Search:
Image | Mirrored | Release | Binary/Package | Dependency | Vulnerability ID (CVE) | Severity | Status | Justification (for status not affected) | Type (language or OS) |
---|---|---|---|---|---|---|---|---|---|
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/bandwidth | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/calico | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/calico-ipam | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/flannel | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/host-local | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/install | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/loopback | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/tuning | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/bandwidth | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/calico | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/calico-ipam | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/flannel | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/host-local | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/install | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/loopback | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/tuning | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/bridge | stdlib@v1.20.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/bridge | stdlib@v1.20.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/bridge | stdlib@v1.20.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/bridge | stdlib@v1.20.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/bridge | stdlib@v1.20.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/bridge | stdlib@v1.20.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/dhcp | stdlib@v1.20.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/dhcp | stdlib@v1.20.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/dhcp | stdlib@v1.20.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/dhcp | stdlib@v1.20.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/dhcp | stdlib@v1.20.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/dhcp | stdlib@v1.20.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/flannel | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/flannel | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/flannel | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/flannel | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/flannel | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/host-local | stdlib@v1.20.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/host-local | stdlib@v1.20.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/host-local | stdlib@v1.20.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/host-local | stdlib@v1.20.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/host-local | stdlib@v1.20.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/host-local | stdlib@v1.20.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/ipvlan | stdlib@v1.20.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/ipvlan | stdlib@v1.20.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/ipvlan | stdlib@v1.20.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/ipvlan | stdlib@v1.20.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/ipvlan | stdlib@v1.20.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/ipvlan | stdlib@v1.20.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/loopback | stdlib@v1.20.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/loopback | stdlib@v1.20.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/loopback | stdlib@v1.20.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/loopback | stdlib@v1.20.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/loopback | stdlib@v1.20.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/loopback | stdlib@v1.20.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/macvlan | stdlib@v1.20.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/macvlan | stdlib@v1.20.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/macvlan | stdlib@v1.20.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/macvlan | stdlib@v1.20.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/macvlan | stdlib@v1.20.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/macvlan | stdlib@v1.20.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.20.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.20.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.20.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.20.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.20.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.20.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/ptp | stdlib@v1.20.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/ptp | stdlib@v1.20.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/ptp | stdlib@v1.20.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/ptp | stdlib@v1.20.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/ptp | stdlib@v1.20.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/ptp | stdlib@v1.20.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/tuning | stdlib@v1.20.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/tuning | stdlib@v1.20.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/tuning | stdlib@v1.20.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/tuning | stdlib@v1.20.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/tuning | stdlib@v1.20.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/tuning | stdlib@v1.20.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/vlan | stdlib@v1.20.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/vlan | stdlib@v1.20.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/vlan | stdlib@v1.20.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/vlan | stdlib@v1.20.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/vlan | stdlib@v1.20.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.10.3 | opt/cni/bin/vlan | stdlib@v1.20.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/bridge | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/bridge | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/bridge | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/dhcp | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/dhcp | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/dhcp | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/flannel | stdlib@v1.21.9 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/flannel | stdlib@v1.21.9 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/host-local | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/host-local | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/host-local | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/ipvlan | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/ipvlan | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/ipvlan | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/loopback | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/loopback | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/loopback | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/macvlan | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/macvlan | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/macvlan | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/ptp | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/ptp | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/ptp | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/tuning | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/tuning | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/tuning | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/vlan | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/vlan | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v1.4.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/vlan | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/fleet:v0.11.4 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.20.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-addon-resizer:1.8.20-build20240910 | false | Rancher v2.10.3 | pod_nanny | golang.org/x/net@v0.17.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-addon-resizer:1.8.20-build20241001 | false | Rancher v2.10.3 | pod_nanny | golang.org/x/net@v0.17.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240911 | false | Rancher v2.10.3 | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.1-build20240911 | false | Rancher v2.10.3 | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.1.4-150600.5.15.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.1-build20240911 | false | Rancher v2.10.3 | libopenssl3 | libopenssl3@3.1.4-150600.5.15.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.1-build20240911 | false | Rancher v2.10.3 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.1-build20240911 | false | Rancher v2.10.3 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.1-build20240911 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.1-build20240911 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.1-build20240911 | false | Rancher v2.10.3 | openssl-3 | openssl-3@3.1.4-150600.5.15.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.1-build20240911 | false | Rancher v2.10.3 | calicoctl | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240911 | false | Rancher v2.10.3 | calicoctl | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.2-build20241016 | false | Rancher v2.10.3 | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.2-build20241016 | false | Rancher v2.10.3 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.2-build20241016 | false | Rancher v2.10.3 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.2-build20241016 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.2-build20241016 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.2-build20241016 | false | Rancher v2.10.3 | calicoctl | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.2-build20241016 | false | Rancher v2.10.3 | calicoctl | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.29.0-build20241104 | false | Rancher v2.10.3 | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.0-build20241104 | false | Rancher v2.10.3 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.0-build20241104 | false | Rancher v2.10.3 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.0-build20241104 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.0-build20241104 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.1-build20241211 | false | Rancher v2.10.3 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.1-build20241211 | false | Rancher v2.10.3 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.1-build20241211 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.1-build20241211 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher v2.10.3 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher v2.10.3 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-coredns:v1.11.1-build20240910 | false | Rancher v2.10.3 | coredns | github.com/quic-go/quic-go@v0.37.4 | CVE-2024-22189 | HIGH | affected | gobinary | |
rancher/hardened-coredns:v1.11.1-build20240910 | false | Rancher v2.10.3 | coredns | google.golang.org/grpc@v1.57.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/hardened-dns-node-cache:1.23.1-build20240910 | false | Rancher v2.10.3 | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2023-5528 | HIGH | affected | gobinary | |
rancher/hardened-dns-node-cache:1.23.1-build20240910 | false | Rancher v2.10.3 | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2024-0793 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-dns-node-cache:1.23.1-build20240910 | false | Rancher v2.10.3 | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/hardened-dns-node-cache:1.23.1-build20241008 | false | Rancher v2.10.3 | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2023-5528 | HIGH | affected | gobinary | |
rancher/hardened-dns-node-cache:1.23.1-build20241008 | false | Rancher v2.10.3 | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2024-0793 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-dns-node-cache:1.23.1-build20241008 | false | Rancher v2.10.3 | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/hardened-flannel:v0.25.6-build20240910 | false | Rancher v2.10.3 | glib2-tools | glib2-tools@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.6-build20240910 | false | Rancher v2.10.3 | libgio-2_0-0 | libgio-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.6-build20240910 | false | Rancher v2.10.3 | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.6-build20240910 | false | Rancher v2.10.3 | libgmodule-2_0-0 | libgmodule-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.6-build20240910 | false | Rancher v2.10.3 | libgobject-2_0-0 | libgobject-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.6-build20240910 | false | Rancher v2.10.3 | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.1.4-150600.5.15.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.6-build20240910 | false | Rancher v2.10.3 | libopenssl3 | libopenssl3@3.1.4-150600.5.15.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.6-build20240910 | false | Rancher v2.10.3 | libsoup-2_4-1 | libsoup-2_4-1@2.74.3-150600.2.2 | SUSE-SU-2024:4290-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.6-build20240910 | false | Rancher v2.10.3 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.6-build20240910 | false | Rancher v2.10.3 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.6-build20240910 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.6-build20240910 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.6-build20240910 | false | Rancher v2.10.3 | openssl-3 | openssl-3@3.1.4-150600.5.15.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.7-build20241008 | false | Rancher v2.10.3 | glib2-tools | glib2-tools@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.7-build20241008 | false | Rancher v2.10.3 | libgio-2_0-0 | libgio-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.7-build20241008 | false | Rancher v2.10.3 | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.7-build20241008 | false | Rancher v2.10.3 | libgmodule-2_0-0 | libgmodule-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.7-build20241008 | false | Rancher v2.10.3 | libgobject-2_0-0 | libgobject-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.7-build20241008 | false | Rancher v2.10.3 | libsoup-2_4-1 | libsoup-2_4-1@2.74.3-150600.2.2 | SUSE-SU-2024:4290-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.7-build20241008 | false | Rancher v2.10.3 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.7-build20241008 | false | Rancher v2.10.3 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.7-build20241008 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.7-build20241008 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.0-build20241024 | false | Rancher v2.10.3 | glib2-tools | glib2-tools@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.0-build20241024 | false | Rancher v2.10.3 | libgio-2_0-0 | libgio-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.0-build20241024 | false | Rancher v2.10.3 | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.0-build20241024 | false | Rancher v2.10.3 | libgmodule-2_0-0 | libgmodule-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.0-build20241024 | false | Rancher v2.10.3 | libgobject-2_0-0 | libgobject-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.0-build20241024 | false | Rancher v2.10.3 | libsoup-2_4-1 | libsoup-2_4-1@2.74.3-150600.2.2 | SUSE-SU-2024:4290-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.0-build20241024 | false | Rancher v2.10.3 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.0-build20241024 | false | Rancher v2.10.3 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.0-build20241024 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.0-build20241024 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.1-build20241107 | false | Rancher v2.10.3 | glib2-tools | glib2-tools@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.1-build20241107 | false | Rancher v2.10.3 | libgio-2_0-0 | libgio-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.1-build20241107 | false | Rancher v2.10.3 | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.1-build20241107 | false | Rancher v2.10.3 | libgmodule-2_0-0 | libgmodule-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.1-build20241107 | false | Rancher v2.10.3 | libgobject-2_0-0 | libgobject-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.1-build20241107 | false | Rancher v2.10.3 | libsoup-2_4-1 | libsoup-2_4-1@2.74.3-150600.2.2 | SUSE-SU-2024:4290-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.1-build20241107 | false | Rancher v2.10.3 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.1-build20241107 | false | Rancher v2.10.3 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.1-build20241107 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.1-build20241107 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.1-build20241211 | false | Rancher v2.10.3 | libsoup-2_4-1 | libsoup-2_4-1@2.74.3-150600.2.2 | SUSE-SU-2024:4290-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.1-build20241211 | false | Rancher v2.10.3 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.1-build20241211 | false | Rancher v2.10.3 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.1-build20241211 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.1-build20241211 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher v2.10.3 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher v2.10.3 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.26.3-build20250108 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-kubernetes:v1.29.13-rke2r1-build20250117 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/hardened-kubernetes:v1.29.13-rke2r1-build20250117 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-kubernetes:v1.30.9-rke2r1-build20250116 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/hardened-kubernetes:v1.30.9-rke2r1-build20250116 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-kubernetes:v1.31.5-rke2r1-build20250115 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/hardened-kubernetes:v1.31.5-rke2r1-build20250115 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-multus-cni:v4.1.3-build20241028 | false | Rancher v2.10.3 | cert-approver | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.1.3-build20241028 | false | Rancher v2.10.3 | install_multus | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.1.3-build20241028 | false | Rancher v2.10.3 | kubeconfig_generator | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.1.3-build20241028 | false | Rancher v2.10.3 | thin_entrypoint | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.1.3-build20241028 | false | Rancher v2.10.3 | usr/src/multus-cni/bin/multus | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.1.4-build20250108 | false | Rancher v2.10.3 | cert-approver | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.1.4-build20250108 | false | Rancher v2.10.3 | install_multus | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.1.4-build20250108 | false | Rancher v2.10.3 | kubeconfig_generator | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.1.4-build20250108 | false | Rancher v2.10.3 | thin_entrypoint | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.1.4-build20250108 | false | Rancher v2.10.3 | usr/src/multus-cni/bin/multus | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-whereabouts:v0.8.0-build20240910 | false | Rancher v2.10.3 | ip-control-loop | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-whereabouts:v0.8.0-build20240910 | false | Rancher v2.10.3 | whereabouts | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-whereabouts:v0.8.0-build20241011 | false | Rancher v2.10.3 | ip-control-loop | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-whereabouts:v0.8.0-build20241011 | false | Rancher v2.10.3 | whereabouts | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.2 | false | Rancher v2.10.3 | usr/bin/harvester-cloud-provider | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2019-12274 | HIGH | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.2 | false | Rancher v2.10.3 | usr/bin/harvester-cloud-provider | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2021-36775 | HIGH | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.2 | false | Rancher v2.10.3 | usr/bin/harvester-cloud-provider | github.com/rancher/steve@v0.0.0-20221209194631-acf9d31ce0dd | CVE-2024-52280 | HIGH | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.2 | false | Rancher v2.10.3 | usr/bin/harvester-cloud-provider | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.2 | false | Rancher v2.10.3 | usr/bin/harvester-cloud-provider | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher v2.10.3 | usr/bin/harvester-cloud-provider | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2019-12274 | HIGH | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher v2.10.3 | usr/bin/harvester-cloud-provider | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2021-36775 | HIGH | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher v2.10.3 | usr/bin/harvester-cloud-provider | github.com/rancher/steve@v0.0.0-20221209194631-acf9d31ce0dd | CVE-2024-52280 | HIGH | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher v2.10.3 | usr/bin/harvester-cloud-provider | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/harvester-csi-driver:v0.1.7 | false | Rancher v2.10.3 | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.11.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.7 | false | Rancher v2.10.3 | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150500.12.2.2 | SUSE-SU-2024:3747-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.7 | false | Rancher v2.10.3 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.7 | false | Rancher v2.10.3 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.7 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.7 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.7 | false | Rancher v2.10.3 | usr/bin/harvester-csi-driver | k8s.io/kubernetes@v1.24.9 | CVE-2023-3955 | HIGH | affected | gobinary | |
rancher/harvester-csi-driver:v0.1.7 | false | Rancher v2.10.3 | usr/bin/harvester-csi-driver | k8s.io/kubernetes@v1.24.9 | CVE-2023-5528 | HIGH | affected | gobinary | |
rancher/harvester-csi-driver:v0.1.7 | false | Rancher v2.10.3 | usr/bin/harvester-csi-driver | k8s.io/kubernetes@v1.24.9 | CVE-2024-0793 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-csi-driver:v0.1.7 | false | Rancher v2.10.3 | usr/bin/harvester-csi-driver | k8s.io/kubernetes@v1.24.9 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/harvester-csi-driver:v0.1.7 | false | Rancher v2.10.3 | usr/bin/harvester-csi-driver | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-csi-driver:v0.2.1 | false | Rancher v2.10.3 | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.1 | false | Rancher v2.10.3 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.1 | false | Rancher v2.10.3 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.1 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.1 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher v2.10.3 | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher v2.10.3 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher v2.10.3 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.10.3 | glibc | glibc@2.31-150300.63.1 | SUSE-SU-2024:1375-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.10.3 | glibc | glibc@2.31-150300.63.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.10.3 | krb5 | krb5@1.19.2-150300.13.1 | SUSE-SU-2024:1001-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.10.3 | krb5 | krb5@1.19.2-150300.13.1 | SUSE-SU-2024:2303-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.10.3 | libblkid1 | libblkid1@2.36.2-150300.4.35.1 | SUSE-SU-2024:1170-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.10.3 | libfdisk1 | libfdisk1@2.36.2-150300.4.35.1 | SUSE-SU-2024:1170-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.10.3 | libglib-2_0-0 | libglib-2_0-0@2.62.6-150200.3.15.1 | SUSE-SU-2024:3998-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.10.3 | libmount1 | libmount1@2.36.2-150300.4.35.1 | SUSE-SU-2024:1170-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.10.3 | libnghttp2-14 | libnghttp2-14@1.40.0-150200.12.1 | SUSE-SU-2024:1167-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.10.3 | libopenssl1_1 | libopenssl1_1@1.1.1d-150200.11.82.1 | SUSE-SU-2024:2035-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.10.3 | libopenssl1_1-hmac | libopenssl1_1-hmac@1.1.1d-150200.11.82.1 | SUSE-SU-2024:2035-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.10.3 | libsmartcols1 | libsmartcols1@2.36.2-150300.4.35.1 | SUSE-SU-2024:1170-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.10.3 | libssh4 | libssh4@0.8.7-10.12.1 | SUSE-SU-2024:0525-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.10.3 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.10.3 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.10.3 | libuuid1 | libuuid1@2.36.2-150300.4.35.1 | SUSE-SU-2024:1170-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.9.7-150000.3.63.1 | SUSE-SU-2024:0461-2 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.9.7-150000.3.63.1 | SUSE-SU-2025:0303-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.10.3 | openssl-1_1 | openssl-1_1@1.1.1d-150200.11.82.1 | SUSE-SU-2024:2035-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.10.3 | perl | perl@5.26.1-150300.17.14.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.10.3 | perl-base | perl-base@5.26.1-150300.17.14.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.10.3 | util-linux | util-linux@2.36.2-150300.4.35.1 | SUSE-SU-2024:1170-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.10.3 | usr/bin/istioctl | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.10.3 | usr/bin/istioctl | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.10.3 | usr/bin/istioctl | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubectl | stdlib@v1.21.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubectl | stdlib@v1.21.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubectl | stdlib@v1.21.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.10.3 | glibc | glibc@2.31-150300.63.1 | SUSE-SU-2024:1375-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.10.3 | glibc | glibc@2.31-150300.63.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.10.3 | krb5 | krb5@1.19.2-150300.13.1 | SUSE-SU-2024:1001-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.10.3 | krb5 | krb5@1.19.2-150300.13.1 | SUSE-SU-2024:2303-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.10.3 | libblkid1 | libblkid1@2.36.2-150300.4.35.1 | SUSE-SU-2024:1170-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.10.3 | libfdisk1 | libfdisk1@2.36.2-150300.4.35.1 | SUSE-SU-2024:1170-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.10.3 | libglib-2_0-0 | libglib-2_0-0@2.62.6-150200.3.15.1 | SUSE-SU-2024:3998-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.10.3 | libmount1 | libmount1@2.36.2-150300.4.35.1 | SUSE-SU-2024:1170-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.10.3 | libnghttp2-14 | libnghttp2-14@1.40.0-150200.12.1 | SUSE-SU-2024:1167-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.10.3 | libopenssl1_1 | libopenssl1_1@1.1.1d-150200.11.82.1 | SUSE-SU-2024:2035-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.10.3 | libopenssl1_1-hmac | libopenssl1_1-hmac@1.1.1d-150200.11.82.1 | SUSE-SU-2024:2035-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.10.3 | libsmartcols1 | libsmartcols1@2.36.2-150300.4.35.1 | SUSE-SU-2024:1170-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.10.3 | libssh4 | libssh4@0.8.7-10.12.1 | SUSE-SU-2024:0525-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.10.3 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.10.3 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.10.3 | libuuid1 | libuuid1@2.36.2-150300.4.35.1 | SUSE-SU-2024:1170-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.9.7-150000.3.63.1 | SUSE-SU-2024:0461-2 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.9.7-150000.3.63.1 | SUSE-SU-2025:0303-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.10.3 | openssl-1_1 | openssl-1_1@1.1.1d-150200.11.82.1 | SUSE-SU-2024:2035-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.10.3 | perl | perl@5.26.1-150300.17.14.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.10.3 | perl-base | perl-base@5.26.1-150300.17.14.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.10.3 | util-linux | util-linux@2.36.2-150300.4.35.1 | SUSE-SU-2024:1170-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.10.3 | usr/bin/istioctl | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.10.3 | usr/bin/istioctl | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.10.3 | usr/bin/istioctl | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubectl | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubectl | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubectl | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher v2.10.3 | glibc | glibc@2.31-150300.63.1 | SUSE-SU-2024:1375-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher v2.10.3 | glibc | glibc@2.31-150300.63.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher v2.10.3 | krb5 | krb5@1.19.2-150300.13.1 | SUSE-SU-2024:1001-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher v2.10.3 | krb5 | krb5@1.19.2-150300.13.1 | SUSE-SU-2024:2303-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher v2.10.3 | libblkid1 | libblkid1@2.36.2-150300.4.35.1 | SUSE-SU-2024:1170-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher v2.10.3 | libfdisk1 | libfdisk1@2.36.2-150300.4.35.1 | SUSE-SU-2024:1170-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher v2.10.3 | libglib-2_0-0 | libglib-2_0-0@2.62.6-150200.3.15.1 | SUSE-SU-2024:3998-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher v2.10.3 | libmount1 | libmount1@2.36.2-150300.4.35.1 | SUSE-SU-2024:1170-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher v2.10.3 | libnghttp2-14 | libnghttp2-14@1.40.0-150200.12.1 | SUSE-SU-2024:1167-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher v2.10.3 | libopenssl1_1 | libopenssl1_1@1.1.1d-150200.11.82.1 | SUSE-SU-2024:2035-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher v2.10.3 | libopenssl1_1-hmac | libopenssl1_1-hmac@1.1.1d-150200.11.82.1 | SUSE-SU-2024:2035-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher v2.10.3 | libsmartcols1 | libsmartcols1@2.36.2-150300.4.35.1 | SUSE-SU-2024:1170-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher v2.10.3 | libssh4 | libssh4@0.8.7-10.12.1 | SUSE-SU-2024:0525-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher v2.10.3 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher v2.10.3 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher v2.10.3 | libuuid1 | libuuid1@2.36.2-150300.4.35.1 | SUSE-SU-2024:1170-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.9.7-150000.3.63.1 | SUSE-SU-2024:0461-2 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.9.7-150000.3.63.1 | SUSE-SU-2025:0303-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher v2.10.3 | openssl-1_1 | openssl-1_1@1.1.1d-150200.11.82.1 | SUSE-SU-2024:2035-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher v2.10.3 | perl | perl@5.26.1-150300.17.14.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher v2.10.3 | perl-base | perl-base@5.26.1-150300.17.14.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher v2.10.3 | util-linux | util-linux@2.36.2-150300.4.35.1 | SUSE-SU-2024:1170-1 | HIGH | affected | sles | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher v2.10.3 | usr/bin/istioctl | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher v2.10.3 | usr/bin/istioctl | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher v2.10.3 | usr/bin/istioctl | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubectl | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/istio-installer:1.23.2-rancher1 | false | Rancher v2.10.3 | libopenssl3 | libopenssl3@3.1.4-150600.5.15.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/istio-installer:1.23.2-rancher1 | false | Rancher v2.10.3 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/istio-installer:1.23.2-rancher1 | false | Rancher v2.10.3 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/istio-installer:1.23.2-rancher1 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/istio-installer:1.23.2-rancher1 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/istio-installer:1.23.2-rancher1 | false | Rancher v2.10.3 | nginx | nginx@1.21.5-150600.8.4 | SUSE-SU-2025:0283-1 | HIGH | affected | sles | |
rancher/istio-installer:1.23.2-rancher1 | false | Rancher v2.10.3 | openssl-3 | openssl-3@3.1.4-150600.5.15.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/istio-installer:1.23.2-rancher1 | false | Rancher v2.10.3 | usr/bin/istioctl | stdlib@v1.22.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/istio-installer:1.23.2-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubectl | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/istio-installer:1.24.1-rancher1 | false | Rancher v2.10.3 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/istio-installer:1.24.1-rancher1 | false | Rancher v2.10.3 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/istio-installer:1.24.1-rancher1 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/istio-installer:1.24.1-rancher1 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/istio-installer:1.24.1-rancher1 | false | Rancher v2.10.3 | nginx | nginx@1.21.5-150600.8.4 | SUSE-SU-2025:0283-1 | HIGH | affected | sles | |
rancher/istio-installer:1.24.1-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubectl | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.9.2-build20240828 | false | Rancher v2.10.3 | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | stdlib@v1.23.0 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.9.2-build20240828 | false | Rancher v2.10.3 | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.9.2-build20240828 | false | Rancher v2.10.3 | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | golang.org/x/net@v0.28.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.9.2-build20240828 | false | Rancher v2.10.3 | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | stdlib@v1.23.0 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.9.2-build20240828 | false | Rancher v2.10.3 | usr/bin/helm | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.17.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.28.14 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.22.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.29.0 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.29.0 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.29.0 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.29.2 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.29.2 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.29.2 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.31.1 | false | Rancher v2.10.3 | bin/kubectl | stdlib@v1.22.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/local-path-provisioner:v0.0.28 | false | Rancher v2.10.3 | usr/bin/local-path-provisioner | stdlib@v1.21.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/local-path-provisioner:v0.0.28 | false | Rancher v2.10.3 | usr/bin/local-path-provisioner | stdlib@v1.21.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/local-path-provisioner:v0.0.28 | false | Rancher v2.10.3 | usr/bin/local-path-provisioner | stdlib@v1.21.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/machine:v0.15.0-rancher125 | false | Rancher v2.10.3 | git-core | git-core@2.43.0-150600.3.6.1 | SUSE-SU-2025:0116-1 | HIGH | affected | sles | |
rancher/mirrored-brancz-kube-rbac-proxy:v0.18.0 | true | Rancher v2.10.3 | usr/local/bin/kube-rbac-proxy | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.28.1 | true | Rancher v2.10.3 | code/apiserver | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.28.1 | true | Rancher v2.10.3 | opt/cni/bin/bandwidth | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.28.1 | true | Rancher v2.10.3 | opt/cni/bin/calico | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.28.1 | true | Rancher v2.10.3 | opt/cni/bin/calico-ipam | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.28.1 | true | Rancher v2.10.3 | opt/cni/bin/flannel | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.28.1 | true | Rancher v2.10.3 | opt/cni/bin/host-local | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.28.1 | true | Rancher v2.10.3 | opt/cni/bin/install | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.28.1 | true | Rancher v2.10.3 | opt/cni/bin/loopback | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.28.1 | true | Rancher v2.10.3 | opt/cni/bin/portmap | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.28.1 | true | Rancher v2.10.3 | opt/cni/bin/tuning | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-csi:v3.28.1 | true | Rancher v2.10.3 | usr/bin/csi-driver | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-csi:v3.28.1 | true | Rancher v2.10.3 | usr/bin/csi-driver | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-csi:v3.28.2 | true | Rancher v2.10.3 | usr/bin/csi-driver | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-csi:v3.29.0 | true | Rancher v2.10.3 | usr/bin/csi-driver | golang.org/x/net@v0.26.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-csi:v3.29.1 | true | Rancher v2.10.3 | usr/bin/csi-driver | golang.org/x/net@v0.26.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.27.4 | true | Rancher v2.10.3 | calicoctl | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.27.4 | true | Rancher v2.10.3 | calicoctl | golang.org/x/net@v0.26.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.27.4 | true | Rancher v2.10.3 | calicoctl | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.28.1 | true | Rancher v2.10.3 | usr/bin/calicoctl | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.28.1 | true | Rancher v2.10.3 | usr/bin/calicoctl | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.28.1 | true | Rancher v2.10.3 | usr/bin/calicoctl | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.28.2 | true | Rancher v2.10.3 | usr/bin/calicoctl | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.28.2 | true | Rancher v2.10.3 | usr/bin/calicoctl | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.29.0 | true | Rancher v2.10.3 | usr/bin/calicoctl | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.29.0 | true | Rancher v2.10.3 | usr/bin/calicoctl | golang.org/x/net@v0.26.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.29.1 | true | Rancher v2.10.3 | usr/bin/calicoctl | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.29.1 | true | Rancher v2.10.3 | usr/bin/calicoctl | golang.org/x/net@v0.26.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.27.4 | true | Rancher v2.10.3 | usr/bin/check-status | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.27.4 | true | Rancher v2.10.3 | usr/bin/kube-controllers | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.28.1 | true | Rancher v2.10.3 | usr/bin/check-status | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.28.1 | true | Rancher v2.10.3 | usr/bin/kube-controllers | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node-driver-registrar:v3.28.1 | true | Rancher v2.10.3 | usr/bin/node-driver-registrar | golang.org/x/net@v0.25.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node-driver-registrar:v3.28.1 | true | Rancher v2.10.3 | usr/bin/node-driver-registrar | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node-driver-registrar:v3.28.2 | true | Rancher v2.10.3 | usr/bin/node-driver-registrar | golang.org/x/net@v0.25.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node-driver-registrar:v3.29.0 | true | Rancher v2.10.3 | usr/bin/node-driver-registrar | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node-driver-registrar:v3.29.1 | true | Rancher v2.10.3 | usr/bin/node-driver-registrar | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.27.4 | true | Rancher v2.10.3 | usr/bin/calico-node | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.27.4 | true | Rancher v2.10.3 | usr/bin/calico-node | golang.org/x/net@v0.26.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.27.4 | true | Rancher v2.10.3 | usr/bin/calico-node | k8s.io/kubernetes@v1.27.15 | CVE-2024-10220 | HIGH | affected | gobinary | |
rancher/mirrored-calico-node:v3.27.4 | true | Rancher v2.10.3 | usr/bin/calico-node | k8s.io/kubernetes@v1.27.15 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/mirrored-calico-node:v3.27.4 | true | Rancher v2.10.3 | usr/bin/calico-node | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.27.4 | true | Rancher v2.10.3 | usr/bin/mountns | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.28.1 | true | Rancher v2.10.3 | usr/bin/calico-node | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.28.1 | true | Rancher v2.10.3 | usr/bin/calico-node | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.28.1 | true | Rancher v2.10.3 | usr/bin/calico-node | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.28.1 | true | Rancher v2.10.3 | usr/bin/mountns | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.28.2 | true | Rancher v2.10.3 | usr/bin/calico-node | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.28.2 | true | Rancher v2.10.3 | usr/bin/calico-node | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.29.0 | true | Rancher v2.10.3 | usr/bin/calico-node | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.29.0 | true | Rancher v2.10.3 | usr/bin/calico-node | golang.org/x/net@v0.26.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.29.1 | true | Rancher v2.10.3 | usr/bin/calico-node | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.29.1 | true | Rancher v2.10.3 | usr/bin/calico-node | golang.org/x/net@v0.26.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.34.3 | true | Rancher v2.10.3 | usr/bin/operator | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.34.3 | true | Rancher v2.10.3 | usr/bin/operator | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.34.3 | true | Rancher v2.10.3 | usr/bin/operator | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.34.5 | true | Rancher v2.10.3 | usr/bin/operator | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.34.5 | true | Rancher v2.10.3 | usr/bin/operator | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.36.0 | true | Rancher v2.10.3 | usr/bin/operator | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.36.0 | true | Rancher v2.10.3 | usr/bin/operator | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.36.2 | true | Rancher v2.10.3 | usr/bin/operator | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.36.2 | true | Rancher v2.10.3 | usr/bin/operator | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-pod2daemon-flexvol:v3.27.4 | true | Rancher v2.10.3 | usr/local/bin/flexvol | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-pod2daemon-flexvol:v3.28.1 | true | Rancher v2.10.3 | usr/local/bin/flexvol | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-typha:v3.28.1 | true | Rancher v2.10.3 | usr/bin/calico-typha | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-certgen:v0.2.0 | true | Rancher v2.10.3 | usr/bin/cilium-certgen | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-certgen:v0.2.0 | true | Rancher v2.10.3 | usr/bin/cilium-certgen | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-certgen:v0.2.0 | true | Rancher v2.10.3 | usr/bin/cilium-certgen | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.1 | true | Rancher v2.10.3 | cni/loopback | stdlib@v1.22.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.1 | true | Rancher v2.10.3 | cni/loopback | stdlib@v1.22.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.1 | true | Rancher v2.10.3 | opt/cni/bin/cilium-cni | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.1 | true | Rancher v2.10.3 | usr/bin/cilium-agent | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.1 | true | Rancher v2.10.3 | usr/bin/cilium-bugtool | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.1 | true | Rancher v2.10.3 | usr/bin/cilium-dbg | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.1 | true | Rancher v2.10.3 | usr/bin/cilium-health | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.1 | true | Rancher v2.10.3 | usr/bin/cilium-health-responder | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.1 | true | Rancher v2.10.3 | usr/bin/cilium-mount | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.1 | true | Rancher v2.10.3 | usr/bin/cilium-sysctlfix | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.1 | true | Rancher v2.10.3 | usr/bin/gops | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.1 | true | Rancher v2.10.3 | usr/bin/hubble | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.2 | true | Rancher v2.10.3 | cni/loopback | stdlib@v1.22.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.2 | true | Rancher v2.10.3 | cni/loopback | stdlib@v1.22.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.3 | true | Rancher v2.10.3 | cni/loopback | stdlib@v1.22.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.3 | true | Rancher v2.10.3 | cni/loopback | stdlib@v1.22.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.4 | true | Rancher v2.10.3 | cni/loopback | stdlib@v1.22.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.4 | true | Rancher v2.10.3 | cni/loopback | stdlib@v1.22.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.1 | true | Rancher v2.10.3 | bin/gops | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.1 | true | Rancher v2.10.3 | usr/bin/clustermesh-apiserver | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.1 | true | Rancher v2.10.3 | usr/bin/etcd | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-relay:v1.16.1 | true | Rancher v2.10.3 | bin/gops | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-relay:v1.16.1 | true | Rancher v2.10.3 | bin/grpc_health_probe | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-relay:v1.16.1 | true | Rancher v2.10.3 | usr/bin/hubble-relay | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-relay:v1.16.2 | true | Rancher v2.10.3 | bin/grpc_health_probe | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-ui-backend:v0.13.1 | true | Rancher v2.10.3 | usr/bin/backend | github.com/cilium/cilium@v1.15.5 | CVE-2024-37307 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-hubble-ui-backend:v0.13.1 | true | Rancher v2.10.3 | usr/bin/backend | golang.org/x/net@v0.25.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-ui-backend:v0.13.1 | true | Rancher v2.10.3 | usr/bin/backend | stdlib@v1.22.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-ui-backend:v0.13.1 | true | Rancher v2.10.3 | usr/bin/backend | stdlib@v1.22.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-aws:v1.16.1 | true | Rancher v2.10.3 | bin/gops | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-aws:v1.16.1 | true | Rancher v2.10.3 | usr/bin/cilium-operator-aws | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-azure:v1.16.1 | true | Rancher v2.10.3 | bin/gops | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-azure:v1.16.1 | true | Rancher v2.10.3 | usr/bin/cilium-operator-azure | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-generic:v1.16.1 | true | Rancher v2.10.3 | bin/gops | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-generic:v1.16.1 | true | Rancher v2.10.3 | usr/bin/cilium-operator-generic | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.41.1 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.41.1 | CVE-2023-45142 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | golang.org/x/net@v0.10.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | golang.org/x/net@v0.10.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.41.1 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.41.1 | CVE-2023-45142 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.11.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | golang.org/x/net@v0.13.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | golang.org/x/net@v0.13.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | stdlib@v1.20.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | stdlib@v1.20.7 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | stdlib@v1.20.7 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | stdlib@v1.20.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | stdlib@v1.20.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.29.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.29.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.29.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | golang.org/x/net@v0.17.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.29.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | stdlib@v1.21.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.29.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | stdlib@v1.21.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.29.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | stdlib@v1.21.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.30.1 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.30.1 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.30.1 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | golang.org/x/net@v0.23.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.30.1 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | stdlib@v1.22.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.30.1 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | stdlib@v1.22.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | curl | curl@8.1.2-7.ph4 | CVE-2024-2398 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | curl | curl@8.1.2-7.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | curl-libs | curl-libs@8.1.2-7.ph4 | CVE-2024-2398 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | curl-libs | curl-libs@8.1.2-7.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | expat | expat@2.2.9-11.ph4 | CVE-2024-45491 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | expat | expat@2.2.9-11.ph4 | CVE-2024-45492 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | expat | expat@2.2.9-11.ph4 | CVE-2023-52425 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | expat | expat@2.2.9-11.ph4 | CVE-2024-28757 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | expat | expat@2.2.9-11.ph4 | CVE-2024-45490 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-45491 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-45492 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2023-52425 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-28757 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-45490 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | glib | glib@2.68.4-1.ph4 | CVE-2024-52533 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | glibc | glibc@2.32-15.ph4 | CVE-2024-2961 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | glibc-iconv | glibc-iconv@2.32-15.ph4 | CVE-2024-2961 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | krb5 | krb5@1.17-10.ph4 | CVE-2024-37371 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | krb5 | krb5@1.17-10.ph4 | CVE-2024-37370 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | libtasn1 | libtasn1@4.14-2.ph4 | CVE-2024-12133 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2024-56171 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2025-24928 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2025-27113 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | nss-libs | nss-libs@3.72-4.ph4 | CVE-2024-0743 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | openssl | openssl@3.0.13-2.ph4 | CVE-2024-5535 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | openssl | openssl@3.0.13-2.ph4 | CVE-2024-2511 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | openssl | openssl@3.0.13-2.ph4 | CVE-2024-6119 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | python3 | python3@3.10.11-7.ph4 | CVE-2023-6597 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | python3 | python3@3.10.11-7.ph4 | CVE-2024-6232 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | python3 | python3@3.10.11-7.ph4 | cve-2024-7592 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | python3-libs | python3-libs@3.10.11-7.ph4 | CVE-2023-6597 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | python3-libs | python3-libs@3.10.11-7.ph4 | CVE-2024-6232 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | python3-libs | python3-libs@3.10.11-7.ph4 | cve-2024-7592 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | util-linux | util-linux@2.37.4-1.ph4 | CVE-2024-28085 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | util-linux-libs | util-linux-libs@2.37.4-1.ph4 | CVE-2024-28085 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | usr/bin/vsphere-csi | golang.org/x/net@v0.19.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | usr/bin/vsphere-csi | k8s.io/kubernetes@v1.26.10 | CVE-2023-5528 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | usr/bin/vsphere-csi | k8s.io/kubernetes@v1.26.10 | CVE-2024-0793 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | usr/bin/vsphere-csi | k8s.io/kubernetes@v1.26.10 | CVE-2024-10220 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | usr/bin/vsphere-csi | k8s.io/kubernetes@v1.26.10 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | usr/bin/vsphere-csi | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | usr/bin/vsphere-csi | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.2.0 | true | Rancher v2.10.3 | usr/bin/vsphere-csi | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.10.3 | curl | curl@8.1.2-7.ph4 | CVE-2024-2398 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.10.3 | curl | curl@8.1.2-7.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.10.3 | curl-libs | curl-libs@8.1.2-7.ph4 | CVE-2024-2398 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.10.3 | curl-libs | curl-libs@8.1.2-7.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.10.3 | expat | expat@2.4.9-2.ph4 | CVE-2024-45491 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.10.3 | expat | expat@2.4.9-2.ph4 | CVE-2024-45492 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.10.3 | expat | expat@2.4.9-2.ph4 | CVE-2024-45490 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.10.3 | expat-libs | expat-libs@2.4.9-2.ph4 | CVE-2024-45491 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.10.3 | expat-libs | expat-libs@2.4.9-2.ph4 | CVE-2024-45492 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.10.3 | expat-libs | expat-libs@2.4.9-2.ph4 | CVE-2024-45490 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.10.3 | glib | glib@2.68.4-2.ph4 | CVE-2024-52533 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.10.3 | krb5 | krb5@1.17-10.ph4 | CVE-2024-37371 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.10.3 | krb5 | krb5@1.17-10.ph4 | CVE-2024-37370 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.10.3 | libtasn1 | libtasn1@4.14-2.ph4 | CVE-2024-12133 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.10.3 | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2024-56171 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.10.3 | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2025-24928 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.10.3 | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2025-27113 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.10.3 | nss-libs | nss-libs@3.72-4.ph4 | CVE-2024-0743 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.10.3 | openssl | openssl@3.0.13-2.ph4 | CVE-2024-5535 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.10.3 | openssl | openssl@3.0.13-2.ph4 | CVE-2024-2511 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.10.3 | openssl | openssl@3.0.13-2.ph4 | CVE-2024-6119 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.10.3 | python3 | python3@3.10.11-8.ph4 | CVE-2023-6597 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.10.3 | python3 | python3@3.10.11-8.ph4 | CVE-2024-6232 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.10.3 | python3 | python3@3.10.11-8.ph4 | cve-2024-7592 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.10.3 | python3-libs | python3-libs@3.10.11-8.ph4 | CVE-2023-6597 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.10.3 | python3-libs | python3-libs@3.10.11-8.ph4 | CVE-2024-6232 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.10.3 | python3-libs | python3-libs@3.10.11-8.ph4 | cve-2024-7592 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.10.3 | usr/bin/vsphere-csi | golang.org/x/net@v0.19.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.10.3 | usr/bin/vsphere-csi | k8s.io/kubernetes@v1.27.10 | CVE-2024-10220 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.10.3 | usr/bin/vsphere-csi | k8s.io/kubernetes@v1.27.10 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.10.3 | usr/bin/vsphere-csi | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher v2.10.3 | curl | curl@8.7.1-1.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher v2.10.3 | curl-libs | curl-libs@8.7.1-1.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher v2.10.3 | expat | expat@2.4.9-2.ph4 | CVE-2024-45491 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher v2.10.3 | expat | expat@2.4.9-2.ph4 | CVE-2024-45492 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher v2.10.3 | expat | expat@2.4.9-2.ph4 | CVE-2024-45490 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher v2.10.3 | expat-libs | expat-libs@2.4.9-2.ph4 | CVE-2024-45491 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher v2.10.3 | expat-libs | expat-libs@2.4.9-2.ph4 | CVE-2024-45492 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher v2.10.3 | expat-libs | expat-libs@2.4.9-2.ph4 | CVE-2024-45490 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher v2.10.3 | glib | glib@2.68.4-2.ph4 | CVE-2024-52533 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher v2.10.3 | krb5 | krb5@1.17-11.ph4 | CVE-2024-37371 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher v2.10.3 | krb5 | krb5@1.17-11.ph4 | CVE-2024-37370 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher v2.10.3 | libtasn1 | libtasn1@4.14-2.ph4 | CVE-2024-12133 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher v2.10.3 | libxml2 | libxml2@2.9.12-14.ph4 | CVE-2024-56171 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher v2.10.3 | libxml2 | libxml2@2.9.12-14.ph4 | CVE-2025-24928 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher v2.10.3 | libxml2 | libxml2@2.9.12-14.ph4 | CVE-2025-27113 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher v2.10.3 | nss-libs | nss-libs@3.72-5.ph4 | CVE-2024-0743 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher v2.10.3 | openssl | openssl@3.0.14-2.ph4 | CVE-2024-6119 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher v2.10.3 | python3 | python3@3.10.11-8.ph4 | CVE-2023-6597 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher v2.10.3 | python3 | python3@3.10.11-8.ph4 | CVE-2024-6232 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher v2.10.3 | python3 | python3@3.10.11-8.ph4 | cve-2024-7592 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher v2.10.3 | python3-libs | python3-libs@3.10.11-8.ph4 | CVE-2023-6597 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher v2.10.3 | python3-libs | python3-libs@3.10.11-8.ph4 | CVE-2024-6232 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher v2.10.3 | python3-libs | python3-libs@3.10.11-8.ph4 | cve-2024-7592 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher v2.10.3 | usr/bin/vsphere-csi | golang.org/x/net@v0.19.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher v2.10.3 | usr/bin/vsphere-csi | k8s.io/kubernetes@v1.27.10 | CVE-2024-10220 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher v2.10.3 | usr/bin/vsphere-csi | k8s.io/kubernetes@v1.27.10 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.1 | true | Rancher v2.10.3 | usr/bin/vsphere-csi | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher v2.10.3 | curl | curl@8.1.2-7.ph4 | CVE-2024-2398 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher v2.10.3 | curl | curl@8.1.2-7.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher v2.10.3 | curl-libs | curl-libs@8.1.2-7.ph4 | CVE-2024-2398 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher v2.10.3 | curl-libs | curl-libs@8.1.2-7.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher v2.10.3 | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-45491 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher v2.10.3 | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-45492 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher v2.10.3 | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2023-52425 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher v2.10.3 | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-28757 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher v2.10.3 | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-45490 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher v2.10.3 | glibc | glibc@2.32-15.ph4 | CVE-2024-2961 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher v2.10.3 | krb5 | krb5@1.17-10.ph4 | CVE-2024-37371 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher v2.10.3 | krb5 | krb5@1.17-10.ph4 | CVE-2024-37370 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher v2.10.3 | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2024-56171 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher v2.10.3 | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2025-24928 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher v2.10.3 | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2025-27113 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher v2.10.3 | nss-libs | nss-libs@3.72-4.ph4 | CVE-2024-0743 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher v2.10.3 | openssl | openssl@3.0.13-2.ph4 | CVE-2024-5535 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher v2.10.3 | openssl | openssl@3.0.13-2.ph4 | CVE-2024-2511 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher v2.10.3 | openssl | openssl@3.0.13-2.ph4 | CVE-2024-6119 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher v2.10.3 | usr/bin/vsphere-syncer | golang.org/x/net@v0.19.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher v2.10.3 | usr/bin/vsphere-syncer | k8s.io/kubernetes@v1.26.10 | CVE-2023-5528 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher v2.10.3 | usr/bin/vsphere-syncer | k8s.io/kubernetes@v1.26.10 | CVE-2024-0793 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher v2.10.3 | usr/bin/vsphere-syncer | k8s.io/kubernetes@v1.26.10 | CVE-2024-10220 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher v2.10.3 | usr/bin/vsphere-syncer | k8s.io/kubernetes@v1.26.10 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher v2.10.3 | usr/bin/vsphere-syncer | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher v2.10.3 | usr/bin/vsphere-syncer | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.2.0 | true | Rancher v2.10.3 | usr/bin/vsphere-syncer | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.10.3 | curl | curl@8.1.2-7.ph4 | CVE-2024-2398 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.10.3 | curl | curl@8.1.2-7.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.10.3 | curl-libs | curl-libs@8.1.2-7.ph4 | CVE-2024-2398 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.10.3 | curl-libs | curl-libs@8.1.2-7.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.10.3 | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-45491 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.10.3 | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-45492 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.10.3 | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2023-52425 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.10.3 | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-28757 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.10.3 | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-45490 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.10.3 | glibc | glibc@2.32-15.ph4 | CVE-2024-2961 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.10.3 | krb5 | krb5@1.17-10.ph4 | CVE-2024-37371 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.10.3 | krb5 | krb5@1.17-10.ph4 | CVE-2024-37370 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.10.3 | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2024-56171 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.10.3 | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2025-24928 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.10.3 | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2025-27113 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.10.3 | nss-libs | nss-libs@3.72-4.ph4 | CVE-2024-0743 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.10.3 | openssl | openssl@3.0.13-2.ph4 | CVE-2024-5535 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.10.3 | openssl | openssl@3.0.13-2.ph4 | CVE-2024-2511 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.10.3 | openssl | openssl@3.0.13-2.ph4 | CVE-2024-6119 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.10.3 | usr/bin/vsphere-syncer | golang.org/x/net@v0.19.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.10.3 | usr/bin/vsphere-syncer | k8s.io/kubernetes@v1.27.10 | CVE-2024-10220 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.10.3 | usr/bin/vsphere-syncer | k8s.io/kubernetes@v1.27.10 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.10.3 | usr/bin/vsphere-syncer | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher v2.10.3 | curl | curl@8.7.1-1.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher v2.10.3 | curl-libs | curl-libs@8.7.1-1.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher v2.10.3 | expat-libs | expat-libs@2.4.9-2.ph4 | CVE-2024-45491 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher v2.10.3 | expat-libs | expat-libs@2.4.9-2.ph4 | CVE-2024-45492 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher v2.10.3 | expat-libs | expat-libs@2.4.9-2.ph4 | CVE-2024-45490 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher v2.10.3 | krb5 | krb5@1.17-11.ph4 | CVE-2024-37371 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher v2.10.3 | krb5 | krb5@1.17-11.ph4 | CVE-2024-37370 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher v2.10.3 | libxml2 | libxml2@2.9.12-14.ph4 | CVE-2024-56171 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher v2.10.3 | libxml2 | libxml2@2.9.12-14.ph4 | CVE-2025-24928 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher v2.10.3 | libxml2 | libxml2@2.9.12-14.ph4 | CVE-2025-27113 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher v2.10.3 | nss-libs | nss-libs@3.72-5.ph4 | CVE-2024-0743 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher v2.10.3 | openssl | openssl@3.0.14-2.ph4 | CVE-2024-6119 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher v2.10.3 | usr/bin/vsphere-syncer | golang.org/x/net@v0.19.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher v2.10.3 | usr/bin/vsphere-syncer | k8s.io/kubernetes@v1.27.10 | CVE-2024-10220 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher v2.10.3 | usr/bin/vsphere-syncer | k8s.io/kubernetes@v1.27.10 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.1 | true | Rancher v2.10.3 | usr/bin/vsphere-syncer | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.31.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.31.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | golang.org/x/net@v0.26.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere:v1.31.0 | true | Rancher v2.10.3 | bin/vsphere-cloud-controller-manager | stdlib@v1.22.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cluster-proportional-autoscaler:v1.8.9 | true | Rancher v2.10.3 | cluster-proportional-autoscaler | golang.org/x/net@v0.8.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-cluster-proportional-autoscaler:v1.8.9 | true | Rancher v2.10.3 | cluster-proportional-autoscaler | golang.org/x/net@v0.8.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cluster-proportional-autoscaler:v1.8.9 | true | Rancher v2.10.3 | cluster-proportional-autoscaler | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cluster-proportional-autoscaler:v1.8.9 | true | Rancher v2.10.3 | cluster-proportional-autoscaler | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-cluster-proportional-autoscaler:v1.8.9 | true | Rancher v2.10.3 | cluster-proportional-autoscaler | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cluster-proportional-autoscaler:v1.8.9 | true | Rancher v2.10.3 | cluster-proportional-autoscaler | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cluster-proportional-autoscaler:v1.8.9 | true | Rancher v2.10.3 | cluster-proportional-autoscaler | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.10.3 | coredns | golang.org/x/net@v0.4.0 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.10.3 | coredns | google.golang.org/grpc@v1.52.3 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.10.3 | coredns | stdlib@v1.20 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.10.3 | coredns | stdlib@v1.20 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.10.3 | coredns | stdlib@v1.20 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.10.3 | coredns | stdlib@v1.20 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.10.3 | coredns | stdlib@v1.20 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.10.3 | coredns | stdlib@v1.20 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.10.3 | coredns | stdlib@v1.20 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.10.3 | coredns | stdlib@v1.20 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.10.3 | coredns | stdlib@v1.20 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.10.3 | coredns | stdlib@v1.20 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.10.3 | coredns | stdlib@v1.20 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.10.3 | coredns | stdlib@v1.20 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.10.3 | coredns | stdlib@v1.20 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.10.3 | coredns | stdlib@v1.20 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.10.3 | coredns | stdlib@v1.20 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.10.3 | coredns | stdlib@v1.20 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.10.3 | coredns | stdlib@v1.20 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.11.1 | true | Rancher v2.10.3 | coredns | github.com/quic-go/quic-go@v0.37.4 | CVE-2024-22189 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.11.1 | true | Rancher v2.10.3 | coredns | google.golang.org/grpc@v1.57.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.11.1 | true | Rancher v2.10.3 | coredns | stdlib@v1.20.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.11.1 | true | Rancher v2.10.3 | coredns | stdlib@v1.20.7 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.11.1 | true | Rancher v2.10.3 | coredns | stdlib@v1.20.7 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.11.1 | true | Rancher v2.10.3 | coredns | stdlib@v1.20.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.11.1 | true | Rancher v2.10.3 | coredns | stdlib@v1.20.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.11.3 | true | Rancher v2.10.3 | coredns | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.10.3 | usr/local/bin/etcd | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.25.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.10.3 | usr/local/bin/etcd | stdlib@v1.20.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.10.3 | usr/local/bin/etcd | stdlib@v1.20.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.10.3 | usr/local/bin/etcd | stdlib@v1.20.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.10.3 | usr/local/bin/etcd | stdlib@v1.20.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.10.3 | usr/local/bin/etcdctl | stdlib@v1.20.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.10.3 | usr/local/bin/etcdctl | stdlib@v1.20.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.10.3 | usr/local/bin/etcdctl | stdlib@v1.20.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.10.3 | usr/local/bin/etcdctl | stdlib@v1.20.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.10.3 | usr/local/bin/etcdutl | stdlib@v1.20.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.10.3 | usr/local/bin/etcdutl | stdlib@v1.20.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.10.3 | usr/local/bin/etcdutl | stdlib@v1.20.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.10.3 | usr/local/bin/etcdutl | stdlib@v1.20.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher v2.10.3 | usr/local/bin/etcd | stdlib@v1.20.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher v2.10.3 | usr/local/bin/etcd | stdlib@v1.20.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher v2.10.3 | usr/local/bin/etcd | stdlib@v1.20.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher v2.10.3 | usr/local/bin/etcdctl | stdlib@v1.20.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher v2.10.3 | usr/local/bin/etcdctl | stdlib@v1.20.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher v2.10.3 | usr/local/bin/etcdctl | stdlib@v1.20.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher v2.10.3 | usr/local/bin/etcdutl | stdlib@v1.20.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher v2.10.3 | usr/local/bin/etcdutl | stdlib@v1.20.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher v2.10.3 | usr/local/bin/etcdutl | stdlib@v1.20.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.15 | true | Rancher v2.10.3 | usr/local/bin/etcd | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.15 | true | Rancher v2.10.3 | usr/local/bin/etcdctl | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.15 | true | Rancher v2.10.3 | usr/local/bin/etcdutl | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-curlimages-curl:8.9.1 | true | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.3.1-r3 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-curlimages-curl:8.9.1 | true | Rancher v2.10.3 | libssl3 | libssl3@3.3.1-r3 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.24.2 | true | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.1.4-r4 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.24.2 | true | Rancher v2.10.3 | libcurl | libcurl@8.5.0-r1 | CVE-2024-2398 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.24.2 | true | Rancher v2.10.3 | libcurl | libcurl@8.5.0-r1 | CVE-2024-6197 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.24.2 | true | Rancher v2.10.3 | libssl3 | libssl3@3.1.4-r4 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.24.2 | true | Rancher v2.10.3 | opt/bin/flanneld | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.24.2 | true | Rancher v2.10.3 | opt/bin/flanneld | golang.org/x/net@v0.18.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.24.2 | true | Rancher v2.10.3 | opt/bin/flanneld | stdlib@v1.21.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.24.2 | true | Rancher v2.10.3 | opt/bin/flanneld | stdlib@v1.21.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.24.2 | true | Rancher v2.10.3 | opt/bin/flanneld | stdlib@v1.21.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.24.2 | true | Rancher v2.10.3 | sbin/iptables-wrapper | stdlib@v1.21.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.24.2 | true | Rancher v2.10.3 | sbin/iptables-wrapper | stdlib@v1.21.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.24.2 | true | Rancher v2.10.3 | sbin/iptables-wrapper | stdlib@v1.21.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.25.1 | true | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.2.1-r2 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.25.1 | true | Rancher v2.10.3 | libcurl | libcurl@8.7.1-r0 | CVE-2024-6197 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.25.1 | true | Rancher v2.10.3 | libssl3 | libssl3@3.2.1-r2 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.25.1 | true | Rancher v2.10.3 | opt/bin/flanneld | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.25.1 | true | Rancher v2.10.3 | opt/bin/flanneld | golang.org/x/net@v0.22.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.25.1 | true | Rancher v2.10.3 | opt/bin/flanneld | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.25.1 | true | Rancher v2.10.3 | opt/bin/flanneld | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.25.1 | true | Rancher v2.10.3 | opt/bin/flanneld | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.25.1 | true | Rancher v2.10.3 | sbin/iptables-wrapper | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.25.1 | true | Rancher v2.10.3 | sbin/iptables-wrapper | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.25.1 | true | Rancher v2.10.3 | sbin/iptables-wrapper | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-fluent-fluent-bit:3.1.8 | true | Rancher v2.10.3 | libldap-2.5-0 | libldap-2.5-0@2.5.13+dfsg-5 | CVE-2023-2953 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8 | true | Rancher v2.10.3 | libpq5 | libpq5@15.8-0+deb12u1 | CVE-2024-10979 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8 | true | Rancher v2.10.3 | libpq5 | libpq5@15.8-0+deb12u1 | CVE-2025-1094 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8 | true | Rancher v2.10.3 | zlib1g | zlib1g@1:1.2.13.dfsg-1 | CVE-2023-45853 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | bind9-dnsutils | bind9-dnsutils@1:9.18.28-1~deb12u2 | CVE-2024-11187 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | bind9-dnsutils | bind9-dnsutils@1:9.18.28-1~deb12u2 | CVE-2024-12705 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | bind9-host | bind9-host@1:9.18.28-1~deb12u2 | CVE-2024-11187 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | bind9-host | bind9-host@1:9.18.28-1~deb12u2 | CVE-2024-12705 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | bind9-libs | bind9-libs@1:9.18.28-1~deb12u2 | CVE-2024-11187 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | bind9-libs | bind9-libs@1:9.18.28-1~deb12u2 | CVE-2024-12705 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | dnsutils | dnsutils@1:9.18.28-1~deb12u2 | CVE-2024-11187 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | dnsutils | dnsutils@1:9.18.28-1~deb12u2 | CVE-2024-12705 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | libarchive13 | libarchive13@3.6.2-1+deb12u1 | CVE-2024-20696 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | libcups2 | libcups2@2.4.2-3+deb12u7 | CVE-2024-47175 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | libexpat1 | libexpat1@2.5.0-1 | CVE-2024-45491 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | libexpat1 | libexpat1@2.5.0-1 | CVE-2024-45492 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | libexpat1 | libexpat1@2.5.0-1 | CVE-2023-52425 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | libexpat1 | libexpat1@2.5.0-1 | CVE-2024-45490 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | libfreetype6 | libfreetype6@2.12.1+dfsg-5+deb12u3 | CVE-2025-27363 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | libglib2.0-0 | libglib2.0-0@2.74.6-2+deb12u3 | CVE-2024-52533 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | libharfbuzz0b | libharfbuzz0b@6.0.0+dfsg-3 | CVE-2023-25193 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | libldap-2.5-0 | libldap-2.5-0@2.5.13+dfsg-5 | CVE-2023-2953 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | libnss3 | libnss3@2:3.87.1-1 | CVE-2024-0743 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | libnss3 | libnss3@2:3.87.1-1 | CVE-2024-6609 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | libperl5.36 | libperl5.36@5.36.0-7+deb12u1 | CVE-2023-31484 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | libpq-dev | libpq-dev@15.8-0+deb12u1 | CVE-2024-10979 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | libpq-dev | libpq-dev@15.8-0+deb12u1 | CVE-2025-1094 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | libpq5 | libpq5@15.8-0+deb12u1 | CVE-2024-10979 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | libpq5 | libpq5@15.8-0+deb12u1 | CVE-2025-1094 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | libpython3.11 | libpython3.11@3.11.2-6+deb12u3 | CVE-2024-6232 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | libpython3.11 | libpython3.11@3.11.2-6+deb12u3 | CVE-2024-7592 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | libpython3.11 | libpython3.11@3.11.2-6+deb12u3 | CVE-2024-9287 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | libpython3.11-minimal | libpython3.11-minimal@3.11.2-6+deb12u3 | CVE-2024-6232 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | libpython3.11-minimal | libpython3.11-minimal@3.11.2-6+deb12u3 | CVE-2024-7592 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | libpython3.11-minimal | libpython3.11-minimal@3.11.2-6+deb12u3 | CVE-2024-9287 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | libpython3.11-stdlib | libpython3.11-stdlib@3.11.2-6+deb12u3 | CVE-2024-6232 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | libpython3.11-stdlib | libpython3.11-stdlib@3.11.2-6+deb12u3 | CVE-2024-7592 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | libpython3.11-stdlib | libpython3.11-stdlib@3.11.2-6+deb12u3 | CVE-2024-9287 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | libsqlite3-0 | libsqlite3-0@3.40.1-2 | CVE-2023-7104 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | libtiff6 | libtiff6@4.5.0-6+deb12u1 | CVE-2023-52355 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | libtiff6 | libtiff6@4.5.0-6+deb12u1 | CVE-2023-52356 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | libtiff6 | libtiff6@4.5.0-6+deb12u1 | CVE-2024-7006 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | libxml2 | libxml2@2.9.14+dfsg-1.3~deb12u1 | CVE-2024-25062 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | libxml2 | libxml2@2.9.14+dfsg-1.3~deb12u1 | CVE-2024-56171 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | libxml2 | libxml2@2.9.14+dfsg-1.3~deb12u1 | CVE-2025-24928 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | libxml2 | libxml2@2.9.14+dfsg-1.3~deb12u1 | CVE-2025-27113 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | libxml2-dev | libxml2-dev@2.9.14+dfsg-1.3~deb12u1 | CVE-2024-25062 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | libxml2-dev | libxml2-dev@2.9.14+dfsg-1.3~deb12u1 | CVE-2024-56171 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | libxml2-dev | libxml2-dev@2.9.14+dfsg-1.3~deb12u1 | CVE-2025-24928 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | libxml2-dev | libxml2-dev@2.9.14+dfsg-1.3~deb12u1 | CVE-2025-27113 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47685 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2013-7445 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2019-19449 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2019-19814 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2021-3847 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2021-3864 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2023-52452 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2023-52586 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2023-52751 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2023-52812 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-21803 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-25742 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-25743 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-26669 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-26739 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-26913 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-26930 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-26944 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-26952 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-26982 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-27042 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-35866 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-35887 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-35929 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-35937 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-36013 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-36899 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-36921 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-38570 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-38630 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-39479 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-39508 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-41013 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-41096 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-42162 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-42228 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-42314 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-44940 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-44941 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-44942 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-44949 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-44951 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-44974 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-44977 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-44983 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-44985 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-44986 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-44987 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-44998 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-44999 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-45026 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46673 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46674 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46722 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46723 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46724 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46725 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46731 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46738 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46740 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46743 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46744 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46746 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46747 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46759 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46774 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46782 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46786 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46798 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46800 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46804 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46811 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46812 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46813 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46814 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46815 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46818 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46821 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46828 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46830 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46833 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46836 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46844 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46849 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46852 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46853 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46854 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46858 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46859 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46865 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-46871 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47659 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47670 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47682 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47686 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47691 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47695 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47696 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47697 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47698 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47701 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47718 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47723 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47727 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47730 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47742 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47745 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47747 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47748 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47750 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47751 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-47757 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49852 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49853 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49854 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49855 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49860 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49861 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49882 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49883 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49884 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49889 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49894 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49895 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49900 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49903 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49924 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49928 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49930 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49936 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49950 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49960 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49966 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49969 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49981 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49982 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49983 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49986 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49989 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49991 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49992 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49995 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49996 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-49997 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50007 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50029 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50033 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50035 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50036 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50047 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50051 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50055 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50059 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50061 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50063 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50067 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50073 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50074 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50083 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50086 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50088 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50112 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50115 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50121 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50124 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50125 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50126 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50127 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50128 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50131 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50143 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50150 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50151 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50154 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50155 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50164 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50180 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50186 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50193 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50200 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50209 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50215 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50217 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50226 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50230 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50234 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50235 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50242 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50246 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50247 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50250 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50257 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50261 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50262 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50264 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50267 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50268 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50269 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50275 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50276 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50278 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50279 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50282 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50283 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50286 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-50301 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53057 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53059 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53061 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53068 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53082 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53096 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53099 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53103 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53104 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53108 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53133 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53141 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53142 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53150 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53155 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53156 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53165 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53166 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53168 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53170 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53171 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53173 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53174 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53179 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53203 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53206 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53208 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53213 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53216 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53227 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53229 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53237 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-53239 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56538 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56548 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56551 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56558 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56581 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56582 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56595 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56596 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56598 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56600 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56601 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56602 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56603 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56604 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56605 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56606 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56608 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56614 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56615 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56626 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56627 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56631 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56640 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56642 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56645 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56650 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56651 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56658 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56662 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56663 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56664 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56672 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56675 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56704 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56708 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56759 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56765 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56766 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56775 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-56784 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-57798 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-57850 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-57887 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-57892 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-57896 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-57900 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-57906 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-57907 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-57908 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-57910 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-57911 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-57912 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-57925 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-57951 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-57980 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-57982 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-57984 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-58002 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-58007 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-58087 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2024-8805 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2025-21631 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2025-21647 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2025-21648 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2025-21671 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2025-21680 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2025-21687 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2025-21692 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2025-21702 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2025-21703 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2025-21718 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2025-21726 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2025-21735 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2025-21753 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2025-21782 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2025-21785 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2025-21794 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | linux-libc-dev | linux-libc-dev@6.1.106-3 | CVE-2025-21812 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | perl | perl@5.36.0-7+deb12u1 | CVE-2023-31484 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | perl-base | perl-base@5.36.0-7+deb12u1 | CVE-2023-31484 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | perl-modules-5.36 | perl-modules-5.36@5.36.0-7+deb12u1 | CVE-2023-31484 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | postgresql-client-15 | postgresql-client-15@15.8-0+deb12u1 | CVE-2024-10979 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | postgresql-client-15 | postgresql-client-15@15.8-0+deb12u1 | CVE-2025-1094 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | postgresql-server-dev-15 | postgresql-server-dev-15@15.8-0+deb12u1 | CVE-2024-10979 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | postgresql-server-dev-15 | postgresql-server-dev-15@15.8-0+deb12u1 | CVE-2025-1094 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | python3-pkg-resources | python3-pkg-resources@66.1.1-1 | CVE-2024-6345 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | python3.11 | python3.11@3.11.2-6+deb12u3 | CVE-2024-6232 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | python3.11 | python3.11@3.11.2-6+deb12u3 | CVE-2024-7592 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | python3.11 | python3.11@3.11.2-6+deb12u3 | CVE-2024-9287 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | python3.11-minimal | python3.11-minimal@3.11.2-6+deb12u3 | CVE-2024-6232 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | python3.11-minimal | python3.11-minimal@3.11.2-6+deb12u3 | CVE-2024-7592 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | python3.11-minimal | python3.11-minimal@3.11.2-6+deb12u3 | CVE-2024-9287 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | sysstat | sysstat@12.6.1-1 | CVE-2023-33204 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | vim | vim@2:9.0.1378-2 | CVE-2023-2610 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | vim | vim@2:9.0.1378-2 | CVE-2023-4738 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | vim | vim@2:9.0.1378-2 | CVE-2023-4752 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | vim | vim@2:9.0.1378-2 | CVE-2023-4781 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | vim | vim@2:9.0.1378-2 | CVE-2023-5344 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | vim | vim@2:9.0.1378-2 | CVE-2024-22667 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | vim-common | vim-common@2:9.0.1378-2 | CVE-2023-2610 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | vim-common | vim-common@2:9.0.1378-2 | CVE-2023-4738 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | vim-common | vim-common@2:9.0.1378-2 | CVE-2023-4752 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | vim-common | vim-common@2:9.0.1378-2 | CVE-2023-4781 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | vim-common | vim-common@2:9.0.1378-2 | CVE-2023-5344 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | vim-common | vim-common@2:9.0.1378-2 | CVE-2024-22667 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | vim-runtime | vim-runtime@2:9.0.1378-2 | CVE-2023-2610 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | vim-runtime | vim-runtime@2:9.0.1378-2 | CVE-2023-4738 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | vim-runtime | vim-runtime@2:9.0.1378-2 | CVE-2023-4752 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | vim-runtime | vim-runtime@2:9.0.1378-2 | CVE-2023-4781 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | vim-runtime | vim-runtime@2:9.0.1378-2 | CVE-2023-5344 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | vim-runtime | vim-runtime@2:9.0.1378-2 | CVE-2024-22667 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | zlib1g | zlib1g@1:1.2.13.dfsg-1 | CVE-2023-45853 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.1.8-debug | true | Rancher v2.10.3 | zlib1g-dev | zlib1g-dev@1:1.2.13.dfsg-1 | CVE-2023-45853 | CRITICAL | affected | debian | |
rancher/mirrored-grafana-grafana-image-renderer:3.11.1 | true | Rancher v2.10.3 | aom-libs | aom-libs@3.9.0-r0 | CVE-2024-5171 | CRITICAL | affected | alpine | |
rancher/mirrored-grafana-grafana-image-renderer:3.11.1 | true | Rancher v2.10.3 | cups-libs | cups-libs@2.4.9-r0 | CVE-2024-47175 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana-image-renderer:3.11.1 | true | Rancher v2.10.3 | gdk-pixbuf | gdk-pixbuf@2.42.11-r1 | CVE-2022-48622 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana-image-renderer:3.11.1 | true | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.3.1-r3 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana-image-renderer:3.11.1 | true | Rancher v2.10.3 | libexpat | libexpat@2.6.2-r0 | CVE-2024-45491 | CRITICAL | affected | alpine | |
rancher/mirrored-grafana-grafana-image-renderer:3.11.1 | true | Rancher v2.10.3 | libexpat | libexpat@2.6.2-r0 | CVE-2024-45492 | CRITICAL | affected | alpine | |
rancher/mirrored-grafana-grafana-image-renderer:3.11.1 | true | Rancher v2.10.3 | libexpat | libexpat@2.6.2-r0 | CVE-2024-45490 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana-image-renderer:3.11.1 | true | Rancher v2.10.3 | libssl3 | libssl3@3.3.1-r3 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana-image-renderer:3.11.1 | true | Rancher v2.10.3 | libxml2 | libxml2@2.12.7-r0 | CVE-2024-56171 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana-image-renderer:3.11.1 | true | Rancher v2.10.3 | libxml2 | libxml2@2.12.7-r0 | CVE-2025-24928 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana-image-renderer:3.11.1 | true | Rancher v2.10.3 | libxml2 | libxml2@2.12.7-r0 | CVE-2025-27113 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana-image-renderer:3.11.1 | true | Rancher v2.10.3 | mbedtls | mbedtls@3.6.0-r0 | CVE-2024-45159 | CRITICAL | affected | alpine | |
rancher/mirrored-grafana-grafana-image-renderer:3.11.1 | true | Rancher v2.10.3 | Node.js | axios@1.6.7 | CVE-2024-39338 | HIGH | affected | node-pkg | |
rancher/mirrored-grafana-grafana-image-renderer:3.11.1 | true | Rancher v2.10.3 | Node.js | axios@1.6.7 | CVE-2025-27152 | HIGH | affected | node-pkg | |
rancher/mirrored-grafana-grafana-image-renderer:3.11.1 | true | Rancher v2.10.3 | Node.js | body-parser@1.20.2 | CVE-2024-45590 | HIGH | affected | node-pkg | |
rancher/mirrored-grafana-grafana-image-renderer:3.11.1 | true | Rancher v2.10.3 | Node.js | cross-spawn@7.0.3 | CVE-2024-21538 | HIGH | affected | node-pkg | |
rancher/mirrored-grafana-grafana-image-renderer:3.11.1 | true | Rancher v2.10.3 | Node.js | cross-spawn@7.0.3 | CVE-2024-21538 | HIGH | affected | node-pkg | |
rancher/mirrored-grafana-grafana-image-renderer:3.11.1 | true | Rancher v2.10.3 | Node.js | dompurify@2.4.7 | CVE-2024-45801 | HIGH | affected | node-pkg | |
rancher/mirrored-grafana-grafana-image-renderer:3.11.1 | true | Rancher v2.10.3 | Node.js | dompurify@2.4.7 | CVE-2024-47875 | HIGH | affected | node-pkg | |
rancher/mirrored-grafana-grafana-image-renderer:3.11.1 | true | Rancher v2.10.3 | Node.js | ip@1.1.9 | CVE-2024-29415 | HIGH | affected | node-pkg | |
rancher/mirrored-grafana-grafana-image-renderer:3.11.1 | true | Rancher v2.10.3 | Node.js | ip@2.0.1 | CVE-2024-29415 | HIGH | affected | node-pkg | |
rancher/mirrored-grafana-grafana-image-renderer:3.11.1 | true | Rancher v2.10.3 | Node.js | path-to-regexp@0.1.7 | CVE-2024-45296 | HIGH | affected | node-pkg | |
rancher/mirrored-grafana-grafana-image-renderer:3.11.1 | true | Rancher v2.10.3 | Node.js | path-to-regexp@0.1.7 | CVE-2024-52798 | HIGH | affected | node-pkg | |
rancher/mirrored-grafana-grafana-image-renderer:3.11.1 | true | Rancher v2.10.3 | Node.js | ws@8.13.0 | CVE-2024-37890 | HIGH | affected | node-pkg | |
rancher/mirrored-grafana-grafana:11.1.0 | true | Rancher v2.10.3 | curl | curl@8.5.0-r0 | CVE-2024-2398 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana:11.1.0 | true | Rancher v2.10.3 | curl | curl@8.5.0-r0 | CVE-2024-6197 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana:11.1.0 | true | Rancher v2.10.3 | libcurl | libcurl@8.5.0-r0 | CVE-2024-2398 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana:11.1.0 | true | Rancher v2.10.3 | libcurl | libcurl@8.5.0-r0 | CVE-2024-6197 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana:11.1.0 | true | Rancher v2.10.3 | usr/share/grafana/bin/grafana | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:11.1.0 | true | Rancher v2.10.3 | usr/share/grafana/bin/grafana-cli | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-grafana-grafana:11.1.0 | true | Rancher v2.10.3 | usr/share/grafana/bin/grafana-server | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.10.3 | krb5-libs | krb5-libs@1.20.1-r0 | CVE-2024-37371 | CRITICAL | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.10.3 | krb5-libs | krb5-libs@1.20.1-r0 | CVE-2024-37370 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.10.3 | libcom_err | libcom_err@1.46.5-r4 | CVE-2022-1304 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.0.7-r0 | CVE-2022-3996 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.0.7-r0 | CVE-2022-4450 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.0.7-r0 | CVE-2023-0215 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.0.7-r0 | CVE-2023-0216 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.0.7-r0 | CVE-2023-0217 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.0.7-r0 | CVE-2023-0286 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.0.7-r0 | CVE-2023-0401 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.0.7-r0 | CVE-2023-0464 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.0.7-r0 | CVE-2023-5363 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.10.3 | libexpat | libexpat@2.5.0-r0 | CVE-2024-45491 | CRITICAL | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.10.3 | libexpat | libexpat@2.5.0-r0 | CVE-2024-45492 | CRITICAL | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.10.3 | libexpat | libexpat@2.5.0-r0 | CVE-2023-52425 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.10.3 | libexpat | libexpat@2.5.0-r0 | CVE-2024-28757 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.10.3 | libexpat | libexpat@2.5.0-r0 | CVE-2024-45490 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.10.3 | libssl3 | libssl3@3.0.7-r0 | CVE-2022-3996 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.10.3 | libssl3 | libssl3@3.0.7-r0 | CVE-2022-4450 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.10.3 | libssl3 | libssl3@3.0.7-r0 | CVE-2023-0215 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.10.3 | libssl3 | libssl3@3.0.7-r0 | CVE-2023-0216 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.10.3 | libssl3 | libssl3@3.0.7-r0 | CVE-2023-0217 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.10.3 | libssl3 | libssl3@3.0.7-r0 | CVE-2023-0286 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.10.3 | libssl3 | libssl3@3.0.7-r0 | CVE-2023-0401 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.10.3 | libssl3 | libssl3@3.0.7-r0 | CVE-2023-0464 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.10.3 | libssl3 | libssl3@3.0.7-r0 | CVE-2023-5363 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.10.3 | ncurses-libs | ncurses-libs@6.3_p20221119-r0 | CVE-2023-29491 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.10.3 | ncurses-terminfo-base | ncurses-terminfo-base@6.3_p20221119-r0 | CVE-2023-29491 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.10.3 | sqlite-libs | sqlite-libs@3.40.0-r0 | CVE-2023-7104 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.10.3 | Python | Flask@1.0.2 | CVE-2023-30861 | HIGH | affected | python-pkg | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.10.3 | Python | Werkzeug@0.16.1 | CVE-2023-25577 | HIGH | affected | python-pkg | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.10.3 | Python | Werkzeug@0.16.1 | CVE-2024-34069 | HIGH | affected | python-pkg | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.10.3 | Python | certifi@2022.12.7 | CVE-2023-37920 | HIGH | affected | python-pkg | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.10.3 | Python | setuptools@57.5.0 | CVE-2022-40897 | HIGH | affected | python-pkg | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.10.3 | Python | setuptools@57.5.0 | CVE-2024-6345 | HIGH | affected | python-pkg | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.10.3 | Python | uWSGI@2.0.20 | CVE-2023-27522 | HIGH | affected | python-pkg | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.10.3 | Python | urllib3@1.24.3 | CVE-2023-43804 | HIGH | affected | python-pkg | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v1.4.1 | true | Rancher v2.10.3 | kube-webhook-certgen | golang.org/x/net@v0.22.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v1.4.1 | true | Rancher v2.10.3 | kube-webhook-certgen | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v1.4.1 | true | Rancher v2.10.3 | kube-webhook-certgen | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v1.4.1 | true | Rancher v2.10.3 | kube-webhook-certgen | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v1.4.3 | true | Rancher v2.10.3 | kube-webhook-certgen | golang.org/x/net@v0.28.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v1.4.3 | true | Rancher v2.10.3 | kube-webhook-certgen | stdlib@v1.22.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v1.4.4 | true | Rancher v2.10.3 | kube-webhook-certgen | golang.org/x/net@v0.28.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20231226-1a7112e06 | true | Rancher v2.10.3 | kube-webhook-certgen | golang.org/x/net@v0.17.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20231226-1a7112e06 | true | Rancher v2.10.3 | kube-webhook-certgen | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20231226-1a7112e06 | true | Rancher v2.10.3 | kube-webhook-certgen | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20231226-1a7112e06 | true | Rancher v2.10.3 | kube-webhook-certgen | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.19.6-distroless | true | Rancher v2.10.3 | opt/cni/bin/istio-cni | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.19.6-distroless | true | Rancher v2.10.3 | opt/cni/bin/istio-cni | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.19.6-distroless | true | Rancher v2.10.3 | opt/cni/bin/istio-cni | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.19.6-distroless | true | Rancher v2.10.3 | usr/local/bin/install-cni | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.19.6-distroless | true | Rancher v2.10.3 | usr/local/bin/install-cni | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.19.6-distroless | true | Rancher v2.10.3 | usr/local/bin/install-cni | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.20.3-distroless | true | Rancher v2.10.3 | opt/cni/bin/istio-cni | stdlib@v1.21.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.20.3-distroless | true | Rancher v2.10.3 | opt/cni/bin/istio-cni | stdlib@v1.21.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.20.3-distroless | true | Rancher v2.10.3 | opt/cni/bin/istio-cni | stdlib@v1.21.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.20.3-distroless | true | Rancher v2.10.3 | usr/local/bin/install-cni | stdlib@v1.21.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.20.3-distroless | true | Rancher v2.10.3 | usr/local/bin/install-cni | stdlib@v1.21.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.20.3-distroless | true | Rancher v2.10.3 | usr/local/bin/install-cni | stdlib@v1.21.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.21.1-distroless | true | Rancher v2.10.3 | libc6 | libc6@2.36-9+deb12u4 | CVE-2024-2961 | HIGH | affected | debian | |
rancher/mirrored-istio-install-cni:1.21.1-distroless | true | Rancher v2.10.3 | libc6 | libc6@2.36-9+deb12u4 | CVE-2024-33599 | HIGH | affected | debian | |
rancher/mirrored-istio-install-cni:1.21.1-distroless | true | Rancher v2.10.3 | opt/cni/bin/istio-cni | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.21.1-distroless | true | Rancher v2.10.3 | opt/cni/bin/istio-cni | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.21.1-distroless | true | Rancher v2.10.3 | opt/cni/bin/istio-cni | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.21.1-distroless | true | Rancher v2.10.3 | usr/local/bin/install-cni | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.21.1-distroless | true | Rancher v2.10.3 | usr/local/bin/install-cni | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.21.1-distroless | true | Rancher v2.10.3 | usr/local/bin/install-cni | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.22.1-distroless | true | Rancher v2.10.3 | opt/cni/bin/istio-cni | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.22.1-distroless | true | Rancher v2.10.3 | opt/cni/bin/istio-cni | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.22.1-distroless | true | Rancher v2.10.3 | opt/cni/bin/istio-cni | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.22.1-distroless | true | Rancher v2.10.3 | usr/local/bin/install-cni | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.22.1-distroless | true | Rancher v2.10.3 | usr/local/bin/install-cni | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.22.1-distroless | true | Rancher v2.10.3 | usr/local/bin/install-cni | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.23.2-distroless | true | Rancher v2.10.3 | opt/cni/bin/istio-cni | stdlib@v1.22.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.23.2-distroless | true | Rancher v2.10.3 | usr/local/bin/install-cni | stdlib@v1.22.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-pilot:1.19.6-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-discovery | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-pilot:1.19.6-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-discovery | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-pilot:1.19.6-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-discovery | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-pilot:1.20.3-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-discovery | stdlib@v1.21.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-pilot:1.20.3-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-discovery | stdlib@v1.21.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-pilot:1.20.3-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-discovery | stdlib@v1.21.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-pilot:1.21.1-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-discovery | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-pilot:1.21.1-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-discovery | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-pilot:1.21.1-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-discovery | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-pilot:1.22.1-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-discovery | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-pilot:1.22.1-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-discovery | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-pilot:1.22.1-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-discovery | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-pilot:1.23.2-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-discovery | stdlib@v1.22.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-proxyv2:1.19.6-distroless | true | Rancher v2.10.3 | libc6 | libc6@2.36-9+deb12u3 | CVE-2023-6246 | HIGH | affected | debian | |
rancher/mirrored-istio-proxyv2:1.19.6-distroless | true | Rancher v2.10.3 | libc6 | libc6@2.36-9+deb12u3 | CVE-2023-6779 | HIGH | affected | debian | |
rancher/mirrored-istio-proxyv2:1.19.6-distroless | true | Rancher v2.10.3 | libc6 | libc6@2.36-9+deb12u3 | CVE-2024-2961 | HIGH | affected | debian | |
rancher/mirrored-istio-proxyv2:1.19.6-distroless | true | Rancher v2.10.3 | libc6 | libc6@2.36-9+deb12u3 | CVE-2024-33599 | HIGH | affected | debian | |
rancher/mirrored-istio-proxyv2:1.19.6-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-agent | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-proxyv2:1.19.6-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-agent | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-proxyv2:1.19.6-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-agent | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-proxyv2:1.21.1-distroless | true | Rancher v2.10.3 | libc6 | libc6@2.36-9+deb12u4 | CVE-2024-2961 | HIGH | affected | debian | |
rancher/mirrored-istio-proxyv2:1.21.1-distroless | true | Rancher v2.10.3 | libc6 | libc6@2.36-9+deb12u4 | CVE-2024-33599 | HIGH | affected | debian | |
rancher/mirrored-istio-proxyv2:1.21.1-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-agent | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-proxyv2:1.21.1-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-agent | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-proxyv2:1.21.1-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-agent | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-proxyv2:1.22.1-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-agent | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-proxyv2:1.22.1-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-agent | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-proxyv2:1.22.1-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-agent | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-proxyv2:1.23.2-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-agent | stdlib@v1.22.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.52.0 | true | Rancher v2.10.3 | go/bin/all-in-one-linux | github.com/mostynb/go-grpc-compression@v1.2.2 | GHSA-87m9-rv8p-rgmg | HIGH | affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.52.0 | true | Rancher v2.10.3 | go/bin/all-in-one-linux | go.opentelemetry.io/collector/config/configgrpc@v0.90.1 | CVE-2024-36129 | HIGH | affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.52.0 | true | Rancher v2.10.3 | go/bin/all-in-one-linux | go.opentelemetry.io/collector/config/confighttp@v0.90.1 | CVE-2024-36129 | HIGH | affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.52.0 | true | Rancher v2.10.3 | go/bin/all-in-one-linux | stdlib@v1.21.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.52.0 | true | Rancher v2.10.3 | go/bin/all-in-one-linux | stdlib@v1.21.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.52.0 | true | Rancher v2.10.3 | go/bin/all-in-one-linux | stdlib@v1.21.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.56.0 | true | Rancher v2.10.3 | go/bin/all-in-one-linux | github.com/mostynb/go-grpc-compression@v1.2.2 | GHSA-87m9-rv8p-rgmg | HIGH | affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.56.0 | true | Rancher v2.10.3 | go/bin/all-in-one-linux | go.opentelemetry.io/collector/config/configgrpc@v0.97.0 | CVE-2024-36129 | HIGH | affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.56.0 | true | Rancher v2.10.3 | go/bin/all-in-one-linux | go.opentelemetry.io/collector/config/confighttp@v0.97.0 | CVE-2024-36129 | HIGH | affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.56.0 | true | Rancher v2.10.3 | go/bin/all-in-one-linux | stdlib@v1.22.1 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.56.0 | true | Rancher v2.10.3 | go/bin/all-in-one-linux | stdlib@v1.22.1 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.56.0 | true | Rancher v2.10.3 | go/bin/all-in-one-linux | stdlib@v1.22.1 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.56.0 | true | Rancher v2.10.3 | go/bin/all-in-one-linux | stdlib@v1.22.1 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.57.0 | true | Rancher v2.10.3 | go/bin/all-in-one-linux | github.com/mostynb/go-grpc-compression@v1.2.2 | GHSA-87m9-rv8p-rgmg | HIGH | affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.57.0 | true | Rancher v2.10.3 | go/bin/all-in-one-linux | go.opentelemetry.io/collector/config/configgrpc@v0.98.0 | CVE-2024-36129 | HIGH | affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.57.0 | true | Rancher v2.10.3 | go/bin/all-in-one-linux | go.opentelemetry.io/collector/config/confighttp@v0.98.0 | CVE-2024-36129 | HIGH | affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.57.0 | true | Rancher v2.10.3 | go/bin/all-in-one-linux | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.57.0 | true | Rancher v2.10.3 | go/bin/all-in-one-linux | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.57.0 | true | Rancher v2.10.3 | go/bin/all-in-one-linux | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.60.0 | true | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.3.1-r3 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-jaegertracing-all-in-one:1.60.0 | true | Rancher v2.10.3 | libssl3 | libssl3@3.3.1-r3 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-jaegertracing-all-in-one:1.60.0 | true | Rancher v2.10.3 | go/bin/all-in-one-linux | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.63.0 | true | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.3.2-r0 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-jaegertracing-all-in-one:1.63.0 | true | Rancher v2.10.3 | libssl3 | libssl3@3.3.2-r0 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-jimmidyson-configmap-reload:v0.13.1 | true | Rancher v2.10.3 | configmap-reload | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-dnsmasq-nanny:1.22.28 | true | Rancher v2.10.3 | libc6 | libc6@2.31-13+deb11u7 | CVE-2024-2961 | HIGH | affected | debian | |
rancher/mirrored-k8s-dns-dnsmasq-nanny:1.22.28 | true | Rancher v2.10.3 | libc6 | libc6@2.31-13+deb11u7 | CVE-2024-33599 | HIGH | affected | debian | |
rancher/mirrored-k8s-dns-dnsmasq-nanny:1.22.28 | true | Rancher v2.10.3 | dnsmasq-nanny | stdlib@v1.21.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-dnsmasq-nanny:1.22.28 | true | Rancher v2.10.3 | dnsmasq-nanny | stdlib@v1.21.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-dnsmasq-nanny:1.22.28 | true | Rancher v2.10.3 | dnsmasq-nanny | stdlib@v1.21.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-dnsmasq-nanny:1.23.0 | true | Rancher v2.10.3 | libc6 | libc6@2.31-13+deb11u7 | CVE-2024-2961 | HIGH | affected | debian | |
rancher/mirrored-k8s-dns-dnsmasq-nanny:1.23.0 | true | Rancher v2.10.3 | libc6 | libc6@2.31-13+deb11u7 | CVE-2024-33599 | HIGH | affected | debian | |
rancher/mirrored-k8s-dns-dnsmasq-nanny:1.23.0 | true | Rancher v2.10.3 | dnsmasq-nanny | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-dnsmasq-nanny:1.23.0 | true | Rancher v2.10.3 | dnsmasq-nanny | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-dnsmasq-nanny:1.23.0 | true | Rancher v2.10.3 | dnsmasq-nanny | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-kube-dns:1.22.28 | true | Rancher v2.10.3 | kube-dns | stdlib@v1.21.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-kube-dns:1.22.28 | true | Rancher v2.10.3 | kube-dns | stdlib@v1.21.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-kube-dns:1.22.28 | true | Rancher v2.10.3 | kube-dns | stdlib@v1.21.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-kube-dns:1.23.0 | true | Rancher v2.10.3 | kube-dns | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-kube-dns:1.23.0 | true | Rancher v2.10.3 | kube-dns | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-kube-dns:1.23.0 | true | Rancher v2.10.3 | kube-dns | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.22.28 | true | Rancher v2.10.3 | libc6 | libc6@2.36-9+deb12u3 | CVE-2023-6246 | HIGH | affected | debian | |
rancher/mirrored-k8s-dns-node-cache:1.22.28 | true | Rancher v2.10.3 | libc6 | libc6@2.36-9+deb12u3 | CVE-2023-6779 | HIGH | affected | debian | |
rancher/mirrored-k8s-dns-node-cache:1.22.28 | true | Rancher v2.10.3 | libc6 | libc6@2.36-9+deb12u3 | CVE-2024-2961 | HIGH | affected | debian | |
rancher/mirrored-k8s-dns-node-cache:1.22.28 | true | Rancher v2.10.3 | libc6 | libc6@2.36-9+deb12u3 | CVE-2024-33599 | HIGH | affected | debian | |
rancher/mirrored-k8s-dns-node-cache:1.22.28 | true | Rancher v2.10.3 | libssl3 | libssl3@3.0.11-1~deb12u1 | CVE-2023-5363 | HIGH | affected | debian | |
rancher/mirrored-k8s-dns-node-cache:1.22.28 | true | Rancher v2.10.3 | go-runner | stdlib@v1.21.1 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.22.28 | true | Rancher v2.10.3 | go-runner | stdlib@v1.21.1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.22.28 | true | Rancher v2.10.3 | go-runner | stdlib@v1.21.1 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.22.28 | true | Rancher v2.10.3 | go-runner | stdlib@v1.21.1 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.22.28 | true | Rancher v2.10.3 | go-runner | stdlib@v1.21.1 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.22.28 | true | Rancher v2.10.3 | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2023-5528 | HIGH | affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.22.28 | true | Rancher v2.10.3 | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2024-0793 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.22.28 | true | Rancher v2.10.3 | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.22.28 | true | Rancher v2.10.3 | node-cache | stdlib@v1.21.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.22.28 | true | Rancher v2.10.3 | node-cache | stdlib@v1.21.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.22.28 | true | Rancher v2.10.3 | node-cache | stdlib@v1.21.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher v2.10.3 | libc6 | libc6@2.36-9+deb12u3 | CVE-2023-6246 | HIGH | affected | debian | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher v2.10.3 | libc6 | libc6@2.36-9+deb12u3 | CVE-2023-6779 | HIGH | affected | debian | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher v2.10.3 | libc6 | libc6@2.36-9+deb12u3 | CVE-2024-2961 | HIGH | affected | debian | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher v2.10.3 | libc6 | libc6@2.36-9+deb12u3 | CVE-2024-33599 | HIGH | affected | debian | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher v2.10.3 | libssl3 | libssl3@3.0.11-1~deb12u1 | CVE-2023-5363 | HIGH | affected | debian | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher v2.10.3 | go-runner | stdlib@v1.21.1 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher v2.10.3 | go-runner | stdlib@v1.21.1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher v2.10.3 | go-runner | stdlib@v1.21.1 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher v2.10.3 | go-runner | stdlib@v1.21.1 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher v2.10.3 | go-runner | stdlib@v1.21.1 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher v2.10.3 | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2023-5528 | HIGH | affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher v2.10.3 | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2024-0793 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher v2.10.3 | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher v2.10.3 | node-cache | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher v2.10.3 | node-cache | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher v2.10.3 | node-cache | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-sidecar:1.22.28 | true | Rancher v2.10.3 | sidecar | stdlib@v1.21.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-sidecar:1.22.28 | true | Rancher v2.10.3 | sidecar | stdlib@v1.21.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-sidecar:1.22.28 | true | Rancher v2.10.3 | sidecar | stdlib@v1.21.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-sidecar:1.23.0 | true | Rancher v2.10.3 | sidecar | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-sidecar:1.23.0 | true | Rancher v2.10.3 | sidecar | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-sidecar:1.23.0 | true | Rancher v2.10.3 | sidecar | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.10.3 | glibc | glibc@2.28-225.el8 | CVE-2023-4911 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.10.3 | glibc | glibc@2.28-225.el8 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.10.3 | glibc | glibc@2.28-225.el8 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.10.3 | glibc-common | glibc-common@2.28-225.el8 | CVE-2023-4911 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.10.3 | glibc-common | glibc-common@2.28-225.el8 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.10.3 | glibc-common | glibc-common@2.28-225.el8 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.10.3 | glibc-minimal-langpack | glibc-minimal-langpack@2.28-225.el8 | CVE-2023-4911 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.10.3 | glibc-minimal-langpack | glibc-minimal-langpack@2.28-225.el8 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.10.3 | glibc-minimal-langpack | glibc-minimal-langpack@2.28-225.el8 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.10.3 | opt/kiali/kiali | golang.org/x/net@v0.8.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.10.3 | opt/kiali/kiali | google.golang.org/grpc@v1.55.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.10.3 | opt/kiali/kiali | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.10.3 | opt/kiali/kiali | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.10.3 | opt/kiali/kiali | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.10.3 | opt/kiali/kiali | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.10.3 | opt/kiali/kiali | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kiali-kiali:v1.79.0 | true | Rancher v2.10.3 | glibc | glibc@2.28-236.el8.7 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.79.0 | true | Rancher v2.10.3 | glibc | glibc@2.28-236.el8.7 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.79.0 | true | Rancher v2.10.3 | glibc-common | glibc-common@2.28-236.el8.7 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.79.0 | true | Rancher v2.10.3 | glibc-common | glibc-common@2.28-236.el8.7 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.79.0 | true | Rancher v2.10.3 | glibc-minimal-langpack | glibc-minimal-langpack@2.28-236.el8.7 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.79.0 | true | Rancher v2.10.3 | glibc-minimal-langpack | glibc-minimal-langpack@2.28-236.el8.7 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.79.0 | true | Rancher v2.10.3 | opt/kiali/kiali | google.golang.org/grpc@v1.55.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-kiali-kiali:v1.79.0 | true | Rancher v2.10.3 | opt/kiali/kiali | stdlib@v1.20.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kiali-kiali:v1.79.0 | true | Rancher v2.10.3 | opt/kiali/kiali | stdlib@v1.20.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kiali-kiali:v1.79.0 | true | Rancher v2.10.3 | opt/kiali/kiali | stdlib@v1.20.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kiali-kiali:v1.79.0 | true | Rancher v2.10.3 | opt/kiali/kiali | stdlib@v1.20.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kiali-kiali:v1.86.0 | true | Rancher v2.10.3 | glibc | glibc@2.28-236.el8_9.12 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.86.0 | true | Rancher v2.10.3 | glibc | glibc@2.28-236.el8_9.12 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.86.0 | true | Rancher v2.10.3 | glibc-common | glibc-common@2.28-236.el8_9.12 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.86.0 | true | Rancher v2.10.3 | glibc-common | glibc-common@2.28-236.el8_9.12 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.86.0 | true | Rancher v2.10.3 | glibc-minimal-langpack | glibc-minimal-langpack@2.28-236.el8_9.12 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.86.0 | true | Rancher v2.10.3 | glibc-minimal-langpack | glibc-minimal-langpack@2.28-236.el8_9.12 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.86.0 | true | Rancher v2.10.3 | opt/kiali/kiali | stdlib@v1.22.1 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kiali-kiali:v1.86.0 | true | Rancher v2.10.3 | opt/kiali/kiali | stdlib@v1.22.1 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kiali-kiali:v1.86.0 | true | Rancher v2.10.3 | opt/kiali/kiali | stdlib@v1.22.1 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kiali-kiali:v1.86.0 | true | Rancher v2.10.3 | opt/kiali/kiali | stdlib@v1.22.1 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kiali-kiali:v1.89.3 | true | Rancher v2.10.3 | glibc | glibc@2.28-236.el8_9.12 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.89.3 | true | Rancher v2.10.3 | glibc | glibc@2.28-236.el8_9.12 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.89.3 | true | Rancher v2.10.3 | glibc-common | glibc-common@2.28-236.el8_9.12 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.89.3 | true | Rancher v2.10.3 | glibc-common | glibc-common@2.28-236.el8_9.12 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.89.3 | true | Rancher v2.10.3 | glibc-minimal-langpack | glibc-minimal-langpack@2.28-236.el8_9.12 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.89.3 | true | Rancher v2.10.3 | glibc-minimal-langpack | glibc-minimal-langpack@2.28-236.el8_9.12 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.89.3 | true | Rancher v2.10.3 | opt/kiali/kiali | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kiali-kiali:v2.1.0 | true | Rancher v2.10.3 | glibc | glibc@2.34-83.el9_3.12 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v2.1.0 | true | Rancher v2.10.3 | glibc | glibc@2.34-83.el9_3.12 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v2.1.0 | true | Rancher v2.10.3 | glibc-common | glibc-common@2.34-83.el9_3.12 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v2.1.0 | true | Rancher v2.10.3 | glibc-common | glibc-common@2.34-83.el9_3.12 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v2.1.0 | true | Rancher v2.10.3 | glibc-minimal-langpack | glibc-minimal-langpack@2.34-83.el9_3.12 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v2.1.0 | true | Rancher v2.10.3 | glibc-minimal-langpack | glibc-minimal-langpack@2.34-83.el9_3.12 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v2.1.0 | true | Rancher v2.10.3 | openssl | openssl@1:3.0.7-25.el9_3 | CVE-2024-12797 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v2.1.0 | true | Rancher v2.10.3 | openssl-libs | openssl-libs@1:3.0.7-25.el9_3 | CVE-2024-12797 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v2.1.0 | true | Rancher v2.10.3 | opt/kiali/kiali | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.27.4 | true | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.3.0-r2 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.27.4 | true | Rancher v2.10.3 | libexpat | libexpat@2.6.2-r0 | CVE-2024-45491 | CRITICAL | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.27.4 | true | Rancher v2.10.3 | libexpat | libexpat@2.6.2-r0 | CVE-2024-45492 | CRITICAL | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.27.4 | true | Rancher v2.10.3 | libexpat | libexpat@2.6.2-r0 | CVE-2024-45490 | HIGH | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.27.4 | true | Rancher v2.10.3 | libssl3 | libssl3@3.3.0-r2 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-kube-logging-fluentd:v1.16-4.10-full | true | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.3.2-r1 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-kube-logging-fluentd:v1.16-4.10-full | true | Rancher v2.10.3 | libssl3 | libssl3@3.3.2-r1 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-kube-logging-fluentd:v1.16-4.10-full | true | Rancher v2.10.3 | Ruby | google-protobuf@3.21.12 | CVE-2024-7254 | HIGH | affected | gemspec | |
rancher/mirrored-kube-logging-fluentd:v1.16-4.10-full | true | Rancher v2.10.3 | Ruby | rack@3.0.9.1 | CVE-2025-27610 | HIGH | affected | gemspec | |
rancher/mirrored-kube-logging-fluentd:v1.16-4.10-full | true | Rancher v2.10.3 | Ruby | rexml@3.2.6 | CVE-2024-49761 | HIGH | affected | gemspec | |
rancher/mirrored-kube-logging-fluentd:v1.16-4.10-full | true | Rancher v2.10.3 | Ruby | rexml@3.3.2 | CVE-2024-49761 | HIGH | affected | gemspec | |
rancher/mirrored-kube-logging-fluentd:v1.16-4.10-full | true | Rancher v2.10.3 | Ruby | webrick@1.8.1 | CVE-2024-47220 | HIGH | affected | gemspec | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.12.0 | true | Rancher v2.10.3 | kube-state-metrics | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.12.0 | true | Rancher v2.10.3 | kube-state-metrics | golang.org/x/net@v0.22.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.12.0 | true | Rancher v2.10.3 | kube-state-metrics | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.12.0 | true | Rancher v2.10.3 | kube-state-metrics | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.12.0 | true | Rancher v2.10.3 | kube-state-metrics | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.10.3 | libcrypto1.1 | libcrypto1.1@1.1.1q-r0 | CVE-2022-4450 | HIGH | affected | alpine | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.10.3 | libcrypto1.1 | libcrypto1.1@1.1.1q-r0 | CVE-2023-0215 | HIGH | affected | alpine | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.10.3 | libcrypto1.1 | libcrypto1.1@1.1.1q-r0 | CVE-2023-0286 | HIGH | affected | alpine | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.10.3 | libcrypto1.1 | libcrypto1.1@1.1.1q-r0 | CVE-2023-0464 | HIGH | affected | alpine | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.10.3 | libssl1.1 | libssl1.1@1.1.1q-r0 | CVE-2022-4450 | HIGH | affected | alpine | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.10.3 | libssl1.1 | libssl1.1@1.1.1q-r0 | CVE-2023-0215 | HIGH | affected | alpine | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.10.3 | libssl1.1 | libssl1.1@1.1.1q-r0 | CVE-2023-0286 | HIGH | affected | alpine | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.10.3 | libssl1.1 | libssl1.1@1.1.1q-r0 | CVE-2023-0464 | HIGH | affected | alpine | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.10.3 | kube-vip | github.com/osrg/gobgp/v3@v3.12.0 | CVE-2023-46565 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.10.3 | kube-vip | google.golang.org/grpc@v1.51.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.10.3 | kube-vip | stdlib@v1.19.2 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.10.3 | kube-vip | stdlib@v1.19.2 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.10.3 | kube-vip | stdlib@v1.19.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.10.3 | kube-vip | stdlib@v1.19.2 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.10.3 | kube-vip | stdlib@v1.19.2 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.10.3 | kube-vip | stdlib@v1.19.2 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.10.3 | kube-vip | stdlib@v1.19.2 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.10.3 | kube-vip | stdlib@v1.19.2 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.10.3 | kube-vip | stdlib@v1.19.2 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.10.3 | kube-vip | stdlib@v1.19.2 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.10.3 | kube-vip | stdlib@v1.19.2 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.10.3 | kube-vip | stdlib@v1.19.2 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.10.3 | kube-vip | stdlib@v1.19.2 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.10.3 | kube-vip | stdlib@v1.19.2 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.10.3 | kube-vip | stdlib@v1.19.2 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.10.3 | kube-vip | stdlib@v1.19.2 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.10.3 | kube-vip | stdlib@v1.19.2 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.10.3 | kube-vip | stdlib@v1.19.2 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.10.3 | kube-vip | stdlib@v1.19.2 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.10.3 | kube-vip | stdlib@v1.19.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.8.7 | true | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.3.2-r1 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.8.7 | true | Rancher v2.10.3 | libssl3 | libssl3@3.3.2-r1 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.24.0-alpine | true | Rancher v2.10.3 | curl | curl@8.5.0-r0 | CVE-2024-2398 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.24.0-alpine | true | Rancher v2.10.3 | curl | curl@8.5.0-r0 | CVE-2024-6197 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.24.0-alpine | true | Rancher v2.10.3 | libcurl | libcurl@8.5.0-r0 | CVE-2024-2398 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.24.0-alpine | true | Rancher v2.10.3 | libcurl | libcurl@8.5.0-r0 | CVE-2024-6197 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.24.0-alpine | true | Rancher v2.10.3 | libexpat | libexpat@2.6.2-r0 | CVE-2024-45491 | CRITICAL | affected | alpine | |
rancher/mirrored-library-nginx:1.24.0-alpine | true | Rancher v2.10.3 | libexpat | libexpat@2.6.2-r0 | CVE-2024-45492 | CRITICAL | affected | alpine | |
rancher/mirrored-library-nginx:1.24.0-alpine | true | Rancher v2.10.3 | libexpat | libexpat@2.6.2-r0 | CVE-2024-45490 | HIGH | affected | alpine | |
rancher/mirrored-library-traefik:2.10.7 | true | Rancher v2.10.3 | usr/local/bin/traefik | github.com/docker/docker@v20.10.21+incompatible | CVE-2023-28840 | HIGH | affected | gobinary | |
rancher/mirrored-library-traefik:2.10.7 | true | Rancher v2.10.3 | usr/local/bin/traefik | github.com/quic-go/quic-go@v0.39.1 | CVE-2024-22189 | HIGH | affected | gobinary | |
rancher/mirrored-library-traefik:2.10.7 | true | Rancher v2.10.3 | usr/local/bin/traefik | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-library-traefik:2.10.7 | true | Rancher v2.10.3 | usr/local/bin/traefik | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-library-traefik:2.10.7 | true | Rancher v2.10.3 | usr/local/bin/traefik | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-library-traefik:2.11.10 | true | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.3.2-r0 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-library-traefik:2.11.10 | true | Rancher v2.10.3 | libssl3 | libssl3@3.3.2-r0 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-library-traefik:2.11.18 | true | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.3.2-r4 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-library-traefik:2.11.18 | true | Rancher v2.10.3 | libssl3 | libssl3@3.3.2-r4 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-library-traefik:2.11.8 | true | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.3.2-r0 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-library-traefik:2.11.8 | true | Rancher v2.10.3 | libssl3 | libssl3@3.3.2-r0 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-library-traefik:2.11.8 | true | Rancher v2.10.3 | usr/local/bin/traefik | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-backing-image-manager:v1.7.3 | true | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.20.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | github.com/prometheus/client_golang@v1.9.0 | CVE-2022-21698 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | golang.org/x/net@v0.0.0-20210410081132-afb366fc7cd1 | CVE-2021-33194 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | golang.org/x/net@v0.0.0-20210410081132-afb366fc7cd1 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | golang.org/x/net@v0.0.0-20210410081132-afb366fc7cd1 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | golang.org/x/net@v0.0.0-20210410081132-afb366fc7cd1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | golang.org/x/net@v0.0.0-20210410081132-afb366fc7cd1 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | golang.org/x/text@v0.3.6 | CVE-2021-38561 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | golang.org/x/text@v0.3.6 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | google.golang.org/grpc@v1.36.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | gopkg.in/yaml.v3@v3.0.0-20210107192922-496545a6307b | CVE-2022-28948 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2021-27918 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2021-33195 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2021-33196 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2021-33198 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2021-39293 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.16 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | github.com/prometheus/client_golang@v1.11.0 | CVE-2022-21698 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | golang.org/x/net@v0.0.0-20210520170846-37e1c6afe023 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | golang.org/x/net@v0.0.0-20210520170846-37e1c6afe023 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | golang.org/x/net@v0.0.0-20210520170846-37e1c6afe023 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | golang.org/x/net@v0.0.0-20210520170846-37e1c6afe023 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | golang.org/x/text@v0.3.6 | CVE-2021-38561 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | golang.org/x/text@v0.3.6 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | google.golang.org/grpc@v1.38.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-33195 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-33196 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-33198 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-39293 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | github.com/gogo/protobuf@v1.3.1 | CVE-2021-3121 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | github.com/prometheus/client_golang@v1.8.0 | CVE-2022-21698 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | golang.org/x/crypto@v0.0.0-20201208171446-5f87f3452ae9 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | golang.org/x/crypto@v0.0.0-20201208171446-5f87f3452ae9 | CVE-2020-29652 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | golang.org/x/crypto@v0.0.0-20201208171446-5f87f3452ae9 | CVE-2021-43565 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | golang.org/x/crypto@v0.0.0-20201208171446-5f87f3452ae9 | CVE-2022-27191 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | golang.org/x/net@v0.0.0-20201209123823-ac852fbbde11 | CVE-2021-33194 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | golang.org/x/net@v0.0.0-20201209123823-ac852fbbde11 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | golang.org/x/net@v0.0.0-20201209123823-ac852fbbde11 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | golang.org/x/net@v0.0.0-20201209123823-ac852fbbde11 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | golang.org/x/net@v0.0.0-20201209123823-ac852fbbde11 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | golang.org/x/text@v0.3.4 | CVE-2021-38561 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | golang.org/x/text@v0.3.4 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | google.golang.org/grpc@v1.34.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | gopkg.in/yaml.v3@v3.0.0-20200615113413-eeeca48fe776 | CVE-2022-28948 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2020-28362 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2021-27918 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2021-33195 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2021-33196 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2021-33198 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2021-39293 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.15 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | github.com/prometheus/client_golang@v1.9.0 | CVE-2022-21698 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | golang.org/x/net@v0.0.0-20210316092652-d523dce5a7f4 | CVE-2021-33194 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | golang.org/x/net@v0.0.0-20210316092652-d523dce5a7f4 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | golang.org/x/net@v0.0.0-20210316092652-d523dce5a7f4 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | golang.org/x/net@v0.0.0-20210316092652-d523dce5a7f4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | golang.org/x/net@v0.0.0-20210316092652-d523dce5a7f4 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | golang.org/x/text@v0.3.5 | CVE-2021-38561 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | golang.org/x/text@v0.3.5 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | google.golang.org/grpc@v1.36.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | gopkg.in/yaml.v3@v3.0.0-20210107192922-496545a6307b | CVE-2022-28948 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2021-27918 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2021-33195 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2021-33196 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2021-33198 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2021-39293 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.16 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-longhorn-engine:v1.7.3 | true | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.20.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/mirrored-longhornio-longhorn-instance-manager:v1.7.3 | true | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.20.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/mirrored-longhornio-longhorn-manager:v1.7.3 | true | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.20.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/mirrored-longhornio-longhorn-share-manager:v1.7.3 | true | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.20.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/mirrored-longhornio-longhorn-ui:v1.7.3 | true | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.20.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/mirrored-longhornio-longhorn-ui:v1.7.3 | true | Rancher v2.10.3 | libxml2-tools | libxml2-tools@2.10.3-150500.5.20.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/mirrored-longhornio-support-bundle-kit:v0.0.51 | true | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.20.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | libcrypto1.1 | libcrypto1.1@1.1.1n-r0 | CVE-2022-4450 | HIGH | affected | alpine | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | libcrypto1.1 | libcrypto1.1@1.1.1n-r0 | CVE-2023-0215 | HIGH | affected | alpine | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | libcrypto1.1 | libcrypto1.1@1.1.1n-r0 | CVE-2023-0286 | HIGH | affected | alpine | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | libcrypto1.1 | libcrypto1.1@1.1.1n-r0 | CVE-2023-0464 | HIGH | affected | alpine | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | libssl1.1 | libssl1.1@1.1.1n-r0 | CVE-2022-4450 | HIGH | affected | alpine | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | libssl1.1 | libssl1.1@1.1.1n-r0 | CVE-2023-0215 | HIGH | affected | alpine | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | libssl1.1 | libssl1.1@1.1.1n-r0 | CVE-2023-0286 | HIGH | affected | alpine | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | libssl1.1 | libssl1.1@1.1.1n-r0 | CVE-2023-0464 | HIGH | affected | alpine | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | zlib | zlib@1.2.12-r0 | CVE-2022-37434 | CRITICAL | affected | alpine | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | github.com/prometheus/client_golang@v1.11.0 | CVE-2022-21698 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | stdlib@v1.18 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | stdlib@v1.18 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | stdlib@v1.18 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-27536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | stdlib@v1.18 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | stdlib@v1.18 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | stdlib@v1.18 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | stdlib@v1.18 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | stdlib@v1.18 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | stdlib@v1.18 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | stdlib@v1.18 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | stdlib@v1.18 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | stdlib@v1.18 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | stdlib@v1.18 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | stdlib@v1.18 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.7.0 | true | Rancher v2.10.3 | metrics-server | stdlib@v1.21.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.7.0 | true | Rancher v2.10.3 | metrics-server | stdlib@v1.21.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.7.0 | true | Rancher v2.10.3 | metrics-server | stdlib@v1.21.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.7.1 | true | Rancher v2.10.3 | metrics-server | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.7.1 | true | Rancher v2.10.3 | metrics-server | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.7.1 | true | Rancher v2.10.3 | metrics-server | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.7.2 | true | Rancher v2.10.3 | metrics-server | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.12.0 | true | Rancher v2.10.3 | adapter | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.12.0 | true | Rancher v2.10.3 | adapter | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.12.0 | true | Rancher v2.10.3 | adapter | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.27.0 | true | Rancher v2.10.3 | bin/alertmanager | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.27.0 | true | Rancher v2.10.3 | bin/alertmanager | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.27.0 | true | Rancher v2.10.3 | bin/alertmanager | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.27.0 | true | Rancher v2.10.3 | bin/amtool | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.27.0 | true | Rancher v2.10.3 | bin/amtool | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.27.0 | true | Rancher v2.10.3 | bin/amtool | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.8.2 | true | Rancher v2.10.3 | bin/node_exporter | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-admission-webhook:v0.75.1 | true | Rancher v2.10.3 | bin/admission-webhook | golang.org/x/net@v0.26.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-admission-webhook:v0.75.1 | true | Rancher v2.10.3 | bin/admission-webhook | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-config-reloader:v0.75.1 | true | Rancher v2.10.3 | bin/prometheus-config-reloader | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-config-reloader:v0.75.1 | true | Rancher v2.10.3 | bin/prometheus-config-reloader | golang.org/x/net@v0.26.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-config-reloader:v0.75.1 | true | Rancher v2.10.3 | bin/prometheus-config-reloader | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-operator:v0.75.1 | true | Rancher v2.10.3 | bin/operator | golang.org/x/net@v0.26.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-operator:v0.75.1 | true | Rancher v2.10.3 | bin/operator | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.53.1 | true | Rancher v2.10.3 | bin/prometheus | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.53.1 | true | Rancher v2.10.3 | bin/promtool | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-attacher:v4.5.0 | true | Rancher v2.10.3 | csi-attacher | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.44.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-attacher:v4.5.0 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-attacher:v4.5.0 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-attacher:v4.5.0 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-attacher:v4.5.1 | true | Rancher v2.10.3 | csi-attacher | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.44.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-attacher:v4.5.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-attacher:v4.5.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-attacher:v4.5.1 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-attacher:v4.7.0 | true | Rancher v2.10.3 | csi-attacher | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.10.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.10.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.10.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.10.1 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.10.1 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.10.1 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.12.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.0 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.0 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.0 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.1 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.1 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.1 | true | Rancher v2.10.3 | csi-provisioner | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.0 | true | Rancher v2.10.3 | csi-resizer | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.44.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.0 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.1 | true | Rancher v2.10.3 | csi-resizer | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.44.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.1 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.1 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.1 | true | Rancher v2.10.3 | csi-resizer | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.1 | true | Rancher v2.10.3 | csi-snapshotter | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.1 | true | Rancher v2.10.3 | csi-snapshotter | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.1 | true | Rancher v2.10.3 | csi-snapshotter | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.2 | true | Rancher v2.10.3 | csi-snapshotter | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.2 | true | Rancher v2.10.3 | csi-snapshotter | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.2 | true | Rancher v2.10.3 | csi-snapshotter | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.12.0 | true | Rancher v2.10.3 | livenessprobe | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.12.0 | true | Rancher v2.10.3 | livenessprobe | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.12.0 | true | Rancher v2.10.3 | livenessprobe | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.14.0 | true | Rancher v2.10.3 | livenessprobe | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.10.3 | snapshot-controller | golang.org/x/net@v0.4.0 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.10.3 | snapshot-controller | golang.org/x/net@v0.4.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.10.3 | snapshot-controller | stdlib@v1.19 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.10.3 | snapshot-controller | stdlib@v1.19 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.10.3 | snapshot-controller | stdlib@v1.19 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.10.3 | snapshot-controller | stdlib@v1.19 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.10.3 | snapshot-controller | stdlib@v1.19 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.10.3 | snapshot-controller | stdlib@v1.19 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.10.3 | snapshot-controller | stdlib@v1.19 | CVE-2022-32190 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.10.3 | snapshot-controller | stdlib@v1.19 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.10.3 | snapshot-controller | stdlib@v1.19 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.10.3 | snapshot-controller | stdlib@v1.19 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.10.3 | snapshot-controller | stdlib@v1.19 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.10.3 | snapshot-controller | stdlib@v1.19 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.10.3 | snapshot-controller | stdlib@v1.19 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.10.3 | snapshot-controller | stdlib@v1.19 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.10.3 | snapshot-controller | stdlib@v1.19 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.10.3 | snapshot-controller | stdlib@v1.19 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.10.3 | snapshot-controller | stdlib@v1.19 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.10.3 | snapshot-controller | stdlib@v1.19 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.10.3 | snapshot-controller | stdlib@v1.19 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.10.3 | snapshot-controller | stdlib@v1.19 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.10.3 | snapshot-controller | stdlib@v1.19 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.10.3 | snapshot-controller | stdlib@v1.19 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.10.3 | snapshot-controller | stdlib@v1.19 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.10.3 | snapshot-controller | stdlib@v1.19 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.10.3 | snapshot-controller | stdlib@v1.19 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v8.1.0 | true | Rancher v2.10.3 | snapshot-controller | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.10.3 | snapshot-validation-webhook | golang.org/x/net@v0.8.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.10.3 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.10.3 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.10.3 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.10.3 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.10.3 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.10.3 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.10.3 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2022-32190 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.10.3 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.10.3 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.10.3 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.10.3 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.10.3 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.10.3 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.10.3 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.10.3 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.10.3 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.10.3 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.10.3 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.10.3 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.10.3 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.10.3 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.10.3 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.10.3 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.10.3 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.10.3 | snapshot-validation-webhook | stdlib@v1.19 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v8.1.0 | true | Rancher v2.10.3 | snapshot-validation-webhook | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sonobuoy-sonobuoy:v0.57.2 | true | Rancher v2.10.3 | sonobuoy | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-thanos-thanos:v0.35.1 | true | Rancher v2.10.3 | bin/thanos | stdlib@v1.21.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-thanos-thanos:v0.35.1 | true | Rancher v2.10.3 | bin/thanos | stdlib@v1.21.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/neuvector-controller:5.4.2 | false | Rancher v2.10.3 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/neuvector-controller:5.4.2 | false | Rancher v2.10.3 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/neuvector-enforcer:5.4.2 | false | Rancher v2.10.3 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/neuvector-enforcer:5.4.2 | false | Rancher v2.10.3 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/neuvector-enforcer:5.4.2 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/neuvector-enforcer:5.4.2 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/neuvector-manager:5.4.2 | false | Rancher v2.10.3 | libpython3_12-1_0 | libpython3_12-1_0@3.12.8-150600.3.15.1 | SUSE-SU-2025:0521-1 | HIGH | affected | sles | |
rancher/neuvector-manager:5.4.2 | false | Rancher v2.10.3 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/neuvector-manager:5.4.2 | false | Rancher v2.10.3 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/neuvector-manager:5.4.2 | false | Rancher v2.10.3 | python312 | python312@3.12.8-150600.3.15.1 | SUSE-SU-2025:0521-1 | HIGH | affected | sles | |
rancher/neuvector-manager:5.4.2 | false | Rancher v2.10.3 | python312-base | python312-base@3.12.8-150600.3.15.1 | SUSE-SU-2025:0521-1 | HIGH | affected | sles | |
rancher/neuvector-prometheus-exporter:1.0.1 | false | Rancher v2.10.3 | libpython3_12-1_0 | libpython3_12-1_0@3.12.8-150600.3.15.1 | SUSE-SU-2025:0521-1 | HIGH | affected | sles | |
rancher/neuvector-prometheus-exporter:1.0.1 | false | Rancher v2.10.3 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/neuvector-prometheus-exporter:1.0.1 | false | Rancher v2.10.3 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/neuvector-prometheus-exporter:1.0.1 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/neuvector-prometheus-exporter:1.0.1 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/neuvector-prometheus-exporter:1.0.1 | false | Rancher v2.10.3 | python312 | python312@3.12.8-150600.3.15.1 | SUSE-SU-2025:0521-1 | HIGH | affected | sles | |
rancher/neuvector-prometheus-exporter:1.0.1 | false | Rancher v2.10.3 | python312-base | python312-base@3.12.8-150600.3.15.1 | SUSE-SU-2025:0521-1 | HIGH | affected | sles | |
rancher/neuvector-prometheus-exporter:1.0.1 | false | Rancher v2.10.3 | python312-devel | python312-devel@3.12.8-150600.3.15.1 | SUSE-SU-2025:0521-1 | HIGH | affected | sles | |
rancher/neuvector-registry-adapter:0.1.5 | false | Rancher v2.10.3 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/neuvector-registry-adapter:0.1.5 | false | Rancher v2.10.3 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/neuvector-updater:0.0.1 | false | Rancher v2.10.3 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/neuvector-updater:0.0.1 | false | Rancher v2.10.3 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:nginx-1.11.3-rancher1 | false | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.3.2-r1 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.11.3-rancher1 | false | Rancher v2.10.3 | libssl3 | libssl3@3.3.2-r1 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.11.3-rancher1 | false | Rancher v2.10.3 | libxml2 | libxml2@2.12.7-r0 | CVE-2024-56171 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.11.3-rancher1 | false | Rancher v2.10.3 | libxml2 | libxml2@2.12.7-r0 | CVE-2025-24928 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.11.3-rancher1 | false | Rancher v2.10.3 | libxml2 | libxml2@2.12.7-r0 | CVE-2025-27113 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.11.3-rancher1 | false | Rancher v2.10.3 | openssl | openssl@3.3.2-r1 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.12.0-rancher1 | false | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.3.2-r4 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.12.0-rancher1 | false | Rancher v2.10.3 | libssl3 | libssl3@3.3.2-r4 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.12.0-rancher1 | false | Rancher v2.10.3 | libxml2 | libxml2@2.13.4-r3 | CVE-2024-56171 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.12.0-rancher1 | false | Rancher v2.10.3 | libxml2 | libxml2@2.13.4-r3 | CVE-2025-24928 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.12.0-rancher1 | false | Rancher v2.10.3 | libxml2 | libxml2@2.13.4-r3 | CVE-2025-27113 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.12.0-rancher1 | false | Rancher v2.10.3 | openssl | openssl@3.3.2-r4 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.10.3 | git | git@2.43.0-150600.3.6.1 | SUSE-SU-2025:0116-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.10.3 | git-core | git-core@2.43.0-150600.3.6.1 | SUSE-SU-2025:0116-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.10.3 | glib2-tools | glib2-tools@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.10.3 | libgio-2_0-0 | libgio-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.10.3 | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.10.3 | libgmodule-2_0-0 | libgmodule-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.10.3 | libgobject-2_0-0 | libgobject-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.10.3 | libopenssl-3-devel | libopenssl-3-devel@3.1.4-150600.5.15.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.10.3 | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.1.4-150600.5.15.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.10.3 | libopenssl3 | libopenssl3@3.1.4-150600.5.15.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.10.3 | libprotobuf25_1_0 | libprotobuf25_1_0@25.1-150600.16.4.2 | SUSE-SU-2024:3745-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.10.3 | libprotoc25_1_0 | libprotoc25_1_0@25.1-150600.16.4.2 | SUSE-SU-2024:3745-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.10.3 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.10.3 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.10.3 | libxml2-tools | libxml2-tools@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.10.3 | libxml2-tools | libxml2-tools@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.10.3 | openssl-3 | openssl-3@3.1.4-150600.5.15.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.10.3 | perl-Git | perl-Git@2.43.0-150600.3.6.1 | SUSE-SU-2025:0116-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.10.3 | nginx-ingress-controller | golang.org/x/net@v0.28.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/nginx-ingress-controller:v1.10.5-hardened3 | false | Rancher v2.10.3 | git | git@2.43.0-150600.3.6.1 | SUSE-SU-2025:0116-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened3 | false | Rancher v2.10.3 | git-core | git-core@2.43.0-150600.3.6.1 | SUSE-SU-2025:0116-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened3 | false | Rancher v2.10.3 | glib2-tools | glib2-tools@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened3 | false | Rancher v2.10.3 | libgio-2_0-0 | libgio-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened3 | false | Rancher v2.10.3 | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened3 | false | Rancher v2.10.3 | libgmodule-2_0-0 | libgmodule-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened3 | false | Rancher v2.10.3 | libgobject-2_0-0 | libgobject-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened3 | false | Rancher v2.10.3 | libprotobuf25_1_0 | libprotobuf25_1_0@25.1-150600.16.4.2 | SUSE-SU-2024:3745-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened3 | false | Rancher v2.10.3 | libprotoc25_1_0 | libprotoc25_1_0@25.1-150600.16.4.2 | SUSE-SU-2024:3745-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened3 | false | Rancher v2.10.3 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened3 | false | Rancher v2.10.3 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened3 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened3 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened3 | false | Rancher v2.10.3 | libxml2-tools | libxml2-tools@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened3 | false | Rancher v2.10.3 | libxml2-tools | libxml2-tools@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened3 | false | Rancher v2.10.3 | perl-Git | perl-Git@2.43.0-150600.3.6.1 | SUSE-SU-2025:0116-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened4 | false | Rancher v2.10.3 | git | git@2.43.0-150600.3.6.1 | SUSE-SU-2025:0116-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened4 | false | Rancher v2.10.3 | git-core | git-core@2.43.0-150600.3.6.1 | SUSE-SU-2025:0116-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened4 | false | Rancher v2.10.3 | glib2-tools | glib2-tools@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened4 | false | Rancher v2.10.3 | libgio-2_0-0 | libgio-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened4 | false | Rancher v2.10.3 | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened4 | false | Rancher v2.10.3 | libgmodule-2_0-0 | libgmodule-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened4 | false | Rancher v2.10.3 | libgobject-2_0-0 | libgobject-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened4 | false | Rancher v2.10.3 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened4 | false | Rancher v2.10.3 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened4 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened4 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened4 | false | Rancher v2.10.3 | libxml2-tools | libxml2-tools@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened4 | false | Rancher v2.10.3 | libxml2-tools | libxml2-tools@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened4 | false | Rancher v2.10.3 | perl-Git | perl-Git@2.43.0-150600.3.6.1 | SUSE-SU-2025:0116-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened6 | false | Rancher v2.10.3 | git | git@2.43.0-150600.3.6.1 | SUSE-SU-2025:0116-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened6 | false | Rancher v2.10.3 | git-core | git-core@2.43.0-150600.3.6.1 | SUSE-SU-2025:0116-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened6 | false | Rancher v2.10.3 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened6 | false | Rancher v2.10.3 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened6 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened6 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened6 | false | Rancher v2.10.3 | libxml2-tools | libxml2-tools@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened6 | false | Rancher v2.10.3 | libxml2-tools | libxml2-tools@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened6 | false | Rancher v2.10.3 | perl-Git | perl-Git@2.43.0-150600.3.6.1 | SUSE-SU-2025:0116-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.12.0-hardened2 | false | Rancher v2.10.3 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.12.0-hardened2 | false | Rancher v2.10.3 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.12.0-hardened2 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.12.0-hardened2 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.12.0-hardened2 | false | Rancher v2.10.3 | libxml2-tools | libxml2-tools@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.12.0-hardened2 | false | Rancher v2.10.3 | libxml2-tools | libxml2-tools@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/prometheus-federator:v0.4.4 | false | Rancher v2.10.3 | usr/bin/prometheus-federator | github.com/rancher/wrangler@v0.8.11-0.20220217210408-3ecd23dfea3b | CVE-2022-31249 | HIGH | affected | gobinary | |
rancher/prometheus-federator:v0.4.4 | false | Rancher v2.10.3 | usr/bin/prometheus-federator | golang.org/x/net@v0.7.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/prometheus-federator:v0.4.4 | false | Rancher v2.10.3 | usr/bin/prometheus-federator | golang.org/x/net@v0.7.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/prometheus-federator:v0.4.4 | false | Rancher v2.10.3 | usr/bin/prometheus-federator | gopkg.in/yaml.v3@v3.0.0-20210107192922-496545a6307b | CVE-2022-28948 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/prometheus-federator:v0.4.4 | false | Rancher v2.10.3 | usr/bin/prometheus-federator | helm.sh/helm/v3@v3.8.0 | CVE-2024-26147 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/pushprox-client:v0.1.4-rancher2-client | false | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.3.2-r0 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/pushprox-client:v0.1.4-rancher2-client | false | Rancher v2.10.3 | libssl3 | libssl3@3.3.2-r0 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/pushprox-proxy:v0.1.4-rancher2-proxy | false | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.3.2-r0 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/pushprox-proxy:v0.1.4-rancher2-proxy | false | Rancher v2.10.3 | libssl3 | libssl3@3.3.2-r0 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/rancher-agent:v2.10.3 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.20.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/rancher-agent:v2.10.3 | false | Rancher v2.10.3 | usr/bin/kubectl | stdlib@v1.20.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher-agent:v2.10.3 | false | Rancher v2.10.3 | usr/bin/kubectl | stdlib@v1.20.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher-agent:v2.10.3 | false | Rancher v2.10.3 | usr/bin/kubectl | stdlib@v1.20.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | opt/drivers/management-state/bin/docker-machine-driver-linode | github.com/docker/docker@v20.10.27+incompatible | CVE-2024-41110 | CRITICAL | affected | gobinary | |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | opt/drivers/management-state/bin/docker-machine-driver-linode | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | opt/drivers/management-state/bin/docker-machine-driver-linode | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | opt/drivers/management-state/bin/docker-machine-driver-linode | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | opt/drivers/management-state/bin/docker-machine-driver-linode | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | opt/drivers/management-state/bin/docker-machine-driver-linode | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | usr/bin/bandwidth | stdlib@v1.22.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | usr/bin/cni | stdlib@v1.22.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | usr/bin/containerd | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.45.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | usr/bin/containerd | stdlib@v1.22.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | usr/bin/containerd-shim-runc-v2 | stdlib@v1.22.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | usr/bin/etcdctl | stdlib@v1.21.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | usr/bin/etcdctl | stdlib@v1.21.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | usr/bin/firewall | stdlib@v1.22.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | usr/bin/k3s | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.45.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | usr/bin/k3s | stdlib@v1.22.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | usr/bin/kustomize | stdlib@v1.21.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | usr/bin/kustomize | stdlib@v1.21.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | usr/bin/runc | stdlib@v1.22.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | usr/bin/telemetry | stdlib@v1.21.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | usr/bin/telemetry | stdlib@v1.21.3 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | usr/bin/telemetry | stdlib@v1.21.3 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | usr/bin/telemetry | stdlib@v1.21.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | usr/share/rancher/ui/assets/wins.exe | golang.org/x/crypto@v0.30.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | usr/share/rancher/ui/assets/wins.exe | golang.org/x/net@v0.32.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.105 | false | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.3.2-r1 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/rke-tools:v0.1.105 | false | Rancher v2.10.3 | libssl3 | libssl3@3.3.2-r1 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/rke-tools:v0.1.105 | false | Rancher v2.10.3 | libxml2 | libxml2@2.12.7-r0 | CVE-2024-56171 | HIGH | affected | alpine | |
rancher/rke-tools:v0.1.105 | false | Rancher v2.10.3 | libxml2 | libxml2@2.12.7-r0 | CVE-2025-24928 | HIGH | affected | alpine | |
rancher/rke-tools:v0.1.105 | false | Rancher v2.10.3 | libxml2 | libxml2@2.12.7-r0 | CVE-2025-27113 | HIGH | affected | alpine | |
rancher/rke-tools:v0.1.105 | false | Rancher v2.10.3 | opt/rke-tools/bin/cri-dockerd | k8s.io/kubernetes@v1.27.13 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.105 | false | Rancher v2.10.3 | opt/rke-tools/bin/cri-dockerd | stdlib@v1.21.9 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.105 | false | Rancher v2.10.3 | opt/rke-tools/bin/cri-dockerd | stdlib@v1.21.9 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.105 | false | Rancher v2.10.3 | opt/rke-tools/bin/docker | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.105 | false | Rancher v2.10.3 | usr/local/bin/kubectl | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.109 | false | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.3.2-r1 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/rke-tools:v0.1.109 | false | Rancher v2.10.3 | libssl3 | libssl3@3.3.2-r1 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/rke-tools:v0.1.109 | false | Rancher v2.10.3 | libxml2 | libxml2@2.12.7-r0 | CVE-2024-56171 | HIGH | affected | alpine | |
rancher/rke-tools:v0.1.109 | false | Rancher v2.10.3 | libxml2 | libxml2@2.12.7-r0 | CVE-2025-24928 | HIGH | affected | alpine | |
rancher/rke-tools:v0.1.109 | false | Rancher v2.10.3 | libxml2 | libxml2@2.12.7-r0 | CVE-2025-27113 | HIGH | affected | alpine | |
rancher/rke-tools:v0.1.109 | false | Rancher v2.10.3 | opt/rke-tools/bin/docker | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.109 | false | Rancher v2.10.3 | usr/local/bin/kubectl | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-cloud-provider:v1.28.13-build20240910 | false | Rancher v2.10.3 | usr/local/bin/rke2-cloud-provider | golang.org/x/crypto@v0.23.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-cloud-provider:v1.28.13-build20240910 | false | Rancher v2.10.3 | usr/local/bin/rke2-cloud-provider | golang.org/x/net@v0.25.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-cloud-provider:v1.29.8-build20240910 | false | Rancher v2.10.3 | usr/local/bin/rke2-cloud-provider | golang.org/x/crypto@v0.23.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-cloud-provider:v1.29.8-build20240910 | false | Rancher v2.10.3 | usr/local/bin/rke2-cloud-provider | golang.org/x/net@v0.25.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-cloud-provider:v1.30.4-build20240910 | false | Rancher v2.10.3 | usr/local/bin/rke2-cloud-provider | golang.org/x/crypto@v0.23.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-cloud-provider:v1.30.4-build20240910 | false | Rancher v2.10.3 | usr/local/bin/rke2-cloud-provider | golang.org/x/net@v0.25.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-cloud-provider:v1.31.0-build20240910 | false | Rancher v2.10.3 | usr/local/bin/rke2-cloud-provider | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-runtime:v1.30.9-rke2r1 | false | Rancher v2.10.3 | bin/crictl | k8s.io/kubernetes@v1.30.0 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/shell:v0.2.1 | false | Rancher v2.10.3 | curl | curl@8.6.0-150600.2.2 | SUSE-SU-2024:2784-1 | HIGH | affected | sles | |
rancher/shell:v0.2.1 | false | Rancher v2.10.3 | libcurl4 | libcurl4@8.6.0-150600.2.2 | SUSE-SU-2024:2784-1 | HIGH | affected | sles | |
rancher/shell:v0.2.1 | false | Rancher v2.10.3 | libopenssl3 | libopenssl3@3.1.4-150600.5.7.1 | SUSE-SU-2024:2635-1 | HIGH | affected | sles | |
rancher/shell:v0.2.1 | false | Rancher v2.10.3 | libopenssl3 | libopenssl3@3.1.4-150600.5.7.1 | SUSE-SU-2024:3106-1 | HIGH | affected | sles | |
rancher/shell:v0.2.1 | false | Rancher v2.10.3 | libopenssl3 | libopenssl3@3.1.4-150600.5.7.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/shell:v0.2.1 | false | Rancher v2.10.3 | usr/local/bin/helm | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.2.1 | false | Rancher v2.10.3 | usr/local/bin/k9s | github.com/go-git/go-git/v5@v5.12.0 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.2.1 | false | Rancher v2.10.3 | usr/local/bin/k9s | github.com/go-git/go-git/v5@v5.12.0 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/shell:v0.2.1 | false | Rancher v2.10.3 | usr/local/bin/k9s | github.com/hashicorp/go-getter@v1.7.4 | CVE-2024-6257 | HIGH | affected | gobinary | |
rancher/shell:v0.2.1 | false | Rancher v2.10.3 | usr/local/bin/k9s | stdlib@v1.22.0 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.2.1 | false | Rancher v2.10.3 | usr/local/bin/k9s | stdlib@v1.22.0 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.2.1 | false | Rancher v2.10.3 | usr/local/bin/k9s | stdlib@v1.22.0 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.2.1 | false | Rancher v2.10.3 | usr/local/bin/k9s | stdlib@v1.22.0 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.2.1 | false | Rancher v2.10.3 | usr/local/bin/kubectl | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.2.1 | false | Rancher v2.10.3 | usr/local/bin/kustomize | stdlib@v1.21.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.2.1 | false | Rancher v2.10.3 | usr/local/bin/kustomize | stdlib@v1.21.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.3.0 | false | Rancher v2.10.3 | usr/local/bin/k9s | github.com/go-git/go-git/v5@v5.12.0 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.3.0 | false | Rancher v2.10.3 | usr/local/bin/k9s | github.com/go-git/go-git/v5@v5.12.0 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/shell:v0.3.0 | false | Rancher v2.10.3 | usr/local/bin/k9s | github.com/hashicorp/go-getter@v1.7.4 | CVE-2024-6257 | HIGH | affected | gobinary | |
rancher/shell:v0.3.0 | false | Rancher v2.10.3 | usr/local/bin/k9s | stdlib@v1.22.0 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.3.0 | false | Rancher v2.10.3 | usr/local/bin/k9s | stdlib@v1.22.0 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.3.0 | false | Rancher v2.10.3 | usr/local/bin/k9s | stdlib@v1.22.0 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.3.0 | false | Rancher v2.10.3 | usr/local/bin/k9s | stdlib@v1.22.0 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-agent:v0.3.11-suc | false | Rancher v2.10.3 | usr/bin/kubectl | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-upgrade-controller:v0.13.4 | false | Rancher v2.10.3 | bin/system-upgrade-controller | stdlib@v1.20.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-upgrade-controller:v0.13.4 | false | Rancher v2.10.3 | bin/system-upgrade-controller | stdlib@v1.20.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-upgrade-controller:v0.13.4 | false | Rancher v2.10.3 | bin/system-upgrade-controller | stdlib@v1.20.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/ui-plugin-catalog:3.4.2 | false | Rancher v2.10.3 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/ui-plugin-catalog:3.4.2 | false | Rancher v2.10.3 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/ui-plugin-catalog:3.4.2 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/ui-plugin-catalog:3.4.2 | false | Rancher v2.10.3 | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/backup-restore-operator:v6.0.0 | false | Rancher v2.10.3 | usr/bin/backup-restore-operator | golang.org/x/crypto@v0.27.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/backup-restore-operator:v6.0.0 | false | Rancher v2.10.3 | usr/bin/backup-restore-operator | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/calico | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/calico | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/calico-ipam | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/install | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/calico | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/calico | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/calico-ipam | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.28.1-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/install | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/calico | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/calico | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/calico-ipam | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.29.0-rancher1 | false | Rancher v2.10.3 | opt/cni/bin/install | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-addon-resizer:1.8.22-build20250110 | false | Rancher v2.10.3 | pod_nanny | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.1-build20240911 | false | Rancher v2.10.3 | opt/cni/bin/calico | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.1-build20240911 | false | Rancher v2.10.3 | opt/cni/bin/calico | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.1-build20240911 | false | Rancher v2.10.3 | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.1-build20240911 | false | Rancher v2.10.3 | opt/cni/bin/calico-ipam | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.1-build20240911 | false | Rancher v2.10.3 | opt/cni/bin/install | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.1-build20240911 | false | Rancher v2.10.3 | usr/bin/calico-node | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.1-build20240911 | false | Rancher v2.10.3 | usr/bin/calico-node | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.1-build20240911 | false | Rancher v2.10.3 | usr/bin/kube-controllers | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.1-build20240911 | false | Rancher v2.10.3 | usr/bin/kube-controllers | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.2-build20241016 | false | Rancher v2.10.3 | opt/cni/bin/calico | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.2-build20241016 | false | Rancher v2.10.3 | opt/cni/bin/calico | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.2-build20241016 | false | Rancher v2.10.3 | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.2-build20241016 | false | Rancher v2.10.3 | opt/cni/bin/calico-ipam | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.2-build20241016 | false | Rancher v2.10.3 | opt/cni/bin/install | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.2-build20241016 | false | Rancher v2.10.3 | usr/bin/calico-node | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.2-build20241016 | false | Rancher v2.10.3 | usr/bin/calico-node | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.2-build20241016 | false | Rancher v2.10.3 | usr/bin/kube-controllers | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.2-build20241016 | false | Rancher v2.10.3 | usr/bin/kube-controllers | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.0-build20241104 | false | Rancher v2.10.3 | calicoctl | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.0-build20241104 | false | Rancher v2.10.3 | calicoctl | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.0-build20241104 | false | Rancher v2.10.3 | opt/cni/bin/calico | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.0-build20241104 | false | Rancher v2.10.3 | opt/cni/bin/calico | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.0-build20241104 | false | Rancher v2.10.3 | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.0-build20241104 | false | Rancher v2.10.3 | opt/cni/bin/calico-ipam | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.0-build20241104 | false | Rancher v2.10.3 | opt/cni/bin/dhcp | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.0-build20241104 | false | Rancher v2.10.3 | opt/cni/bin/install | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.0-build20241104 | false | Rancher v2.10.3 | usr/bin/calico-node | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.0-build20241104 | false | Rancher v2.10.3 | usr/bin/calico-node | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.0-build20241104 | false | Rancher v2.10.3 | usr/bin/kube-controllers | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.0-build20241104 | false | Rancher v2.10.3 | usr/bin/kube-controllers | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20241211 | false | Rancher v2.10.3 | calicoctl | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20241211 | false | Rancher v2.10.3 | calicoctl | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20241211 | false | Rancher v2.10.3 | opt/cni/bin/calico | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20241211 | false | Rancher v2.10.3 | opt/cni/bin/calico | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20241211 | false | Rancher v2.10.3 | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20241211 | false | Rancher v2.10.3 | opt/cni/bin/calico-ipam | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20241211 | false | Rancher v2.10.3 | opt/cni/bin/dhcp | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20241211 | false | Rancher v2.10.3 | opt/cni/bin/install | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20241211 | false | Rancher v2.10.3 | usr/bin/calico-node | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20241211 | false | Rancher v2.10.3 | usr/bin/calico-node | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20241211 | false | Rancher v2.10.3 | usr/bin/kube-controllers | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20241211 | false | Rancher v2.10.3 | usr/bin/kube-controllers | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher v2.10.3 | calicoctl | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher v2.10.3 | calicoctl | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher v2.10.3 | opt/cni/bin/calico | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher v2.10.3 | opt/cni/bin/calico | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher v2.10.3 | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher v2.10.3 | opt/cni/bin/calico-ipam | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher v2.10.3 | opt/cni/bin/dhcp | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher v2.10.3 | opt/cni/bin/install | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher v2.10.3 | usr/bin/calico-node | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher v2.10.3 | usr/bin/calico-node | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher v2.10.3 | usr/bin/kube-controllers | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.29.1-build20250110 | false | Rancher v2.10.3 | usr/bin/kube-controllers | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-cluster-autoscaler:v1.8.11-build20240910 | false | Rancher v2.10.3 | cluster-proportional-autoscaler | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-cluster-autoscaler:v1.8.11-build20241014 | false | Rancher v2.10.3 | cluster-proportional-autoscaler | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-cluster-autoscaler:v1.9.0-build20241126 | false | Rancher v2.10.3 | cluster-proportional-autoscaler | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-cni-plugins:v1.6.0-build20241022 | false | Rancher v2.10.3 | opt/cni/bin/dhcp | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-coredns:v1.11.1-build20240910 | false | Rancher v2.10.3 | coredns | golang.org/x/crypto@v0.12.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-coredns:v1.11.1-build20240910 | false | Rancher v2.10.3 | coredns | golang.org/x/net@v0.14.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-coredns:v1.11.1-build20240910 | false | Rancher v2.10.3 | coredns | golang.org/x/net@v0.14.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-coredns:v1.11.3-build20241018 | false | Rancher v2.10.3 | coredns | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-coredns:v1.11.3-build20241018 | false | Rancher v2.10.3 | coredns | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-coredns:v1.12.0-build20241126 | false | Rancher v2.10.3 | coredns | golang.org/x/crypto@v0.29.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-coredns:v1.12.0-build20241126 | false | Rancher v2.10.3 | coredns | golang.org/x/net@v0.31.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-dns-node-cache:1.23.1-build20240910 | false | Rancher v2.10.3 | node-cache | github.com/coredns/coredns@v1.10.0 | CVE-2023-28452 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-dns-node-cache:1.23.1-build20240910 | false | Rancher v2.10.3 | node-cache | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-dns-node-cache:1.23.1-build20240910 | false | Rancher v2.10.3 | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-dns-node-cache:1.23.1-build20241008 | false | Rancher v2.10.3 | node-cache | github.com/coredns/coredns@v1.10.0 | CVE-2023-28452 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-dns-node-cache:1.23.1-build20241008 | false | Rancher v2.10.3 | node-cache | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-dns-node-cache:1.23.1-build20241008 | false | Rancher v2.10.3 | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-dns-node-cache:1.24.0-build20241211 | false | Rancher v2.10.3 | node-cache | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-dns-node-cache:1.24.0-build20241211 | false | Rancher v2.10.3 | node-cache | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-etcd:v3.5.13-k3s1-build20240910 | false | Rancher v2.10.3 | usr/local/bin/etcd | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.13-k3s1-build20240910 | false | Rancher v2.10.3 | usr/local/bin/etcd | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.13-k3s1-build20240910 | false | Rancher v2.10.3 | usr/local/bin/etcdctl | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.13-k3s1-build20240910 | false | Rancher v2.10.3 | usr/local/bin/etcdctl | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.16-k3s1-build20241106 | false | Rancher v2.10.3 | usr/local/bin/etcd | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.16-k3s1-build20241106 | false | Rancher v2.10.3 | usr/local/bin/etcd | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.16-k3s1-build20241106 | false | Rancher v2.10.3 | usr/local/bin/etcdctl | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.16-k3s1-build20241106 | false | Rancher v2.10.3 | usr/local/bin/etcdctl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-flannel:v0.25.6-build20240910 | false | Rancher v2.10.3 | opt/bin/flanneld | golang.org/x/crypto@v0.25.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-flannel:v0.25.6-build20240910 | false | Rancher v2.10.3 | opt/bin/flanneld | golang.org/x/net@v0.27.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-flannel:v0.25.7-build20241008 | false | Rancher v2.10.3 | opt/bin/flanneld | golang.org/x/crypto@v0.27.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-flannel:v0.25.7-build20241008 | false | Rancher v2.10.3 | opt/bin/flanneld | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-flannel:v0.26.0-build20241024 | false | Rancher v2.10.3 | opt/bin/flanneld | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-flannel:v0.26.0-build20241024 | false | Rancher v2.10.3 | opt/bin/flanneld | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-flannel:v0.26.1-build20241107 | false | Rancher v2.10.3 | opt/bin/flanneld | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-flannel:v0.26.1-build20241107 | false | Rancher v2.10.3 | opt/bin/flanneld | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-flannel:v0.26.1-build20241211 | false | Rancher v2.10.3 | opt/bin/flanneld | golang.org/x/crypto@v0.28.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-flannel:v0.26.1-build20241211 | false | Rancher v2.10.3 | opt/bin/flanneld | golang.org/x/net@v0.30.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-k8s-metrics-server:v0.7.1-build20240910 | false | Rancher v2.10.3 | metrics-server | golang.org/x/crypto@v0.18.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-k8s-metrics-server:v0.7.1-build20240910 | false | Rancher v2.10.3 | metrics-server | golang.org/x/net@v0.20.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-k8s-metrics-server:v0.7.1-build20241008 | false | Rancher v2.10.3 | metrics-server | golang.org/x/crypto@v0.18.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-k8s-metrics-server:v0.7.1-build20241008 | false | Rancher v2.10.3 | metrics-server | golang.org/x/net@v0.20.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-k8s-metrics-server:v0.7.2-build20250110 | false | Rancher v2.10.3 | metrics-server | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-k8s-metrics-server:v0.7.2-build20250110 | false | Rancher v2.10.3 | metrics-server | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.10.3 | usr/local/bin/kube-apiserver | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.10.3 | usr/local/bin/kube-apiserver | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.10.3 | usr/local/bin/kube-apiserver | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.10.3 | usr/local/bin/kube-apiserver | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.10.3 | usr/local/bin/kube-controller-manager | github.com/opencontainers/runc@v1.1.7 | CVE-2024-21626 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.10.3 | usr/local/bin/kube-controller-manager | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.10.3 | usr/local/bin/kube-controller-manager | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.10.3 | usr/local/bin/kube-controller-manager | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.10.3 | usr/local/bin/kube-controller-manager | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.10.3 | usr/local/bin/kube-proxy | github.com/opencontainers/runc@v1.1.7 | CVE-2024-21626 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.10.3 | usr/local/bin/kube-proxy | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.10.3 | usr/local/bin/kube-proxy | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.10.3 | usr/local/bin/kube-proxy | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.10.3 | usr/local/bin/kube-proxy | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.10.3 | usr/local/bin/kube-scheduler | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.10.3 | usr/local/bin/kube-scheduler | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.10.3 | usr/local/bin/kube-scheduler | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.10.3 | usr/local/bin/kube-scheduler | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.10.3 | usr/local/bin/kubeadm | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.10.3 | usr/local/bin/kubeadm | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.10.3 | usr/local/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.10.3 | usr/local/bin/kubelet | github.com/opencontainers/runc@v1.1.7 | CVE-2024-21626 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.10.3 | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.35.0 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.10.3 | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.10.3 | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.10.3 | usr/local/bin/kubelet | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.10.3 | usr/local/bin/kubelet | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.29.13-rke2r1-build20250117 | false | Rancher v2.10.3 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-kubernetes:v1.29.13-rke2r1-build20250117 | false | Rancher v2.10.3 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-kubernetes:v1.29.13-rke2r1-build20250117 | false | Rancher v2.10.3 | usr/local/bin/kube-apiserver | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.29.13-rke2r1-build20250117 | false | Rancher v2.10.3 | usr/local/bin/kube-apiserver | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.29.13-rke2r1-build20250117 | false | Rancher v2.10.3 | usr/local/bin/kube-apiserver | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.29.13-rke2r1-build20250117 | false | Rancher v2.10.3 | usr/local/bin/kube-controller-manager | github.com/opencontainers/runc@v1.1.10 | CVE-2024-21626 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.29.13-rke2r1-build20250117 | false | Rancher v2.10.3 | usr/local/bin/kube-controller-manager | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.29.13-rke2r1-build20250117 | false | Rancher v2.10.3 | usr/local/bin/kube-controller-manager | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.29.13-rke2r1-build20250117 | false | Rancher v2.10.3 | usr/local/bin/kube-controller-manager | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.29.13-rke2r1-build20250117 | false | Rancher v2.10.3 | usr/local/bin/kube-proxy | github.com/opencontainers/runc@v1.1.10 | CVE-2024-21626 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.29.13-rke2r1-build20250117 | false | Rancher v2.10.3 | usr/local/bin/kube-proxy | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.29.13-rke2r1-build20250117 | false | Rancher v2.10.3 | usr/local/bin/kube-proxy | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.29.13-rke2r1-build20250117 | false | Rancher v2.10.3 | usr/local/bin/kube-proxy | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.29.13-rke2r1-build20250117 | false | Rancher v2.10.3 | usr/local/bin/kube-scheduler | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.29.13-rke2r1-build20250117 | false | Rancher v2.10.3 | usr/local/bin/kube-scheduler | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.29.13-rke2r1-build20250117 | false | Rancher v2.10.3 | usr/local/bin/kube-scheduler | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.29.13-rke2r1-build20250117 | false | Rancher v2.10.3 | usr/local/bin/kubeadm | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.29.13-rke2r1-build20250117 | false | Rancher v2.10.3 | usr/local/bin/kubeadm | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.29.13-rke2r1-build20250117 | false | Rancher v2.10.3 | usr/local/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.29.13-rke2r1-build20250117 | false | Rancher v2.10.3 | usr/local/bin/kubelet | github.com/opencontainers/runc@v1.1.10 | CVE-2024-21626 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.29.13-rke2r1-build20250117 | false | Rancher v2.10.3 | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.29.13-rke2r1-build20250117 | false | Rancher v2.10.3 | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.29.13-rke2r1-build20250117 | false | Rancher v2.10.3 | usr/local/bin/kubelet | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.29.13-rke2r1-build20250117 | false | Rancher v2.10.3 | usr/local/bin/kubelet | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.9-rke2r1-build20250116 | false | Rancher v2.10.3 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-kubernetes:v1.30.9-rke2r1-build20250116 | false | Rancher v2.10.3 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-kubernetes:v1.30.9-rke2r1-build20250116 | false | Rancher v2.10.3 | usr/local/bin/kube-apiserver | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.9-rke2r1-build20250116 | false | Rancher v2.10.3 | usr/local/bin/kube-apiserver | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.9-rke2r1-build20250116 | false | Rancher v2.10.3 | usr/local/bin/kube-apiserver | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.9-rke2r1-build20250116 | false | Rancher v2.10.3 | usr/local/bin/kube-controller-manager | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.9-rke2r1-build20250116 | false | Rancher v2.10.3 | usr/local/bin/kube-controller-manager | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.9-rke2r1-build20250116 | false | Rancher v2.10.3 | usr/local/bin/kube-controller-manager | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.9-rke2r1-build20250116 | false | Rancher v2.10.3 | usr/local/bin/kube-proxy | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.9-rke2r1-build20250116 | false | Rancher v2.10.3 | usr/local/bin/kube-proxy | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.9-rke2r1-build20250116 | false | Rancher v2.10.3 | usr/local/bin/kube-proxy | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.9-rke2r1-build20250116 | false | Rancher v2.10.3 | usr/local/bin/kube-scheduler | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.9-rke2r1-build20250116 | false | Rancher v2.10.3 | usr/local/bin/kube-scheduler | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.9-rke2r1-build20250116 | false | Rancher v2.10.3 | usr/local/bin/kube-scheduler | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.9-rke2r1-build20250116 | false | Rancher v2.10.3 | usr/local/bin/kubeadm | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.9-rke2r1-build20250116 | false | Rancher v2.10.3 | usr/local/bin/kubeadm | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.9-rke2r1-build20250116 | false | Rancher v2.10.3 | usr/local/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.9-rke2r1-build20250116 | false | Rancher v2.10.3 | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.30.9-rke2r1-build20250116 | false | Rancher v2.10.3 | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.9-rke2r1-build20250116 | false | Rancher v2.10.3 | usr/local/bin/kubelet | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.30.9-rke2r1-build20250116 | false | Rancher v2.10.3 | usr/local/bin/kubelet | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.5-rke2r1-build20250115 | false | Rancher v2.10.3 | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-kubernetes:v1.31.5-rke2r1-build20250115 | false | Rancher v2.10.3 | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | none | not affected | vulnerable code cannot be controlled by adversary | sles |
rancher/hardened-kubernetes:v1.31.5-rke2r1-build20250115 | false | Rancher v2.10.3 | usr/local/bin/kube-apiserver | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.5-rke2r1-build20250115 | false | Rancher v2.10.3 | usr/local/bin/kube-apiserver | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.5-rke2r1-build20250115 | false | Rancher v2.10.3 | usr/local/bin/kube-controller-manager | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.5-rke2r1-build20250115 | false | Rancher v2.10.3 | usr/local/bin/kube-controller-manager | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.5-rke2r1-build20250115 | false | Rancher v2.10.3 | usr/local/bin/kube-proxy | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.5-rke2r1-build20250115 | false | Rancher v2.10.3 | usr/local/bin/kube-proxy | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.5-rke2r1-build20250115 | false | Rancher v2.10.3 | usr/local/bin/kube-scheduler | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.5-rke2r1-build20250115 | false | Rancher v2.10.3 | usr/local/bin/kube-scheduler | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.5-rke2r1-build20250115 | false | Rancher v2.10.3 | usr/local/bin/kubeadm | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.5-rke2r1-build20250115 | false | Rancher v2.10.3 | usr/local/bin/kubeadm | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.5-rke2r1-build20250115 | false | Rancher v2.10.3 | usr/local/bin/kubectl | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.5-rke2r1-build20250115 | false | Rancher v2.10.3 | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.31.5-rke2r1-build20250115 | false | Rancher v2.10.3 | usr/local/bin/kubelet | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.31.5-rke2r1-build20250115 | false | Rancher v2.10.3 | usr/local/bin/kubelet | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-multus-cni:v4.1.0-build20240910 | false | Rancher v2.10.3 | cert-approver | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-multus-cni:v4.1.0-build20240910 | false | Rancher v2.10.3 | kubeconfig_generator | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-multus-cni:v4.1.0-build20240910 | false | Rancher v2.10.3 | usr/src/multus-cni/bin/multus | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-multus-cni:v4.1.2-build20241011 | false | Rancher v2.10.3 | cert-approver | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-multus-cni:v4.1.2-build20241011 | false | Rancher v2.10.3 | kubeconfig_generator | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-multus-cni:v4.1.2-build20241011 | false | Rancher v2.10.3 | usr/src/multus-cni/bin/multus | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-multus-cni:v4.1.3-build20241028 | false | Rancher v2.10.3 | cert-approver | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-multus-cni:v4.1.3-build20241028 | false | Rancher v2.10.3 | kubeconfig_generator | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-multus-cni:v4.1.3-build20241028 | false | Rancher v2.10.3 | usr/src/multus-cni/bin/multus | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-multus-cni:v4.1.4-build20250108 | false | Rancher v2.10.3 | cert-approver | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-multus-cni:v4.1.4-build20250108 | false | Rancher v2.10.3 | kubeconfig_generator | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-multus-cni:v4.1.4-build20250108 | false | Rancher v2.10.3 | usr/src/multus-cni/bin/multus | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-cloud-provider:v0.2.2 | false | Rancher v2.10.3 | usr/bin/harvester-cloud-provider | github.com/rancher/apiserver@v0.0.0-20230120214941-e88c32739dc7 | CVE-2023-32192 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-cloud-provider:v0.2.2 | false | Rancher v2.10.3 | usr/bin/harvester-cloud-provider | github.com/rancher/norman@v0.0.0-20221205184727-32ef2e185b99 | CVE-2023-32193 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-cloud-provider:v0.2.2 | false | Rancher v2.10.3 | usr/bin/harvester-cloud-provider | golang.org/x/crypto@v0.16.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-cloud-provider:v0.2.2 | false | Rancher v2.10.3 | usr/bin/harvester-cloud-provider | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher v2.10.3 | usr/bin/harvester-cloud-provider | github.com/rancher/apiserver@v0.0.0-20230120214941-e88c32739dc7 | CVE-2023-32192 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher v2.10.3 | usr/bin/harvester-cloud-provider | github.com/rancher/norman@v0.0.0-20221205184727-32ef2e185b99 | CVE-2023-32193 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher v2.10.3 | usr/bin/harvester-cloud-provider | golang.org/x/crypto@v0.16.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher v2.10.3 | usr/bin/harvester-cloud-provider | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-csi-driver:v0.1.7 | false | Rancher v2.10.3 | usr/bin/harvester-csi-driver | golang.org/x/net@v0.20.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-csi-driver:v0.1.7 | false | Rancher v2.10.3 | usr/bin/harvester-csi-driver | k8s.io/kubernetes@v1.24.9 | CVE-2023-3676 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-csi-driver:v0.1.7 | false | Rancher v2.10.3 | usr/bin/harvester-csi-driver | k8s.io/kubernetes@v1.24.9 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-csi-driver:v0.2.1 | false | Rancher v2.10.3 | usr/bin/harvester-csi-driver | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher v2.10.3 | usr/bin/harvester-csi-driver | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-apiserver | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-apiserver | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-apiserver | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-apiserver | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-controller-manager | github.com/opencontainers/runc@v1.1.7 | CVE-2024-21626 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-controller-manager | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-controller-manager | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-controller-manager | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-controller-manager | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-proxy | github.com/opencontainers/runc@v1.1.7 | CVE-2024-21626 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-proxy | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-proxy | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-proxy | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-proxy | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-scheduler | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-scheduler | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-scheduler | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-scheduler | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubelet | github.com/docker/docker@v20.10.24+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubelet | github.com/opencontainers/runc@v1.1.7 | CVE-2024-21626 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.35.0 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubelet | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubelet | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.29.13-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-apiserver | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.29.13-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-apiserver | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.29.13-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-apiserver | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.29.13-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-controller-manager | github.com/opencontainers/runc@v1.1.10 | CVE-2024-21626 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.29.13-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-controller-manager | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.29.13-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-controller-manager | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.29.13-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-controller-manager | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.29.13-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-proxy | github.com/opencontainers/runc@v1.1.10 | CVE-2024-21626 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.29.13-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-proxy | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.29.13-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-proxy | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.29.13-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-proxy | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.29.13-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-scheduler | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.29.13-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-scheduler | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.29.13-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-scheduler | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.29.13-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.29.13-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubelet | github.com/docker/docker@v20.10.24+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.29.13-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubelet | github.com/opencontainers/runc@v1.1.10 | CVE-2024-21626 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.29.13-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.29.13-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.29.13-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubelet | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.29.13-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubelet | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.9-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-apiserver | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.9-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-apiserver | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.9-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-apiserver | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.9-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-controller-manager | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.9-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-controller-manager | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.9-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-controller-manager | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.9-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-proxy | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.9-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-proxy | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.9-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-proxy | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.9-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-scheduler | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.9-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-scheduler | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.9-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-scheduler | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.9-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.9-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubelet | github.com/docker/docker@v20.10.27+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.30.9-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.30.9-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.9-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubelet | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.30.9-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubelet | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.31.5-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-apiserver | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.31.5-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-apiserver | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.31.5-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-controller-manager | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.31.5-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-controller-manager | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.31.5-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-proxy | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.31.5-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-proxy | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.31.5-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-scheduler | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.31.5-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kube-scheduler | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.31.5-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubectl | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.31.5-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubelet | github.com/docker/docker@v20.10.27+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.31.5-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.31.5-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubelet | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.31.5-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubelet | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.10.3 | usr/bin/istioctl | github.com/docker/docker@v24.0.7+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.10.3 | usr/bin/istioctl | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.10.3 | usr/bin/istioctl | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.10.3 | usr/bin/istioctl | helm.sh/helm/v3@v3.12.2 | CVE-2024-26147 | none | not affected | vulnerable code not present | gobinary |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubectl | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.10.3 | usr/bin/istioctl | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.10.3 | usr/bin/istioctl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubectl | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher v2.10.3 | usr/bin/istioctl | github.com/docker/docker@v25.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher v2.10.3 | usr/bin/istioctl | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher v2.10.3 | usr/bin/istioctl | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/istio-installer:1.22.1-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/istio-installer:1.23.2-rancher1 | false | Rancher v2.10.3 | usr/bin/istioctl | github.com/docker/docker@v26.1.4+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/istio-installer:1.23.2-rancher1 | false | Rancher v2.10.3 | usr/bin/istioctl | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/istio-installer:1.23.2-rancher1 | false | Rancher v2.10.3 | usr/bin/istioctl | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/istio-installer:1.23.2-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubectl | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/istio-installer:1.24.1-rancher1 | false | Rancher v2.10.3 | usr/bin/istioctl | golang.org/x/crypto@v0.27.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/istio-installer:1.24.1-rancher1 | false | Rancher v2.10.3 | usr/bin/istioctl | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/istio-installer:1.24.1-rancher1 | false | Rancher v2.10.3 | usr/local/bin/kubectl | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/k3s-upgrade:v1.28.15-k3s1 | false | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.3.2-r1 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/k3s-upgrade:v1.28.15-k3s1 | false | Rancher v2.10.3 | libssl3 | libssl3@3.3.2-r1 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/k3s-upgrade:v1.28.15-k3s1 | false | Rancher v2.10.3 | opt/k3s | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/k3s-upgrade:v1.29.13-k3s1 | false | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.3.2-r1 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/k3s-upgrade:v1.29.13-k3s1 | false | Rancher v2.10.3 | libssl3 | libssl3@3.3.2-r1 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/k3s-upgrade:v1.29.13-k3s1 | false | Rancher v2.10.3 | opt/k3s | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/k3s-upgrade:v1.30.9-k3s1 | false | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.3.2-r1 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/k3s-upgrade:v1.30.9-k3s1 | false | Rancher v2.10.3 | libssl3 | libssl3@3.3.2-r1 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/k3s-upgrade:v1.30.9-k3s1 | false | Rancher v2.10.3 | opt/k3s | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/k3s-upgrade:v1.31.5-k3s1 | false | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.3.2-r1 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/k3s-upgrade:v1.31.5-k3s1 | false | Rancher v2.10.3 | libssl3 | libssl3@3.3.2-r1 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/k3s-upgrade:v1.31.5-k3s1 | false | Rancher v2.10.3 | opt/k3s | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.2-build20240828 | false | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.3.1-r3 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/klipper-helm:v0.9.2-build20240828 | false | Rancher v2.10.3 | libssl3 | libssl3@3.3.1-r3 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/klipper-helm:v0.9.2-build20240828 | false | Rancher v2.10.3 | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.2-build20240828 | false | Rancher v2.10.3 | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.2-build20240828 | false | Rancher v2.10.3 | usr/bin/helm | github.com/docker/docker@v25.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.2-build20240828 | false | Rancher v2.10.3 | usr/bin/helm | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.2-build20240828 | false | Rancher v2.10.3 | usr/bin/helm | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.3.2-r0 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher v2.10.3 | libssl3 | libssl3@3.3.2-r0 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher v2.10.3 | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher v2.10.3 | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher v2.10.3 | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | golang.org/x/crypto@v0.25.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher v2.10.3 | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher v2.10.3 | usr/bin/helm | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher v2.10.3 | usr/bin/helm | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-lb:v0.4.9 | false | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.3.1-r3 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/klipper-lb:v0.4.9 | false | Rancher v2.10.3 | libssl3 | libssl3@3.3.1-r3 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/kube-api-auth:v0.2.4 | false | Rancher v2.10.3 | usr/bin/kube-api-auth | github.com/docker/docker@v20.10.27+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/kube-api-auth:v0.2.4 | false | Rancher v2.10.3 | usr/bin/kube-api-auth | github.com/rancher/rancher@v0.0.0-20241004204441-d3c434633444 | CVE-2019-12274 | none | not affected | inline mitigations already exist | gobinary |
rancher/kube-api-auth:v0.2.4 | false | Rancher v2.10.3 | usr/bin/kube-api-auth | github.com/rancher/rancher@v0.0.0-20241004204441-d3c434633444 | CVE-2021-36775 | none | not affected | inline mitigations already exist | gobinary |
rancher/kube-api-auth:v0.2.4 | false | Rancher v2.10.3 | usr/bin/kube-api-auth | github.com/rancher/steve@v0.0.0-20240913181958-99e479ba0f08 | CVE-2024-52280 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/kube-api-auth:v0.2.4 | false | Rancher v2.10.3 | usr/bin/kube-api-auth | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/kube-api-auth:v0.2.4 | false | Rancher v2.10.3 | usr/bin/kube-api-auth | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/kubectl:v1.28.14 | false | Rancher v2.10.3 | bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/kubectl:v1.29.0 | false | Rancher v2.10.3 | bin/kubectl | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/kubectl:v1.29.2 | false | Rancher v2.10.3 | bin/kubectl | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/kubectl:v1.30.7 | false | Rancher v2.10.3 | bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/kubectl:v1.31.1 | false | Rancher v2.10.3 | bin/kubectl | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/local-path-provisioner:v0.0.28 | false | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.3.0-r2 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/local-path-provisioner:v0.0.28 | false | Rancher v2.10.3 | libssl3 | libssl3@3.3.0-r2 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/local-path-provisioner:v0.0.28 | false | Rancher v2.10.3 | usr/bin/local-path-provisioner | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/local-path-provisioner:v0.0.28 | false | Rancher v2.10.3 | usr/bin/local-path-provisioner | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/local-path-provisioner:v0.0.30 | false | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.3.2-r0 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/local-path-provisioner:v0.0.30 | false | Rancher v2.10.3 | libssl3 | libssl3@3.3.2-r0 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/local-path-provisioner:v0.0.30 | false | Rancher v2.10.3 | usr/bin/local-path-provisioner | golang.org/x/crypto@v0.25.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/local-path-provisioner:v0.0.30 | false | Rancher v2.10.3 | usr/bin/local-path-provisioner | golang.org/x/net@v0.27.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/machine:v0.15.0-rancher125 | false | Rancher v2.10.3 | usr/local/bin/rancher-machine | github.com/moby/moby@v1.4.2-0.20170731201646-1009e6a40b29 | CVE-2024-36621 | none | not affected | vulnerable code not present | gobinary |
rancher/machine:v0.15.0-rancher125 | false | Rancher v2.10.3 | usr/local/bin/rancher-machine | github.com/moby/moby@v1.4.2-0.20170731201646-1009e6a40b29 | CVE-2024-36623 | none | not affected | vulnerable code not present | gobinary |
rancher/machine:v0.15.0-rancher125 | false | Rancher v2.10.3 | usr/local/bin/rancher-machine | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/machine:v0.15.0-rancher125 | false | Rancher v2.10.3 | usr/local/bin/rancher-machine | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-brancz-kube-rbac-proxy:v0.18.0 | true | Rancher v2.10.3 | usr/local/bin/kube-rbac-proxy | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-brancz-kube-rbac-proxy:v0.18.0 | true | Rancher v2.10.3 | usr/local/bin/kube-rbac-proxy | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-apiserver:v3.28.1 | true | Rancher v2.10.3 | code/apiserver | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-apiserver:v3.28.1 | true | Rancher v2.10.3 | code/apiserver | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-apiserver:v3.28.2 | true | Rancher v2.10.3 | code/apiserver | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-apiserver:v3.28.2 | true | Rancher v2.10.3 | code/apiserver | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-apiserver:v3.29.0 | true | Rancher v2.10.3 | code/apiserver | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-apiserver:v3.29.0 | true | Rancher v2.10.3 | code/apiserver | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-apiserver:v3.29.1 | true | Rancher v2.10.3 | code/apiserver | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-apiserver:v3.29.1 | true | Rancher v2.10.3 | code/apiserver | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.28.1 | true | Rancher v2.10.3 | opt/cni/bin/calico | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.28.1 | true | Rancher v2.10.3 | opt/cni/bin/calico | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.28.1 | true | Rancher v2.10.3 | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.28.1 | true | Rancher v2.10.3 | opt/cni/bin/calico-ipam | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.28.1 | true | Rancher v2.10.3 | opt/cni/bin/install | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.28.2 | true | Rancher v2.10.3 | opt/cni/bin/calico | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.28.2 | true | Rancher v2.10.3 | opt/cni/bin/calico | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.28.2 | true | Rancher v2.10.3 | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.28.2 | true | Rancher v2.10.3 | opt/cni/bin/calico-ipam | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.28.2 | true | Rancher v2.10.3 | opt/cni/bin/install | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.0 | true | Rancher v2.10.3 | opt/cni/bin/calico | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.0 | true | Rancher v2.10.3 | opt/cni/bin/calico | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.0 | true | Rancher v2.10.3 | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.0 | true | Rancher v2.10.3 | opt/cni/bin/calico-ipam | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.0 | true | Rancher v2.10.3 | opt/cni/bin/install | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.1 | true | Rancher v2.10.3 | opt/cni/bin/calico | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.1 | true | Rancher v2.10.3 | opt/cni/bin/calico | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.1 | true | Rancher v2.10.3 | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.1 | true | Rancher v2.10.3 | opt/cni/bin/calico-ipam | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.29.1 | true | Rancher v2.10.3 | opt/cni/bin/install | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.27.4 | true | Rancher v2.10.3 | usr/bin/kube-controllers | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.27.4 | true | Rancher v2.10.3 | usr/bin/kube-controllers | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.28.1 | true | Rancher v2.10.3 | usr/bin/kube-controllers | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.28.1 | true | Rancher v2.10.3 | usr/bin/kube-controllers | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.28.2 | true | Rancher v2.10.3 | usr/bin/kube-controllers | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.28.2 | true | Rancher v2.10.3 | usr/bin/kube-controllers | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.29.0 | true | Rancher v2.10.3 | usr/bin/kube-controllers | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.29.0 | true | Rancher v2.10.3 | usr/bin/kube-controllers | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.29.1 | true | Rancher v2.10.3 | usr/bin/kube-controllers | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.29.1 | true | Rancher v2.10.3 | usr/bin/kube-controllers | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-typha:v3.28.1 | true | Rancher v2.10.3 | usr/bin/calico-typha | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-typha:v3.28.1 | true | Rancher v2.10.3 | usr/bin/calico-typha | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-typha:v3.28.2 | true | Rancher v2.10.3 | usr/bin/calico-typha | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-typha:v3.28.2 | true | Rancher v2.10.3 | usr/bin/calico-typha | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-typha:v3.29.0 | true | Rancher v2.10.3 | usr/bin/calico-typha | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-typha:v3.29.0 | true | Rancher v2.10.3 | usr/bin/calico-typha | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-typha:v3.29.1 | true | Rancher v2.10.3 | usr/bin/calico-typha | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-typha:v3.29.1 | true | Rancher v2.10.3 | usr/bin/calico-typha | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-cilium:v1.16.1 | true | Rancher v2.10.3 | opt/cni/bin/cilium-cni | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.1 | true | Rancher v2.10.3 | usr/bin/cilium-agent | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.1 | true | Rancher v2.10.3 | usr/bin/cilium-agent | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.1 | true | Rancher v2.10.3 | usr/bin/cilium-bugtool | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.1 | true | Rancher v2.10.3 | usr/bin/cilium-dbg | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.1 | true | Rancher v2.10.3 | usr/bin/hubble | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.2 | true | Rancher v2.10.3 | opt/cni/bin/cilium-cni | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.2 | true | Rancher v2.10.3 | usr/bin/cilium-agent | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.2 | true | Rancher v2.10.3 | usr/bin/cilium-agent | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.2 | true | Rancher v2.10.3 | usr/bin/cilium-bugtool | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.2 | true | Rancher v2.10.3 | usr/bin/cilium-dbg | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.2 | true | Rancher v2.10.3 | usr/bin/hubble | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.3 | true | Rancher v2.10.3 | opt/cni/bin/cilium-cni | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.3 | true | Rancher v2.10.3 | usr/bin/cilium-agent | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.3 | true | Rancher v2.10.3 | usr/bin/cilium-agent | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.3 | true | Rancher v2.10.3 | usr/bin/cilium-bugtool | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.3 | true | Rancher v2.10.3 | usr/bin/cilium-dbg | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.3 | true | Rancher v2.10.3 | usr/bin/hubble | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.4 | true | Rancher v2.10.3 | opt/cni/bin/cilium-cni | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.4 | true | Rancher v2.10.3 | usr/bin/cilium-agent | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.4 | true | Rancher v2.10.3 | usr/bin/cilium-agent | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.4 | true | Rancher v2.10.3 | usr/bin/cilium-bugtool | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.4 | true | Rancher v2.10.3 | usr/bin/cilium-dbg | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.4 | true | Rancher v2.10.3 | usr/bin/hubble | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.5 | true | Rancher v2.10.3 | opt/cni/bin/cilium-cni | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.5 | true | Rancher v2.10.3 | usr/bin/cilium-agent | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.5 | true | Rancher v2.10.3 | usr/bin/cilium-bugtool | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.5 | true | Rancher v2.10.3 | usr/bin/cilium-dbg | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.5 | true | Rancher v2.10.3 | usr/bin/hubble | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.1 | true | Rancher v2.10.3 | usr/bin/clustermesh-apiserver | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.1 | true | Rancher v2.10.3 | usr/bin/etcd | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.1 | true | Rancher v2.10.3 | usr/bin/etcd | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.2 | true | Rancher v2.10.3 | usr/bin/clustermesh-apiserver | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.2 | true | Rancher v2.10.3 | usr/bin/etcd | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.2 | true | Rancher v2.10.3 | usr/bin/etcd | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.3 | true | Rancher v2.10.3 | usr/bin/clustermesh-apiserver | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.3 | true | Rancher v2.10.3 | usr/bin/etcd | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.3 | true | Rancher v2.10.3 | usr/bin/etcd | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.4 | true | Rancher v2.10.3 | usr/bin/clustermesh-apiserver | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.4 | true | Rancher v2.10.3 | usr/bin/etcd | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.4 | true | Rancher v2.10.3 | usr/bin/etcd | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.5 | true | Rancher v2.10.3 | usr/bin/clustermesh-apiserver | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.5 | true | Rancher v2.10.3 | usr/bin/etcd | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.5 | true | Rancher v2.10.3 | usr/bin/etcd | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.16.1 | true | Rancher v2.10.3 | bin/grpc_health_probe | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.16.1 | true | Rancher v2.10.3 | bin/grpc_health_probe | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.16.1 | true | Rancher v2.10.3 | usr/bin/hubble-relay | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.16.2 | true | Rancher v2.10.3 | bin/grpc_health_probe | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.16.2 | true | Rancher v2.10.3 | bin/grpc_health_probe | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.16.2 | true | Rancher v2.10.3 | usr/bin/hubble-relay | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.16.3 | true | Rancher v2.10.3 | bin/grpc_health_probe | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.16.3 | true | Rancher v2.10.3 | bin/grpc_health_probe | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.16.3 | true | Rancher v2.10.3 | usr/bin/hubble-relay | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.16.4 | true | Rancher v2.10.3 | bin/grpc_health_probe | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.16.4 | true | Rancher v2.10.3 | bin/grpc_health_probe | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.16.4 | true | Rancher v2.10.3 | usr/bin/hubble-relay | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.16.5 | true | Rancher v2.10.3 | bin/grpc_health_probe | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.16.5 | true | Rancher v2.10.3 | bin/grpc_health_probe | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.16.5 | true | Rancher v2.10.3 | usr/bin/hubble-relay | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-aws:v1.16.1 | true | Rancher v2.10.3 | usr/bin/cilium-operator-aws | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-aws:v1.16.1 | true | Rancher v2.10.3 | usr/bin/cilium-operator-aws | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-aws:v1.16.2 | true | Rancher v2.10.3 | usr/bin/cilium-operator-aws | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-aws:v1.16.2 | true | Rancher v2.10.3 | usr/bin/cilium-operator-aws | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-aws:v1.16.3 | true | Rancher v2.10.3 | usr/bin/cilium-operator-aws | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-aws:v1.16.3 | true | Rancher v2.10.3 | usr/bin/cilium-operator-aws | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-aws:v1.16.4 | true | Rancher v2.10.3 | usr/bin/cilium-operator-aws | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-aws:v1.16.4 | true | Rancher v2.10.3 | usr/bin/cilium-operator-aws | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-aws:v1.16.5 | true | Rancher v2.10.3 | usr/bin/cilium-operator-aws | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-azure:v1.16.1 | true | Rancher v2.10.3 | usr/bin/cilium-operator-azure | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-azure:v1.16.1 | true | Rancher v2.10.3 | usr/bin/cilium-operator-azure | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-azure:v1.16.2 | true | Rancher v2.10.3 | usr/bin/cilium-operator-azure | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-azure:v1.16.2 | true | Rancher v2.10.3 | usr/bin/cilium-operator-azure | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-azure:v1.16.3 | true | Rancher v2.10.3 | usr/bin/cilium-operator-azure | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-azure:v1.16.3 | true | Rancher v2.10.3 | usr/bin/cilium-operator-azure | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-azure:v1.16.4 | true | Rancher v2.10.3 | usr/bin/cilium-operator-azure | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-azure:v1.16.4 | true | Rancher v2.10.3 | usr/bin/cilium-operator-azure | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-azure:v1.16.5 | true | Rancher v2.10.3 | usr/bin/cilium-operator-azure | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-generic:v1.16.1 | true | Rancher v2.10.3 | usr/bin/cilium-operator-generic | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-generic:v1.16.1 | true | Rancher v2.10.3 | usr/bin/cilium-operator-generic | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-generic:v1.16.2 | true | Rancher v2.10.3 | usr/bin/cilium-operator-generic | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-generic:v1.16.2 | true | Rancher v2.10.3 | usr/bin/cilium-operator-generic | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-generic:v1.16.3 | true | Rancher v2.10.3 | usr/bin/cilium-operator-generic | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-generic:v1.16.3 | true | Rancher v2.10.3 | usr/bin/cilium-operator-generic | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-generic:v1.16.4 | true | Rancher v2.10.3 | usr/bin/cilium-operator-generic | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-generic:v1.16.4 | true | Rancher v2.10.3 | usr/bin/cilium-operator-generic | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-generic:v1.16.5 | true | Rancher v2.10.3 | usr/bin/cilium-operator-generic | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cluster-api-controller:v1.8.3 | true | Rancher v2.10.3 | manager | golang.org/x/crypto@v0.25.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cluster-api-controller:v1.8.3 | true | Rancher v2.10.3 | manager | golang.org/x/net@v0.27.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.10.3 | coredns | golang.org/x/crypto@v0.0.0-20221010152910-d6f0a8c073c2 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.10.3 | coredns | golang.org/x/net@v0.4.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.10.3 | coredns | golang.org/x/net@v0.4.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coredns-coredns:1.11.1 | true | Rancher v2.10.3 | coredns | golang.org/x/crypto@v0.12.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coredns-coredns:1.11.1 | true | Rancher v2.10.3 | coredns | golang.org/x/net@v0.14.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-coredns-coredns:1.11.1 | true | Rancher v2.10.3 | coredns | golang.org/x/net@v0.14.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coredns-coredns:1.11.3 | true | Rancher v2.10.3 | coredns | golang.org/x/crypto@v0.23.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coredns-coredns:1.11.3 | true | Rancher v2.10.3 | coredns | golang.org/x/net@v0.25.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coredns-coredns:1.12.0 | true | Rancher v2.10.3 | coredns | golang.org/x/crypto@v0.29.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coredns-coredns:1.12.0 | true | Rancher v2.10.3 | coredns | golang.org/x/net@v0.31.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.10.3 | usr/local/bin/etcd | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.10.3 | usr/local/bin/etcd | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.10.3 | usr/local/bin/etcdctl | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.25.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.10.3 | usr/local/bin/etcdctl | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.10.3 | usr/local/bin/etcdctl | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.10.3 | usr/local/bin/etcdutl | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.25.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.10.3 | usr/local/bin/etcdutl | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.10.3 | usr/local/bin/etcdutl | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher v2.10.3 | usr/local/bin/etcd | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher v2.10.3 | usr/local/bin/etcd | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher v2.10.3 | usr/local/bin/etcdctl | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher v2.10.3 | usr/local/bin/etcdctl | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher v2.10.3 | usr/local/bin/etcdutl | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.12 | true | Rancher v2.10.3 | usr/local/bin/etcdutl | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.15 | true | Rancher v2.10.3 | usr/local/bin/etcd | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.15 | true | Rancher v2.10.3 | usr/local/bin/etcd | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.15 | true | Rancher v2.10.3 | usr/local/bin/etcdctl | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.15 | true | Rancher v2.10.3 | usr/local/bin/etcdctl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.15 | true | Rancher v2.10.3 | usr/local/bin/etcdutl | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.15 | true | Rancher v2.10.3 | usr/local/bin/etcdutl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-grafana-grafana:11.1.0 | true | Rancher v2.10.3 | usr/share/grafana/bin/grafana | github.com/grafana/grafana-plugin-sdk-go@v0.234.0 | CVE-2024-8986 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-grafana-grafana:11.1.0 | true | Rancher v2.10.3 | usr/share/grafana/bin/grafana | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-grafana-grafana:11.1.0 | true | Rancher v2.10.3 | usr/share/grafana/bin/grafana | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-istio-install-cni:1.19.6-distroless | true | Rancher v2.10.3 | opt/cni/bin/istio-cni | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-install-cni:1.19.6-distroless | true | Rancher v2.10.3 | opt/cni/bin/istio-cni | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-install-cni:1.19.6-distroless | true | Rancher v2.10.3 | usr/local/bin/install-cni | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-install-cni:1.19.6-distroless | true | Rancher v2.10.3 | usr/local/bin/install-cni | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-install-cni:1.20.3-distroless | true | Rancher v2.10.3 | opt/cni/bin/istio-cni | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-install-cni:1.20.3-distroless | true | Rancher v2.10.3 | opt/cni/bin/istio-cni | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-install-cni:1.20.3-distroless | true | Rancher v2.10.3 | usr/local/bin/install-cni | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-install-cni:1.20.3-distroless | true | Rancher v2.10.3 | usr/local/bin/install-cni | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-install-cni:1.21.1-distroless | true | Rancher v2.10.3 | opt/cni/bin/istio-cni | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-install-cni:1.21.1-distroless | true | Rancher v2.10.3 | opt/cni/bin/istio-cni | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-istio-install-cni:1.21.1-distroless | true | Rancher v2.10.3 | usr/local/bin/install-cni | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-install-cni:1.21.1-distroless | true | Rancher v2.10.3 | usr/local/bin/install-cni | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-istio-install-cni:1.22.1-distroless | true | Rancher v2.10.3 | opt/cni/bin/istio-cni | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-install-cni:1.22.1-distroless | true | Rancher v2.10.3 | opt/cni/bin/istio-cni | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-istio-install-cni:1.22.1-distroless | true | Rancher v2.10.3 | usr/local/bin/install-cni | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-install-cni:1.22.1-distroless | true | Rancher v2.10.3 | usr/local/bin/install-cni | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-istio-install-cni:1.23.2-distroless | true | Rancher v2.10.3 | opt/cni/bin/istio-cni | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-install-cni:1.23.2-distroless | true | Rancher v2.10.3 | opt/cni/bin/istio-cni | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-istio-install-cni:1.23.2-distroless | true | Rancher v2.10.3 | usr/local/bin/install-cni | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-install-cni:1.23.2-distroless | true | Rancher v2.10.3 | usr/local/bin/install-cni | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-istio-install-cni:1.24.1-distroless | true | Rancher v2.10.3 | opt/cni/bin/istio-cni | golang.org/x/crypto@v0.27.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-install-cni:1.24.1-distroless | true | Rancher v2.10.3 | opt/cni/bin/istio-cni | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-istio-install-cni:1.24.1-distroless | true | Rancher v2.10.3 | usr/local/bin/install-cni | golang.org/x/crypto@v0.27.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-install-cni:1.24.1-distroless | true | Rancher v2.10.3 | usr/local/bin/install-cni | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-istio-pilot:1.19.6-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-discovery | github.com/docker/docker@v24.0.7+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-pilot:1.19.6-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-discovery | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-pilot:1.19.6-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-discovery | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-pilot:1.20.3-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-discovery | github.com/docker/docker@v24.0.7+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-pilot:1.20.3-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-discovery | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-pilot:1.20.3-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-discovery | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-pilot:1.21.1-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-discovery | github.com/docker/docker@v24.0.7+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-pilot:1.21.1-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-discovery | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-pilot:1.21.1-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-discovery | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-istio-pilot:1.22.1-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-discovery | github.com/docker/docker@v25.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-pilot:1.22.1-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-discovery | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-pilot:1.22.1-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-discovery | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-istio-pilot:1.23.2-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-discovery | github.com/docker/docker@v26.1.4+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-pilot:1.23.2-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-discovery | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-pilot:1.23.2-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-discovery | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-istio-pilot:1.24.1-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-discovery | golang.org/x/crypto@v0.27.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-pilot:1.24.1-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-discovery | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-istio-proxyv2:1.19.6-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-agent | github.com/docker/docker@v24.0.7+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-proxyv2:1.19.6-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-agent | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-proxyv2:1.19.6-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-agent | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-proxyv2:1.21.1-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-agent | github.com/docker/docker@v24.0.7+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-proxyv2:1.21.1-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-agent | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-proxyv2:1.21.1-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-agent | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-istio-proxyv2:1.22.1-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-agent | github.com/docker/docker@v25.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-proxyv2:1.22.1-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-agent | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-proxyv2:1.22.1-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-agent | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-istio-proxyv2:1.23.2-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-agent | github.com/docker/docker@v26.1.4+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-proxyv2:1.23.2-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-agent | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-proxyv2:1.23.2-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-agent | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-istio-proxyv2:1.24.1-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-agent | golang.org/x/crypto@v0.27.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-proxyv2:1.24.1-distroless | true | Rancher v2.10.3 | usr/local/bin/pilot-agent | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-jaegertracing-all-in-one:1.52.0 | true | Rancher v2.10.3 | go/bin/all-in-one-linux | golang.org/x/crypto@v0.16.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-jaegertracing-all-in-one:1.52.0 | true | Rancher v2.10.3 | go/bin/all-in-one-linux | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-jaegertracing-all-in-one:1.56.0 | true | Rancher v2.10.3 | go/bin/all-in-one-linux | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-jaegertracing-all-in-one:1.56.0 | true | Rancher v2.10.3 | go/bin/all-in-one-linux | golang.org/x/net@v0.22.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-jaegertracing-all-in-one:1.57.0 | true | Rancher v2.10.3 | go/bin/all-in-one-linux | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-jaegertracing-all-in-one:1.57.0 | true | Rancher v2.10.3 | go/bin/all-in-one-linux | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-jaegertracing-all-in-one:1.60.0 | true | Rancher v2.10.3 | go/bin/all-in-one-linux | golang.org/x/crypto@v0.25.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-jaegertracing-all-in-one:1.60.0 | true | Rancher v2.10.3 | go/bin/all-in-one-linux | golang.org/x/net@v0.27.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-jaegertracing-all-in-one:1.63.0 | true | Rancher v2.10.3 | go/bin/all-in-one-linux | golang.org/x/crypto@v0.29.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-jaegertracing-all-in-one:1.63.0 | true | Rancher v2.10.3 | go/bin/all-in-one-linux | golang.org/x/net@v0.31.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-dnsmasq-nanny:1.22.28 | true | Rancher v2.10.3 | dnsmasq-nanny | github.com/coredns/coredns@v1.10.0 | CVE-2023-28452 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-dnsmasq-nanny:1.22.28 | true | Rancher v2.10.3 | dnsmasq-nanny | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-dnsmasq-nanny:1.23.0 | true | Rancher v2.10.3 | dnsmasq-nanny | github.com/coredns/coredns@v1.10.0 | CVE-2023-28452 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-dnsmasq-nanny:1.23.0 | true | Rancher v2.10.3 | dnsmasq-nanny | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-kube-dns:1.22.28 | true | Rancher v2.10.3 | kube-dns | github.com/coredns/coredns@v1.10.0 | CVE-2023-28452 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-kube-dns:1.22.28 | true | Rancher v2.10.3 | kube-dns | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-kube-dns:1.23.0 | true | Rancher v2.10.3 | kube-dns | github.com/coredns/coredns@v1.10.0 | CVE-2023-28452 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-kube-dns:1.23.0 | true | Rancher v2.10.3 | kube-dns | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-node-cache:1.22.28 | true | Rancher v2.10.3 | node-cache | github.com/coredns/coredns@v1.10.0 | CVE-2023-28452 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-node-cache:1.22.28 | true | Rancher v2.10.3 | node-cache | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-node-cache:1.22.28 | true | Rancher v2.10.3 | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher v2.10.3 | node-cache | github.com/coredns/coredns@v1.10.0 | CVE-2023-28452 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher v2.10.3 | node-cache | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-node-cache:1.23.0 | true | Rancher v2.10.3 | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-sidecar:1.22.28 | true | Rancher v2.10.3 | sidecar | github.com/coredns/coredns@v1.10.0 | CVE-2023-28452 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-sidecar:1.22.28 | true | Rancher v2.10.3 | sidecar | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-sidecar:1.23.0 | true | Rancher v2.10.3 | sidecar | github.com/coredns/coredns@v1.10.0 | CVE-2023-28452 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-sidecar:1.23.0 | true | Rancher v2.10.3 | sidecar | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.10.3 | opt/kiali/kiali | go.opentelemetry.io/contrib/instrumentation/github.com/gorilla/mux/otelmux@v0.27.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.10.3 | opt/kiali/kiali | golang.org/x/crypto@v0.0.0-20220214200702-86341886e292 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.10.3 | opt/kiali/kiali | golang.org/x/crypto@v0.0.0-20220214200702-86341886e292 | CVE-2022-27191 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.10.3 | opt/kiali/kiali | golang.org/x/net@v0.8.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kiali-kiali:v1.79.0 | true | Rancher v2.10.3 | opt/kiali/kiali | go.opentelemetry.io/contrib/instrumentation/github.com/gorilla/mux/otelmux@v0.27.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kiali-kiali:v1.79.0 | true | Rancher v2.10.3 | opt/kiali/kiali | golang.org/x/crypto@v0.15.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kiali-kiali:v1.79.0 | true | Rancher v2.10.3 | opt/kiali/kiali | golang.org/x/net@v0.18.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kiali-kiali:v1.86.0 | true | Rancher v2.10.3 | opt/kiali/kiali | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kiali-kiali:v1.86.0 | true | Rancher v2.10.3 | opt/kiali/kiali | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-kiali-kiali:v1.89.3 | true | Rancher v2.10.3 | opt/kiali/kiali | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kiali-kiali:v1.89.3 | true | Rancher v2.10.3 | opt/kiali/kiali | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-kiali-kiali:v2.1.0 | true | Rancher v2.10.3 | opt/kiali/kiali | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kiali-kiali:v2.1.0 | true | Rancher v2.10.3 | opt/kiali/kiali | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-kube-logging-logging-operator:4.10.0 | true | Rancher v2.10.3 | manager | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.10.3 | kube-vip | golang.org/x/crypto@v0.1.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.10.3 | kube-vip | golang.org/x/net@v0.8.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.10.3 | kube-vip | golang.org/x/net@v0.8.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.8.7 | true | Rancher v2.10.3 | kube-vip | golang.org/x/crypto@v0.23.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.8.7 | true | Rancher v2.10.3 | kube-vip | golang.org/x/net@v0.25.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-library-traefik:2.10.7 | true | Rancher v2.10.3 | usr/local/bin/traefik | github.com/docker/docker@v20.10.21+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-library-traefik:2.10.7 | true | Rancher v2.10.3 | usr/local/bin/traefik | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-library-traefik:2.10.7 | true | Rancher v2.10.3 | usr/local/bin/traefik | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-library-traefik:2.11.10 | true | Rancher v2.10.3 | usr/local/bin/traefik | golang.org/x/crypto@v0.27.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-library-traefik:2.11.10 | true | Rancher v2.10.3 | usr/local/bin/traefik | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-library-traefik:2.11.8 | true | Rancher v2.10.3 | usr/local/bin/traefik | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-library-traefik:2.11.8 | true | Rancher v2.10.3 | usr/local/bin/traefik | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-longhornio-csi-attacher:v4.8.0 | true | Rancher v2.10.3 | csi-attacher | golang.org/x/net@v0.32.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.13.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | golang.org/x/net@v0.32.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-longhornio-csi-provisioner:v4.0.1-20250204 | true | Rancher v2.10.3 | csi-provisioner | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-longhornio-csi-snapshotter:v7.0.2-20250204 | true | Rancher v2.10.3 | csi-snapshotter | golang.org/x/net@v0.20.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-longhornio-livenessprobe:v2.15.0 | true | Rancher v2.10.3 | livenessprobe | golang.org/x/net@v0.32.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | golang.org/x/net@v0.0.0-20210726213435-c6fcb2dbf985 | CVE-2022-27664 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | golang.org/x/net@v0.0.0-20210726213435-c6fcb2dbf985 | CVE-2022-41723 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | golang.org/x/net@v0.0.0-20210726213435-c6fcb2dbf985 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | golang.org/x/net@v0.0.0-20210726213435-c6fcb2dbf985 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.10.3 | usr/local/bin/sachet | gopkg.in/yaml.v3@v3.0.0-20210107192922-496545a6307b | CVE-2022-28948 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-metrics-server:v0.7.0 | true | Rancher v2.10.3 | metrics-server | golang.org/x/crypto@v0.18.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-metrics-server:v0.7.0 | true | Rancher v2.10.3 | metrics-server | golang.org/x/net@v0.20.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-metrics-server:v0.7.1 | true | Rancher v2.10.3 | metrics-server | golang.org/x/crypto@v0.18.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-metrics-server:v0.7.1 | true | Rancher v2.10.3 | metrics-server | golang.org/x/net@v0.20.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-metrics-server:v0.7.2 | true | Rancher v2.10.3 | metrics-server | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-metrics-server:v0.7.2 | true | Rancher v2.10.3 | metrics-server | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.12.0 | true | Rancher v2.10.3 | adapter | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.12.0 | true | Rancher v2.10.3 | adapter | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-alertmanager:v0.27.0 | true | Rancher v2.10.3 | bin/alertmanager | golang.org/x/crypto@v0.18.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-alertmanager:v0.27.0 | true | Rancher v2.10.3 | bin/alertmanager | golang.org/x/net@v0.20.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-alertmanager:v0.27.0 | true | Rancher v2.10.3 | bin/amtool | golang.org/x/crypto@v0.18.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-alertmanager:v0.27.0 | true | Rancher v2.10.3 | bin/amtool | golang.org/x/net@v0.20.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-node-exporter:v1.8.2 | true | Rancher v2.10.3 | bin/node_exporter | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-node-exporter:v1.8.2 | true | Rancher v2.10.3 | bin/node_exporter | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-prometheus:v2.53.1 | true | Rancher v2.10.3 | bin/prometheus | github.com/docker/docker@v26.1.3+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-prometheus:v2.53.1 | true | Rancher v2.10.3 | bin/prometheus | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-prometheus:v2.53.1 | true | Rancher v2.10.3 | bin/prometheus | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-prometheus:v2.53.1 | true | Rancher v2.10.3 | bin/promtool | github.com/docker/docker@v26.1.3+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-prometheus:v2.53.1 | true | Rancher v2.10.3 | bin/promtool | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-prometheus:v2.53.1 | true | Rancher v2.10.3 | bin/promtool | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-attacher:v4.5.0 | true | Rancher v2.10.3 | csi-attacher | golang.org/x/net@v0.18.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-attacher:v4.5.1 | true | Rancher v2.10.3 | csi-attacher | golang.org/x/net@v0.18.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-attacher:v4.7.0 | true | Rancher v2.10.3 | csi-attacher | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.10.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | golang.org/x/net@v0.18.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.10.1 | true | Rancher v2.10.3 | csi-node-driver-registrar | golang.org/x/net@v0.18.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.12.0 | true | Rancher v2.10.3 | csi-node-driver-registrar | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.0 | true | Rancher v2.10.3 | csi-provisioner | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.1 | true | Rancher v2.10.3 | csi-provisioner | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-resizer:v1.10.0 | true | Rancher v2.10.3 | csi-resizer | golang.org/x/net@v0.18.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-resizer:v1.10.1 | true | Rancher v2.10.3 | csi-resizer | golang.org/x/net@v0.18.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.1 | true | Rancher v2.10.3 | csi-snapshotter | golang.org/x/net@v0.20.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.2 | true | Rancher v2.10.3 | csi-snapshotter | golang.org/x/net@v0.20.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-livenessprobe:v2.12.0 | true | Rancher v2.10.3 | livenessprobe | golang.org/x/net@v0.18.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-livenessprobe:v2.14.0 | true | Rancher v2.10.3 | livenessprobe | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.10.3 | snapshot-controller | golang.org/x/net@v0.4.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-snapshot-controller:v8.1.0 | true | Rancher v2.10.3 | snapshot-controller | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-snapshot-controller:v8.2.0 | true | Rancher v2.10.3 | snapshot-controller | golang.org/x/net@v0.31.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.10.3 | snapshot-validation-webhook | golang.org/x/net@v0.8.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v8.1.0 | true | Rancher v2.10.3 | snapshot-validation-webhook | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sonobuoy-sonobuoy:v0.57.2 | true | Rancher v2.10.3 | sonobuoy | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-thanos-thanos:v0.35.1 | true | Rancher v2.10.3 | bin/thanos | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-thanos-thanos:v0.35.1 | true | Rancher v2.10.3 | bin/thanos | golang.org/x/net@v0.22.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/neuvector-controller:5.4.2 | false | Rancher v2.10.3 | usr/local/bin/opa | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/nginx-ingress-controller:nginx-1.11.3-rancher1 | false | Rancher v2.10.3 | nginx-ingress-controller | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/nginx-ingress-controller:v1.10.5-hardened3 | false | Rancher v2.10.3 | nginx-ingress-controller | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/nginx-ingress-controller:v1.10.5-hardened4 | false | Rancher v2.10.3 | nginx-ingress-controller | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/nginx-ingress-controller:v1.10.5-hardened6 | false | Rancher v2.10.3 | nginx-ingress-controller | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher-agent:v2.10.3 | false | Rancher v2.10.3 | usr/bin/agent | github.com/docker/docker@v20.10.27+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher-agent:v2.10.3 | false | Rancher v2.10.3 | usr/bin/kubectl | github.com/docker/distribution@v2.8.1+incompatible | CVE-2023-2253 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher-agent:v2.10.3 | false | Rancher v2.10.3 | usr/bin/kubectl | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher-csp-adapter:v5.0.1 | false | Rancher v2.10.3 | usr/bin/csp-adapter | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | opt/drivers/management-state/bin/docker-machine-driver-harvester | github.com/moby/moby@v1.4.2-0.20170731201646-1009e6a40b29 | CVE-2024-36621 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | opt/drivers/management-state/bin/docker-machine-driver-harvester | github.com/moby/moby@v1.4.2-0.20170731201646-1009e6a40b29 | CVE-2024-36623 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | opt/drivers/management-state/bin/docker-machine-driver-harvester | golang.org/x/crypto@v0.27.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | opt/drivers/management-state/bin/docker-machine-driver-harvester | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | usr/bin/containerd | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | usr/bin/containerd | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | usr/bin/containerd-shim-runc-v2 | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | usr/bin/etcdctl | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | usr/bin/etcdctl | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | usr/bin/helm_v3 | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | usr/bin/helm_v3 | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | usr/bin/k3s | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | usr/bin/k3s | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | usr/bin/rancher | github.com/docker/docker@v20.10.27+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | usr/bin/rancher-machine | github.com/moby/moby@v1.4.2-0.20170731201646-1009e6a40b29 | CVE-2024-36621 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | usr/bin/rancher-machine | github.com/moby/moby@v1.4.2-0.20170731201646-1009e6a40b29 | CVE-2024-36623 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | usr/bin/rancher-machine | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | usr/bin/rancher-machine | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | usr/bin/runc | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | usr/bin/telemetry | github.com/rancher/norman@v0.0.0-20210709145327-afd06f533ca3 | CVE-2023-32193 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | usr/bin/telemetry | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.10.3 | false | Rancher v2.10.3 | usr/bin/telemetry | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.105 | false | Rancher v2.10.3 | opt/rke-tools/bin/cri-dockerd | github.com/docker/docker@v24.0.9+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.105 | false | Rancher v2.10.3 | opt/rke-tools/bin/cri-dockerd | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.105 | false | Rancher v2.10.3 | opt/rke-tools/bin/cri-dockerd | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.105 | false | Rancher v2.10.3 | opt/rke-tools/bin/cri-dockerd | k8s.io/kubernetes@v1.27.13 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.105 | false | Rancher v2.10.3 | opt/rke-tools/rke-etcd-backup | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.105 | false | Rancher v2.10.3 | opt/rke-tools/rke-etcd-backup | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.105 | false | Rancher v2.10.3 | usr/bin/confd | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.105 | false | Rancher v2.10.3 | usr/bin/confd | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.105 | false | Rancher v2.10.3 | usr/bin/confd | google.golang.org/grpc@v1.26.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke-tools:v0.1.105 | false | Rancher v2.10.3 | usr/local/bin/etcdctl | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.105 | false | Rancher v2.10.3 | usr/local/bin/etcdctl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.105 | false | Rancher v2.10.3 | usr/local/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke-tools:v0.1.109 | false | Rancher v2.10.3 | opt/rke-tools/bin/cri-dockerd | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.109 | false | Rancher v2.10.3 | opt/rke-tools/bin/cri-dockerd | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke-tools:v0.1.109 | false | Rancher v2.10.3 | opt/rke-tools/rke-etcd-backup | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.109 | false | Rancher v2.10.3 | opt/rke-tools/rke-etcd-backup | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.109 | false | Rancher v2.10.3 | usr/bin/confd | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.109 | false | Rancher v2.10.3 | usr/bin/confd | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.109 | false | Rancher v2.10.3 | usr/bin/confd | google.golang.org/grpc@v1.26.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke-tools:v0.1.109 | false | Rancher v2.10.3 | usr/local/bin/etcdctl | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.109 | false | Rancher v2.10.3 | usr/local/bin/etcdctl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.109 | false | Rancher v2.10.3 | usr/local/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-cloud-provider:v1.28.13-build20240910 | false | Rancher v2.10.3 | usr/local/bin/rke2-cloud-provider | github.com/docker/docker@v25.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-cloud-provider:v1.28.13-build20240910 | false | Rancher v2.10.3 | usr/local/bin/rke2-cloud-provider | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-cloud-provider:v1.28.13-build20240910 | false | Rancher v2.10.3 | usr/local/bin/rke2-cloud-provider | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-cloud-provider:v1.28.15-0.20241016053552-63bfb1936862-build20241016 | false | Rancher v2.10.3 | usr/local/bin/rke2-cloud-provider | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-cloud-provider:v1.28.15-0.20241016053552-63bfb1936862-build20241016 | false | Rancher v2.10.3 | usr/local/bin/rke2-cloud-provider | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-cloud-provider:v1.28.15-0.20241016053552-63bfb1936862-build20241016 | false | Rancher v2.10.3 | usr/local/bin/rke2-cloud-provider | golang.org/x/crypto@v0.27.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-cloud-provider:v1.28.15-0.20241016053552-63bfb1936862-build20241016 | false | Rancher v2.10.3 | usr/local/bin/rke2-cloud-provider | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-cloud-provider:v1.29.10-0.20241016053521-9510ac25fefb-build20241016 | false | Rancher v2.10.3 | usr/local/bin/rke2-cloud-provider | golang.org/x/crypto@v0.27.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-cloud-provider:v1.29.10-0.20241016053521-9510ac25fefb-build20241016 | false | Rancher v2.10.3 | usr/local/bin/rke2-cloud-provider | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-cloud-provider:v1.29.8-build20240910 | false | Rancher v2.10.3 | usr/local/bin/rke2-cloud-provider | github.com/docker/docker@v25.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-cloud-provider:v1.29.8-build20240910 | false | Rancher v2.10.3 | usr/local/bin/rke2-cloud-provider | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.45.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-cloud-provider:v1.30.4-build20240910 | false | Rancher v2.10.3 | usr/local/bin/rke2-cloud-provider | github.com/docker/docker@v25.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-cloud-provider:v1.30.4-build20240910 | false | Rancher v2.10.3 | usr/local/bin/rke2-cloud-provider | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.45.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-cloud-provider:v1.30.6-0.20241016053533-5ec454f50e7a-build20241016 | false | Rancher v2.10.3 | usr/local/bin/rke2-cloud-provider | golang.org/x/crypto@v0.27.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-cloud-provider:v1.30.6-0.20241016053533-5ec454f50e7a-build20241016 | false | Rancher v2.10.3 | usr/local/bin/rke2-cloud-provider | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-cloud-provider:v1.31.0-build20240910 | false | Rancher v2.10.3 | usr/local/bin/rke2-cloud-provider | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.45.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-cloud-provider:v1.31.0-build20240910 | false | Rancher v2.10.3 | usr/local/bin/rke2-cloud-provider | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-cloud-provider:v1.31.2-0.20241016053446-0955fa330f90-build20241016 | false | Rancher v2.10.3 | usr/local/bin/rke2-cloud-provider | golang.org/x/crypto@v0.27.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-cloud-provider:v1.31.2-0.20241016053446-0955fa330f90-build20241016 | false | Rancher v2.10.3 | usr/local/bin/rke2-cloud-provider | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.28.15-rke2r1 | false | Rancher v2.10.3 | bin/containerd | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.45.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.15-rke2r1 | false | Rancher v2.10.3 | bin/containerd | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.28.15-rke2r1 | false | Rancher v2.10.3 | bin/containerd | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.28.15-rke2r1 | false | Rancher v2.10.3 | bin/containerd-shim-runc-v2 | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.28.15-rke2r1 | false | Rancher v2.10.3 | bin/crictl | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.15-rke2r1 | false | Rancher v2.10.3 | bin/crictl | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.15-rke2r1 | false | Rancher v2.10.3 | bin/crictl | golang.org/x/net@v0.14.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.15-rke2r1 | false | Rancher v2.10.3 | bin/crictl | golang.org/x/net@v0.14.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.15-rke2r1 | false | Rancher v2.10.3 | bin/crictl | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.15-rke2r1 | false | Rancher v2.10.3 | bin/crictl | k8s.io/kubernetes@v1.28.0-rc.1 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.28.15-rke2r1 | false | Rancher v2.10.3 | bin/ctr | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.28.15-rke2r1 | false | Rancher v2.10.3 | bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.15-rke2r1 | false | Rancher v2.10.3 | bin/kubelet | github.com/opencontainers/runc@v1.1.7 | CVE-2024-21626 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.15-rke2r1 | false | Rancher v2.10.3 | bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.35.0 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.15-rke2r1 | false | Rancher v2.10.3 | bin/kubelet | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.15-rke2r1 | false | Rancher v2.10.3 | bin/kubelet | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.15-rke2r1 | false | Rancher v2.10.3 | bin/kubelet | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.15-rke2r1 | false | Rancher v2.10.3 | bin/kubelet | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.15-rke2r1 | false | Rancher v2.10.3 | bin/runc | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.29.13-rke2r1 | false | Rancher v2.10.3 | bin/containerd | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.45.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.29.13-rke2r1 | false | Rancher v2.10.3 | bin/containerd | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.29.13-rke2r1 | false | Rancher v2.10.3 | bin/containerd | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.29.13-rke2r1 | false | Rancher v2.10.3 | bin/containerd-shim-runc-v2 | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.29.13-rke2r1 | false | Rancher v2.10.3 | bin/crictl | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.29.13-rke2r1 | false | Rancher v2.10.3 | bin/crictl | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.29.13-rke2r1 | false | Rancher v2.10.3 | bin/ctr | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.29.13-rke2r1 | false | Rancher v2.10.3 | bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.29.13-rke2r1 | false | Rancher v2.10.3 | bin/kubelet | github.com/opencontainers/runc@v1.1.10 | CVE-2024-21626 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.29.13-rke2r1 | false | Rancher v2.10.3 | bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.29.13-rke2r1 | false | Rancher v2.10.3 | bin/kubelet | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.29.13-rke2r1 | false | Rancher v2.10.3 | bin/kubelet | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.29.13-rke2r1 | false | Rancher v2.10.3 | bin/kubelet | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.29.13-rke2r1 | false | Rancher v2.10.3 | bin/runc | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.30.9-rke2r1 | false | Rancher v2.10.3 | bin/containerd | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.45.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.30.9-rke2r1 | false | Rancher v2.10.3 | bin/containerd | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.30.9-rke2r1 | false | Rancher v2.10.3 | bin/containerd | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.30.9-rke2r1 | false | Rancher v2.10.3 | bin/containerd-shim-runc-v2 | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.30.9-rke2r1 | false | Rancher v2.10.3 | bin/crictl | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.30.9-rke2r1 | false | Rancher v2.10.3 | bin/crictl | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.30.9-rke2r1 | false | Rancher v2.10.3 | bin/crictl | k8s.io/kubernetes@v1.30.0 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.30.9-rke2r1 | false | Rancher v2.10.3 | bin/ctr | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.30.9-rke2r1 | false | Rancher v2.10.3 | bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.30.9-rke2r1 | false | Rancher v2.10.3 | bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.30.9-rke2r1 | false | Rancher v2.10.3 | bin/kubelet | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.42.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.30.9-rke2r1 | false | Rancher v2.10.3 | bin/kubelet | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.30.9-rke2r1 | false | Rancher v2.10.3 | bin/kubelet | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.30.9-rke2r1 | false | Rancher v2.10.3 | bin/runc | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.31.5-rke2r1 | false | Rancher v2.10.3 | bin/containerd | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.45.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.31.5-rke2r1 | false | Rancher v2.10.3 | bin/containerd | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.31.5-rke2r1 | false | Rancher v2.10.3 | bin/containerd | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.31.5-rke2r1 | false | Rancher v2.10.3 | bin/containerd-shim-runc-v2 | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.31.5-rke2r1 | false | Rancher v2.10.3 | bin/crictl | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.31.5-rke2r1 | false | Rancher v2.10.3 | bin/ctr | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.31.5-rke2r1 | false | Rancher v2.10.3 | bin/kubectl | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.31.5-rke2r1 | false | Rancher v2.10.3 | bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.31.5-rke2r1 | false | Rancher v2.10.3 | bin/kubelet | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.31.5-rke2r1 | false | Rancher v2.10.3 | bin/kubelet | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.31.5-rke2r1 | false | Rancher v2.10.3 | bin/runc | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-upgrade:v1.28.15-rke2r1 | false | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.3.2-r0 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/rke2-upgrade:v1.28.15-rke2r1 | false | Rancher v2.10.3 | libssl3 | libssl3@3.3.2-r0 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/rke2-upgrade:v1.28.15-rke2r1 | false | Rancher v2.10.3 | opt/rke2 | github.com/docker/docker@v24.0.10-0.20240723193628-852759a7df45+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-upgrade:v1.28.15-rke2r1 | false | Rancher v2.10.3 | opt/rke2 | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-upgrade:v1.28.15-rke2r1 | false | Rancher v2.10.3 | opt/rke2 | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-upgrade:v1.28.15-rke2r1 | false | Rancher v2.10.3 | opt/rke2 | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-upgrade:v1.28.15-rke2r1 | false | Rancher v2.10.3 | opt/rke2 | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-upgrade:v1.28.15-rke2r1 | false | Rancher v2.10.3 | usr/local/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-upgrade:v1.29.13-rke2r1 | false | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.3.2-r1 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/rke2-upgrade:v1.29.13-rke2r1 | false | Rancher v2.10.3 | libssl3 | libssl3@3.3.2-r1 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/rke2-upgrade:v1.29.13-rke2r1 | false | Rancher v2.10.3 | opt/rke2 | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.45.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-upgrade:v1.29.13-rke2r1 | false | Rancher v2.10.3 | opt/rke2 | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-upgrade:v1.29.13-rke2r1 | false | Rancher v2.10.3 | opt/rke2 | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-upgrade:v1.29.13-rke2r1 | false | Rancher v2.10.3 | usr/local/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-upgrade:v1.30.9-rke2r1 | false | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.3.2-r1 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/rke2-upgrade:v1.30.9-rke2r1 | false | Rancher v2.10.3 | libssl3 | libssl3@3.3.2-r1 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/rke2-upgrade:v1.30.9-rke2r1 | false | Rancher v2.10.3 | opt/rke2 | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.45.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-upgrade:v1.30.9-rke2r1 | false | Rancher v2.10.3 | opt/rke2 | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-upgrade:v1.30.9-rke2r1 | false | Rancher v2.10.3 | opt/rke2 | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-upgrade:v1.30.9-rke2r1 | false | Rancher v2.10.3 | usr/local/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-upgrade:v1.31.5-rke2r1 | false | Rancher v2.10.3 | libcrypto3 | libcrypto3@3.3.2-r1 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/rke2-upgrade:v1.31.5-rke2r1 | false | Rancher v2.10.3 | libssl3 | libssl3@3.3.2-r1 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/rke2-upgrade:v1.31.5-rke2r1 | false | Rancher v2.10.3 | opt/rke2 | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-upgrade:v1.31.5-rke2r1 | false | Rancher v2.10.3 | opt/rke2 | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-upgrade:v1.31.5-rke2r1 | false | Rancher v2.10.3 | usr/local/bin/kubectl | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/security-scan:v0.5.4 | false | Rancher v2.10.3 | usr/bin/sonobuoy | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/security-scan:v0.5.4 | false | Rancher v2.10.3 | usr/local/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/shell:v0.2.1 | false | Rancher v2.10.3 | usr/local/bin/helm | github.com/docker/docker@v24.0.9+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.2.1 | false | Rancher v2.10.3 | usr/local/bin/helm | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.2.1 | false | Rancher v2.10.3 | usr/local/bin/helm | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/shell:v0.2.1 | false | Rancher v2.10.3 | usr/local/bin/k9s | github.com/docker/docker@v26.0.1+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.2.1 | false | Rancher v2.10.3 | usr/local/bin/k9s | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/shell:v0.2.1 | false | Rancher v2.10.3 | usr/local/bin/k9s | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/shell:v0.2.1 | false | Rancher v2.10.3 | usr/local/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/shell:v0.3.0 | false | Rancher v2.10.3 | usr/local/bin/helm | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.3.0 | false | Rancher v2.10.3 | usr/local/bin/helm | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/shell:v0.3.0 | false | Rancher v2.10.3 | usr/local/bin/k9s | github.com/docker/docker@v26.0.1+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.3.0 | false | Rancher v2.10.3 | usr/local/bin/k9s | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/shell:v0.3.0 | false | Rancher v2.10.3 | usr/local/bin/k9s | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/shell:v0.3.0 | false | Rancher v2.10.3 | usr/local/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/shell:v0.3.1 | false | Rancher v2.10.3 | usr/local/bin/helm | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.3.1 | false | Rancher v2.10.3 | usr/local/bin/helm | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/shell:v0.3.1 | false | Rancher v2.10.3 | usr/local/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/system-agent:v0.3.11-suc | false | Rancher v2.10.3 | opt/rancher-system-agent-suc/rancher-system-agent | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/system-agent:v0.3.11-suc | false | Rancher v2.10.3 | opt/rancher-system-agent-suc/rancher-system-agent | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/system-agent:v0.3.11-suc | false | Rancher v2.10.3 | usr/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/system-upgrade-controller:v0.13.4 | false | Rancher v2.10.3 | bin/system-upgrade-controller | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/system-upgrade-controller:v0.14.2 | false | Rancher v2.10.3 | bin/system-upgrade-controller | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |