org/x/oauth2@v0.24.0 | CVE-2025-22868 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-coredns-coredns:1.12.1 | true | Rancher head | coredns | golang.org/x/net@v0.37.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.8.7 | true | Rancher head | kube-vip | github.com/osrg/gobgp/v3@v3.27.0 | CVE-2025-43970 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.8.7 | true | Rancher head | kube-vip | golang.org/x/crypto@v0.23.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.8.7 | true | Rancher head | kube-vip | golang.org/x/crypto@v0.23.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.8.7 | true | Rancher head | kube-vip | golang.org/x/net@v0.25.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.8.7 | true | Rancher head | kube-vip | golang.org/x/net@v0.25.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.8.7 | true | Rancher head | kube-vip | golang.org/x/oauth2@v0.16.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-library-traefik:2.11.10 | true | Rancher head | usr/local/bin/traefik | github.com/go-jose/go-jose/v4@v4.0.2 | CVE-2025-27144 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-library-traefik:2.11.10 | true | Rancher head | usr/local/bin/traefik | github.com/golang-jwt/jwt/v4@v4.5.0 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-library-traefik:2.11.10 | true | Rancher head | usr/local/bin/traefik | github.com/golang-jwt/jwt/v5@v5.2.1 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-library-traefik:2.11.10 | true | Rancher head | usr/local/bin/traefik | golang.org/x/crypto@v0.27.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-library-traefik:2.11.10 | true | Rancher head | usr/local/bin/traefik | golang.org/x/crypto@v0.27.0 | CVE-2025-22869 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-library-traefik:2.11.10 | true | Rancher head | usr/local/bin/traefik | golang.org/x/net@v0.29.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-library-traefik:2.11.10 | true | Rancher head | usr/local/bin/traefik | golang.org/x/net@v0.29.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-library-traefik:2.11.10 | true | Rancher head | usr/local/bin/traefik | golang.org/x/oauth2@v0.21.0 | CVE-2025-22868 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-library-traefik:2.11.18 | true | Rancher head | usr/local/bin/traefik | github.com/go-jose/go-jose/v4@v4.0.4 | CVE-2025-27144 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-library-traefik:2.11.18 | true | Rancher head | usr/local/bin/traefik | github.com/golang-jwt/jwt/v4@v4.5.1 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-library-traefik:2.11.18 | true | Rancher head | usr/local/bin/traefik | github.com/golang-jwt/jwt/v5@v5.2.1 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-library-traefik:2.11.18 | true | Rancher head | usr/local/bin/traefik | golang.org/x/crypto@v0.31.0 | CVE-2025-22869 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-library-traefik:2.11.18 | true | Rancher head | usr/local/bin/traefik | golang.org/x/net@v0.33.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-library-traefik:2.11.18 | true | Rancher head | usr/local/bin/traefik | golang.org/x/oauth2@v0.24.0 | CVE-2025-22868 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-library-traefik:2.11.20 | true | Rancher head | usr/local/bin/traefik | github.com/go-jose/go-jose/v4@v4.0.4 | CVE-2025-27144 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-library-traefik:2.11.20 | true | Rancher head | usr/local/bin/traefik | github.com/golang-jwt/jwt/v4@v4.5.1 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-library-traefik:2.11.20 | true | Rancher head | usr/local/bin/traefik | github.com/golang-jwt/jwt/v5@v5.2.1 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-library-traefik:2.11.20 | true | Rancher head | usr/local/bin/traefik | golang.org/x/crypto@v0.31.0 | CVE-2025-22869 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-library-traefik:2.11.20 | true | Rancher head | usr/local/bin/traefik | golang.org/x/net@v0.33.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-library-traefik:2.11.20 | true | Rancher head | usr/local/bin/traefik | golang.org/x/oauth2@v0.24.0 | CVE-2025-22868 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-metrics-server:v0.7.2 | true | Rancher head | metrics-server | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-metrics-server:v0.7.2 | true | Rancher head | metrics-server | golang.org/x/crypto@v0.26.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-metrics-server:v0.7.2 | true | Rancher head | metrics-server | golang.org/x/net@v0.28.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-metrics-server:v0.7.2 | true | Rancher head | metrics-server | golang.org/x/net@v0.28.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-metrics-server:v0.7.2 | true | Rancher head | metrics-server | golang.org/x/oauth2@v0.16.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-attacher:v4.5.0 | true | Rancher head | csi-attacher | golang.org/x/net@v0.18.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-attacher:v4.5.0 | true | Rancher head | csi-attacher | golang.org/x/net@v0.18.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-attacher:v4.5.0 | true | Rancher head | csi-attacher | golang.org/x/oauth2@v0.13.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-attacher:v4.5.0 | true | Rancher head | csi-attacher | google.golang.org/protobuf@v1.31.0 | CVE-2024-24786 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-sig-storage-csi-attacher:v4.7.0 | true | Rancher head | csi-attacher | golang.org/x/net@v0.28.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-attacher:v4.7.0 | true | Rancher head | csi-attacher | golang.org/x/net@v0.28.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-attacher:v4.7.0 | true | Rancher head | csi-attacher | golang.org/x/oauth2@v0.22.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.10.0 | true | Rancher head | csi-node-driver-registrar | golang.org/x/net@v0.18.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.10.0 | true | Rancher head | csi-node-driver-registrar | golang.org/x/net@v0.18.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.10.0 | true | Rancher head | csi-node-driver-registrar | google.golang.org/protobuf@v1.31.0 | CVE-2024-24786 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.12.0 | true | Rancher head | csi-node-driver-registrar | golang.org/x/net@v0.28.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.12.0 | true | Rancher head | csi-node-driver-registrar | golang.org/x/net@v0.28.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.0 | true | Rancher head | csi-provisioner | golang.org/x/net@v0.19.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.0 | true | Rancher head | csi-provisioner | golang.org/x/net@v0.19.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.0 | true | Rancher head | csi-provisioner | golang.org/x/oauth2@v0.15.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.0 | true | Rancher head | csi-provisioner | google.golang.org/protobuf@v1.31.0 | CVE-2024-24786 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.1 | true | Rancher head | csi-provisioner | golang.org/x/net@v0.19.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.1 | true | Rancher head | csi-provisioner | golang.org/x/net@v0.19.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.1 | true | Rancher head | csi-provisioner | golang.org/x/oauth2@v0.15.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-resizer:v1.10.0 | true | Rancher head | csi-resizer | golang.org/x/net@v0.18.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-resizer:v1.10.0 | true | Rancher head | csi-resizer | golang.org/x/net@v0.18.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-resizer:v1.10.0 | true | Rancher head | csi-resizer | golang.org/x/oauth2@v0.13.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-resizer:v1.10.0 | true | Rancher head | csi-resizer | google.golang.org/protobuf@v1.31.0 | CVE-2024-24786 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-sig-storage-csi-resizer:v1.10.1 | true | Rancher head | csi-resizer | golang.org/x/net@v0.18.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-resizer:v1.10.1 | true | Rancher head | csi-resizer | golang.org/x/net@v0.18.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-resizer:v1.10.1 | true | Rancher head | csi-resizer | golang.org/x/oauth2@v0.13.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.1 | true | Rancher head | csi-snapshotter | golang.org/x/net@v0.20.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.1 | true | Rancher head | csi-snapshotter | golang.org/x/net@v0.20.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.1 | true | Rancher head | csi-snapshotter | golang.org/x/oauth2@v0.16.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.1 | true | Rancher head | csi-snapshotter | google.golang.org/protobuf@v1.32.0 | CVE-2024-24786 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.2 | true | Rancher head | csi-snapshotter | golang.org/x/net@v0.20.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.2 | true | Rancher head | csi-snapshotter | golang.org/x/net@v0.20.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.2 | true | Rancher head | csi-snapshotter | golang.org/x/oauth2@v0.16.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-livenessprobe:v2.12.0 | true | Rancher head | livenessprobe | golang.org/x/net@v0.18.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-livenessprobe:v2.12.0 | true | Rancher head | livenessprobe | golang.org/x/net@v0.18.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-livenessprobe:v2.12.0 | true | Rancher head | livenessprobe | google.golang.org/protobuf@v1.31.0 | CVE-2024-24786 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-sig-storage-livenessprobe:v2.14.0 | true | Rancher head | livenessprobe | golang.org/x/net@v0.28.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-livenessprobe:v2.14.0 | true | Rancher head | livenessprobe | golang.org/x/net@v0.28.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-snapshot-controller:v8.2.0 | true | Rancher head | snapshot-controller | golang.org/x/net@v0.31.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-snapshot-controller:v8.2.0 | true | Rancher head | snapshot-controller | golang.org/x/net@v0.31.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-snapshot-controller:v8.2.0 | true | Rancher head | snapshot-controller | golang.org/x/oauth2@v0.24.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/nginx-ingress-controller:v1.12.4-hardened2 | false | Rancher head | boost-license1_66_0 | boost-license1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/nginx-ingress-controller:v1.12.4-hardened2 | false | Rancher head | libboost_system1_66_0 | libboost_system1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/nginx-ingress-controller:v1.12.4-hardened2 | false | Rancher head | libboost_thread1_66_0 | libboost_thread1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/nginx-ingress-controller:v1.12.4-hardened2 | false | Rancher head | libsqlite3-0 | libsqlite3-0@3.49.1-150000.3.27.1 | SUSE-SU-2025:02672-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/nginx-ingress-controller:v1.12.4-hardened2 | false | Rancher head | libxml2-2 | libxml2-2@2.10.3-150500.5.29.1 | SUSE-SU-2025:02758-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/nginx-ingress-controller:v1.12.4-hardened2 | false | Rancher head | libxml2-tools | libxml2-tools@2.10.3-150500.5.29.1 | SUSE-SU-2025:02758-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/rancher:head | false | Rancher head | opt/drivers/management-state/bin/docker-machine-driver-harvester | github.com/golang/glog@v1.2.1 | CVE-2024-45339 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:head | false | Rancher head | opt/drivers/management-state/bin/docker-machine-driver-harvester | github.com/moby/moby@v1.4.2-0.20170731201646-1009e6a40b29 | CVE-2024-36621 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:head | false | Rancher head | opt/drivers/management-state/bin/docker-machine-driver-harvester | github.com/moby/moby@v1.4.2-0.20170731201646-1009e6a40b29 | CVE-2024-36623 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:head | false | Rancher head | opt/drivers/management-state/bin/docker-machine-driver-harvester | github.com/moby/moby@v1.4.2-0.20170731201646-1009e6a40b29 | CVE-2021-41091 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:head | false | Rancher head | opt/drivers/management-state/bin/docker-machine-driver-harvester | github.com/moby/moby@v1.4.2-0.20170731201646-1009e6a40b29 | CVE-2024-24557 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:head | false | Rancher head | opt/drivers/management-state/bin/docker-machine-driver-harvester | golang.org/x/crypto@v0.27.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:head | false | Rancher head | opt/drivers/management-state/bin/docker-machine-driver-harvester | golang.org/x/crypto@v0.27.0 | CVE-2025-22869 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:head | false | Rancher head | opt/drivers/management-state/bin/docker-machine-driver-harvester | golang.org/x/net@v0.29.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:head | false | Rancher head | opt/drivers/management-state/bin/docker-machine-driver-harvester | golang.org/x/net@v0.29.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:head | false | Rancher head | opt/drivers/management-state/bin/docker-machine-driver-harvester | golang.org/x/oauth2@v0.23.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:head | false | Rancher head | usr/bin/containerd | github.com/pion/interceptor@v0.1.37 | CVE-2025-49140 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:head | false | Rancher head | usr/bin/k3s | github.com/pion/interceptor@v0.1.37 | CVE-2025-49140 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:head | false | Rancher head | usr/bin/rancher-machine | github.com/golang-jwt/jwt/v4@v4.5.0 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-cloud-provider:v1.30.6-0.20241016053533-5ec454f50e7a-build20241016 | false | Rancher head | usr/local/bin/rke2-cloud-provider | github.com/golang-jwt/jwt/v4@v4.5.0 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-cloud-provider:v1.30.6-0.20241016053533-5ec454f50e7a-build20241016 | false | Rancher head | usr/local/bin/rke2-cloud-provider | golang.org/x/crypto@v0.27.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-cloud-provider:v1.30.6-0.20241016053533-5ec454f50e7a-build20241016 | false | Rancher head | usr/local/bin/rke2-cloud-provider | golang.org/x/crypto@v0.27.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-cloud-provider:v1.30.6-0.20241016053533-5ec454f50e7a-build20241016 | false | Rancher head | usr/local/bin/rke2-cloud-provider | golang.org/x/oauth2@v0.21.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-cloud-provider:v1.31.2-0.20241016053446-0955fa330f90-build20241016 | false | Rancher head | usr/local/bin/rke2-cloud-provider | github.com/golang-jwt/jwt/v4@v4.5.0 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-cloud-provider:v1.31.2-0.20241016053446-0955fa330f90-build20241016 | false | Rancher head | usr/local/bin/rke2-cloud-provider | golang.org/x/crypto@v0.27.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-cloud-provider:v1.31.2-0.20241016053446-0955fa330f90-build20241016 | false | Rancher head | usr/local/bin/rke2-cloud-provider | golang.org/x/crypto@v0.27.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-cloud-provider:v1.31.2-0.20241016053446-0955fa330f90-build20241016 | false | Rancher head | usr/local/bin/rke2-cloud-provider | golang.org/x/oauth2@v0.21.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-cloud-provider:v1.32.0-rc3.0.20241220224140-68fbd1a6b543-build20250101 | false | Rancher head | usr/local/bin/rke2-cloud-provider | github.com/golang-jwt/jwt/v4@v4.5.1 | CVE-2025-30204 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-cloud-provider:v1.32.0-rc3.0.20241220224140-68fbd1a6b543-build20250101 | false | Rancher head | usr/local/bin/rke2-cloud-provider | golang.org/x/crypto@v0.29.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-cloud-provider:v1.32.0-rc3.0.20241220224140-68fbd1a6b543-build20250101 | false | Rancher head | usr/local/bin/rke2-cloud-provider | golang.org/x/crypto@v0.29.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.30.14-rke2r1 | false | Rancher head | bin/containerd | github.com/go-jose/go-jose/v3@v3.0.3 | CVE-2025-27144 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.30.14-rke2r1 | false | Rancher head | bin/containerd | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.45.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.30.14-rke2r1 | false | Rancher head | bin/containerd | golang.org/x/crypto@v0.31.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.30.14-rke2r1 | false | Rancher head | bin/containerd | golang.org/x/net@v0.33.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.30.14-rke2r1 | false | Rancher head | bin/containerd | golang.org/x/net@v0.33.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.30.14-rke2r1 | false | Rancher head | bin/containerd | golang.org/x/oauth2@v0.11.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.30.14-rke2r1 | false | Rancher head | bin/containerd-shim-runc-v2 | golang.org/x/net@v0.33.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.30.14-rke2r1 | false | Rancher head | bin/containerd-shim-runc-v2 | golang.org/x/net@v0.33.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.30.14-rke2r1 | false | Rancher head | bin/crictl | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.30.14-rke2r1 | false | Rancher head | bin/crictl | golang.org/x/net@v0.24.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.30.14-rke2r1 | false | Rancher head | bin/crictl | golang.org/x/net@v0.24.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.30.14-rke2r1 | false | Rancher head | bin/crictl | golang.org/x/oauth2@v0.17.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.30.14-rke2r1 | false | Rancher head | bin/ctr | golang.org/x/net@v0.33.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.30.14-rke2r1 | false | Rancher head | bin/ctr | golang.org/x/net@v0.33.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.30.14-rke2r1 | false | Rancher head | bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.30.14-rke2r1 | false | Rancher head | bin/kubectl | golang.org/x/oauth2@v0.10.0 | CVE-2025-22868 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.30.14-rke2r1 | false | Rancher head | bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.30.14-rke2r1 | false | Rancher head | bin/kubelet | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.30.14-rke2r1 | false | Rancher head | bin/kubelet | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.30.14-rke2r1 | false | Rancher head | bin/kubelet | golang.org/x/crypto@v0.21.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.30.14-rke2r1 | false | Rancher head | bin/kubelet | golang.org/x/net@v0.23.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.30.14-rke2r1 | false | Rancher head | bin/kubelet | golang.org/x/oauth2@v0.10.0 | CVE-2025-22868 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.31.11-rke2r1 | false | Rancher head | bin/crictl | golang.org/x/net@v0.28.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.31.11-rke2r1 | false | Rancher head | bin/crictl | golang.org/x/net@v0.28.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.31.11-rke2r1 | false | Rancher head | bin/crictl | golang.org/x/oauth2@v0.21.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.31.11-rke2r1 | false | Rancher head | bin/kubectl | golang.org/x/net@v0.26.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.31.11-rke2r1 | false | Rancher head | bin/kubectl | golang.org/x/oauth2@v0.21.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.31.11-rke2r1 | false | Rancher head | bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.31.11-rke2r1 | false | Rancher head | bin/kubelet | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.31.11-rke2r1 | false | Rancher head | bin/kubelet | golang.org/x/crypto@v0.24.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.31.11-rke2r1 | false | Rancher head | bin/kubelet | golang.org/x/net@v0.26.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.31.11-rke2r1 | false | Rancher head | bin/kubelet | golang.org/x/oauth2@v0.21.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.32.7-rke2r1 | false | Rancher head | bin/crictl | golang.org/x/net@v0.30.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.32.7-rke2r1 | false | Rancher head | bin/crictl | golang.org/x/net@v0.30.0 | CVE-2025-22872 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.32.7-rke2r1 | false | Rancher head | bin/crictl | golang.org/x/oauth2@v0.23.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.32.7-rke2r1 | false | Rancher head | bin/kubectl | golang.org/x/net@v0.30.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.32.7-rke2r1 | false | Rancher head | bin/kubectl | golang.org/x/oauth2@v0.23.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.32.7-rke2r1 | false | Rancher head | bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.32.7-rke2r1 | false | Rancher head | bin/kubelet | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.32.7-rke2r1 | false | Rancher head | bin/kubelet | golang.org/x/crypto@v0.28.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.32.7-rke2r1 | false | Rancher head | bin/kubelet | golang.org/x/net@v0.30.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.32.7-rke2r1 | false | Rancher head | bin/kubelet | golang.org/x/oauth2@v0.23.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.33.3-rke2r1 | false | Rancher head | bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-upgrade:v1.30.14-rke2r1 | false | Rancher head | opt/rke2 | github.com/pion/interceptor@v0.1.37 | CVE-2025-49140 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-upgrade:v1.30.14-rke2r1 | false | Rancher head | opt/rke2 | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.45.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-upgrade:v1.30.14-rke2r1 | false | Rancher head | opt/rke2 | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-upgrade:v1.30.14-rke2r1 | false | Rancher head | opt/rke2 | golang.org/x/crypto@v0.17.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-upgrade:v1.30.14-rke2r1 | false | Rancher head | opt/rke2 | gopkg.in/square/go-jose.v2@v2.6.0 | CVE-2024-28180 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-upgrade:v1.30.14-rke2r1 | false | Rancher head | usr/local/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-upgrade:v1.30.14-rke2r1 | false | Rancher head | usr/local/bin/kubectl | golang.org/x/oauth2@v0.10.0 | CVE-2025-22868 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-upgrade:v1.31.11-rke2r1 | false | Rancher head | opt/rke2 | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-upgrade:v1.31.11-rke2r1 | false | Rancher head | opt/rke2 | golang.org/x/crypto@v0.24.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-upgrade:v1.31.11-rke2r1 | false | Rancher head | opt/rke2 | gopkg.in/square/go-jose.v2@v2.6.0 | CVE-2024-28180 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-upgrade:v1.31.11-rke2r1 | false | Rancher head | usr/local/bin/kubectl | golang.org/x/net@v0.26.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-upgrade:v1.31.11-rke2r1 | false | Rancher head | usr/local/bin/kubectl | golang.org/x/oauth2@v0.21.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-upgrade:v1.32.7-rke2r1 | false | Rancher head | opt/rke2 | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-upgrade:v1.32.7-rke2r1 | false | Rancher head | opt/rke2 | golang.org/x/crypto@v0.28.0 | CVE-2025-22869 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-upgrade:v1.32.7-rke2r1 | false | Rancher head | opt/rke2 | gopkg.in/square/go-jose.v2@v2.6.0 | CVE-2024-28180 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-upgrade:v1.32.7-rke2r1 | false | Rancher head | usr/local/bin/kubectl | golang.org/x/net@v0.30.0 | CVE-2025-22870 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-upgrade:v1.32.7-rke2r1 | false | Rancher head | usr/local/bin/kubectl | golang.org/x/oauth2@v0.23.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.5.0 | false | Rancher head | usr/local/bin/k9s | helm.sh/helm/v3@v3.18.4 | CVE-2025-55198 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/shell:v0.5.0 | false | Rancher head | usr/local/bin/k9s | helm.sh/helm/v3@v3.18.4 | CVE-2025-55199 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/ui-plugin-catalog:4.0.2 | false | Rancher head | boost-license1_66_0 | boost-license1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/ui-plugin-catalog:4.0.2 | false | Rancher head | libboost_system1_66_0 | libboost_system1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/ui-plugin-catalog:4.0.2 | false | Rancher head | libboost_thread1_66_0 | libboost_thread1_66_0@1.66.0-12.3.1 | SUSE-SU-2025:02536-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |