Search:
Image | Mirrored | Release | Binary/Package | Dependency | Vulnerability ID (CVE) | Severity | Status | Justification (for status not affected) | Type (language or OS) |
---|---|---|---|---|---|---|---|---|---|
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/bandwidth | stdlib@v1.21.1 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/bandwidth | stdlib@v1.21.1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/bandwidth | stdlib@v1.21.1 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/bandwidth | stdlib@v1.21.1 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/bandwidth | stdlib@v1.21.1 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/calico | github.com/projectcalico/calico@v3.26.3 | CVE-2024-33522 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/calico | google.golang.org/grpc@v1.55.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/calico | stdlib@v1.21.1 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/calico | stdlib@v1.21.1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/calico | stdlib@v1.21.1 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/calico | stdlib@v1.21.1 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/calico | stdlib@v1.21.1 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/calico-ipam | github.com/projectcalico/calico@v3.26.3 | CVE-2024-33522 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/calico-ipam | google.golang.org/grpc@v1.55.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/calico-ipam | stdlib@v1.21.1 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/calico-ipam | stdlib@v1.21.1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/calico-ipam | stdlib@v1.21.1 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/calico-ipam | stdlib@v1.21.1 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/calico-ipam | stdlib@v1.21.1 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/flannel | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/flannel | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/flannel | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/flannel | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/flannel | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/host-local | stdlib@v1.21.1 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/host-local | stdlib@v1.21.1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/host-local | stdlib@v1.21.1 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/host-local | stdlib@v1.21.1 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/host-local | stdlib@v1.21.1 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/install | github.com/projectcalico/calico@v3.26.3 | CVE-2024-33522 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/install | google.golang.org/grpc@v1.55.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/install | stdlib@v1.21.1 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/install | stdlib@v1.21.1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/install | stdlib@v1.21.1 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/install | stdlib@v1.21.1 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/install | stdlib@v1.21.1 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/loopback | stdlib@v1.21.1 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/loopback | stdlib@v1.21.1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/loopback | stdlib@v1.21.1 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/loopback | stdlib@v1.21.1 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/loopback | stdlib@v1.21.1 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/tuning | stdlib@v1.21.1 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/tuning | stdlib@v1.21.1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/tuning | stdlib@v1.21.1 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/tuning | stdlib@v1.21.1 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/tuning | stdlib@v1.21.1 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/bandwidth | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/calico | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/calico-ipam | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/flannel | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/host-local | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/install | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/loopback | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.16.15 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/tuning | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/bridge | stdlib@v1.20.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/bridge | stdlib@v1.20.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/bridge | stdlib@v1.20.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/bridge | stdlib@v1.20.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/bridge | stdlib@v1.20.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/bridge | stdlib@v1.20.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/dhcp | stdlib@v1.20.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/dhcp | stdlib@v1.20.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/dhcp | stdlib@v1.20.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/dhcp | stdlib@v1.20.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/dhcp | stdlib@v1.20.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/dhcp | stdlib@v1.20.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/flannel | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/flannel | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/flannel | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/flannel | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/flannel | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/host-local | stdlib@v1.20.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/host-local | stdlib@v1.20.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/host-local | stdlib@v1.20.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/host-local | stdlib@v1.20.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/host-local | stdlib@v1.20.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/host-local | stdlib@v1.20.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/ipvlan | stdlib@v1.20.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/ipvlan | stdlib@v1.20.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/ipvlan | stdlib@v1.20.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/ipvlan | stdlib@v1.20.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/ipvlan | stdlib@v1.20.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/ipvlan | stdlib@v1.20.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/loopback | stdlib@v1.20.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/loopback | stdlib@v1.20.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/loopback | stdlib@v1.20.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/loopback | stdlib@v1.20.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/loopback | stdlib@v1.20.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/loopback | stdlib@v1.20.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/macvlan | stdlib@v1.20.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/macvlan | stdlib@v1.20.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/macvlan | stdlib@v1.20.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/macvlan | stdlib@v1.20.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/macvlan | stdlib@v1.20.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/macvlan | stdlib@v1.20.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.20.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.20.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.20.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.20.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.20.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.20.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/ptp | stdlib@v1.20.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/ptp | stdlib@v1.20.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/ptp | stdlib@v1.20.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/ptp | stdlib@v1.20.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/ptp | stdlib@v1.20.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/ptp | stdlib@v1.20.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/tuning | stdlib@v1.20.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/tuning | stdlib@v1.20.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/tuning | stdlib@v1.20.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/tuning | stdlib@v1.20.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/tuning | stdlib@v1.20.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/tuning | stdlib@v1.20.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/vlan | stdlib@v1.20.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/vlan | stdlib@v1.20.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/vlan | stdlib@v1.20.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/vlan | stdlib@v1.20.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/vlan | stdlib@v1.20.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/flannel-cni:v0.3.0-rancher9 | false | Rancher v2.8 head | opt/cni/bin/vlan | stdlib@v1.20.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-addon-resizer:1.8.20-build20240410 | false | Rancher v2.8 head | pod_nanny | golang.org/x/net@v0.17.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-addon-resizer:1.8.20-build20240410 | false | Rancher v2.8 head | pod_nanny | stdlib@v1.20.14 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-addon-resizer:1.8.20-build20240410 | false | Rancher v2.8 head | pod_nanny | stdlib@v1.20.14 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-addon-resizer:1.8.20-build20240410 | false | Rancher v2.8 head | pod_nanny | stdlib@v1.20.14 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-addon-resizer:1.8.20-build20240910 | false | Rancher v2.8 head | pod_nanny | golang.org/x/net@v0.17.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-addon-resizer:1.8.20-build20241001 | false | Rancher v2.8 head | pod_nanny | golang.org/x/net@v0.17.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | curl | curl@8.6.0-150600.2.2 | SUSE-SU-2024:2784-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | libcurl4 | libcurl4@8.6.0-150600.2.2 | SUSE-SU-2024:2784-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.1.4-150600.5.10.1 | SUSE-SU-2024:3106-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.1.4-150600.5.10.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | libopenssl3 | libopenssl3@3.1.4-150600.5.10.1 | SUSE-SU-2024:3106-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | libopenssl3 | libopenssl3@3.1.4-150600.5.10.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150600.16.4.2 | SUSE-SU-2024:3745-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | openssl-3 | openssl-3@3.1.4-150600.5.10.1 | SUSE-SU-2024:3106-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | openssl-3 | openssl-3@3.1.4-150600.5.10.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | calicoctl | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | calicoctl | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | calicoctl | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/bandwidth | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/bandwidth | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/bandwidth | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/bridge | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/bridge | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/bridge | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/calico | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/calico-ipam | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/dhcp | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/dhcp | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/dhcp | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/dummy | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/dummy | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/dummy | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/firewall | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/firewall | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/firewall | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/flannel | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/flannel | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/flannel | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/host-device | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/host-device | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/host-device | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/host-local | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/host-local | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/host-local | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/install | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/ipvlan | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/ipvlan | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/ipvlan | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/loopback | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/loopback | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/loopback | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/macvlan | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/macvlan | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/macvlan | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/ptp | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/ptp | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/ptp | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/sbr | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/sbr | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/sbr | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/static | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/static | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/static | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/tap | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/tap | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/tap | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/tuning | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/tuning | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/tuning | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/vlan | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/vlan | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/vlan | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/vrf | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/vrf | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/vrf | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | usr/bin/calico-node | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | usr/bin/check-status | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | usr/bin/kube-controllers | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | usr/local/bin/flexvol/flexvoldriver | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240911 | false | Rancher v2.8 head | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.1-build20240911 | false | Rancher v2.8 head | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.1.4-150600.5.15.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.1-build20240911 | false | Rancher v2.8 head | libopenssl3 | libopenssl3@3.1.4-150600.5.15.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.1-build20240911 | false | Rancher v2.8 head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.1-build20240911 | false | Rancher v2.8 head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.1-build20240911 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.1-build20240911 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.1-build20240911 | false | Rancher v2.8 head | openssl-3 | openssl-3@3.1.4-150600.5.15.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.1-build20240911 | false | Rancher v2.8 head | calicoctl | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.1-build20240911 | false | Rancher v2.8 head | calicoctl | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.2-build20241016 | false | Rancher v2.8 head | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.2-build20241016 | false | Rancher v2.8 head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.2-build20241016 | false | Rancher v2.8 head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.2-build20241016 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.2-build20241016 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-calico:v3.28.2-build20241016 | false | Rancher v2.8 head | calicoctl | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-calico:v3.28.2-build20241016 | false | Rancher v2.8 head | calicoctl | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cluster-autoscaler:v1.8.10-build20240124 | false | Rancher v2.8 head | cluster-proportional-autoscaler | stdlib@v1.20.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cluster-autoscaler:v1.8.10-build20240124 | false | Rancher v2.8 head | cluster-proportional-autoscaler | stdlib@v1.20.7 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/hardened-cluster-autoscaler:v1.8.10-build20240124 | false | Rancher v2.8 head | cluster-proportional-autoscaler | stdlib@v1.20.7 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cluster-autoscaler:v1.8.10-build20240124 | false | Rancher v2.8 head | cluster-proportional-autoscaler | stdlib@v1.20.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cluster-autoscaler:v1.8.10-build20240124 | false | Rancher v2.8 head | cluster-proportional-autoscaler | stdlib@v1.20.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/bandwidth | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/bandwidth | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/bandwidth | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/bridge | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/bridge | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/bridge | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/dhcp | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/dhcp | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/dhcp | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/dummy | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/dummy | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/dummy | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/firewall | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/firewall | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/firewall | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/flannel | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/flannel | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/flannel | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/host-device | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/host-device | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/host-device | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/host-local | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/host-local | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/host-local | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/ipvlan | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/ipvlan | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/ipvlan | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/loopback | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/loopback | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/loopback | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/macvlan | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/macvlan | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/macvlan | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/ptp | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/ptp | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/ptp | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/sbr | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/sbr | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/sbr | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/static | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/static | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/static | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/tap | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/tap | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/tap | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/tuning | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/tuning | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/tuning | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/vlan | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/vlan | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/vlan | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/vrf | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/vrf | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-cni-plugins:v1.5.1-build20240805 | false | Rancher v2.8 head | opt/cni/bin/vrf | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-coredns:v1.11.1-build20240305 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.63.1 | SUSE-SU-2024:1375-1 | HIGH | affected | sles | |
rancher/hardened-coredns:v1.11.1-build20240305 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.63.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
rancher/hardened-coredns:v1.11.1-build20240305 | false | Rancher v2.8 head | coredns | github.com/quic-go/quic-go@v0.37.4 | CVE-2024-22189 | HIGH | affected | gobinary | |
rancher/hardened-coredns:v1.11.1-build20240305 | false | Rancher v2.8 head | coredns | google.golang.org/grpc@v1.57.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/hardened-coredns:v1.11.1-build20240305 | false | Rancher v2.8 head | coredns | stdlib@v1.20.14 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-coredns:v1.11.1-build20240305 | false | Rancher v2.8 head | coredns | stdlib@v1.20.14 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-coredns:v1.11.1-build20240305 | false | Rancher v2.8 head | coredns | stdlib@v1.20.14 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-coredns:v1.11.1-build20240910 | false | Rancher v2.8 head | coredns | github.com/quic-go/quic-go@v0.37.4 | CVE-2024-22189 | HIGH | affected | gobinary | |
rancher/hardened-coredns:v1.11.1-build20240910 | false | Rancher v2.8 head | coredns | google.golang.org/grpc@v1.57.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/hardened-dns-node-cache:1.22.28-build20240125 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.63.1 | SUSE-SU-2024:1375-1 | HIGH | affected | sles | |
rancher/hardened-dns-node-cache:1.22.28-build20240125 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.63.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
rancher/hardened-dns-node-cache:1.22.28-build20240125 | false | Rancher v2.8 head | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2023-5528 | HIGH | affected | gobinary | |
rancher/hardened-dns-node-cache:1.22.28-build20240125 | false | Rancher v2.8 head | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2024-0793 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-dns-node-cache:1.22.28-build20240125 | false | Rancher v2.8 head | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/hardened-dns-node-cache:1.22.28-build20240125 | false | Rancher v2.8 head | node-cache | stdlib@v1.20.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-dns-node-cache:1.22.28-build20240125 | false | Rancher v2.8 head | node-cache | stdlib@v1.20.7 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/hardened-dns-node-cache:1.22.28-build20240125 | false | Rancher v2.8 head | node-cache | stdlib@v1.20.7 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-dns-node-cache:1.22.28-build20240125 | false | Rancher v2.8 head | node-cache | stdlib@v1.20.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-dns-node-cache:1.22.28-build20240125 | false | Rancher v2.8 head | node-cache | stdlib@v1.20.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-dns-node-cache:1.23.1-build20240910 | false | Rancher v2.8 head | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2023-5528 | HIGH | affected | gobinary | |
rancher/hardened-dns-node-cache:1.23.1-build20240910 | false | Rancher v2.8 head | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2024-0793 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-dns-node-cache:1.23.1-build20240910 | false | Rancher v2.8 head | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/hardened-dns-node-cache:1.23.1-build20241008 | false | Rancher v2.8 head | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2023-5528 | HIGH | affected | gobinary | |
rancher/hardened-dns-node-cache:1.23.1-build20241008 | false | Rancher v2.8 head | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2024-0793 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-dns-node-cache:1.23.1-build20241008 | false | Rancher v2.8 head | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/hardened-etcd:v3.5.13-k3s1-build20240531 | false | Rancher v2.8 head | usr/local/bin/etcd | stdlib@v1.20.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-etcd:v3.5.13-k3s1-build20240531 | false | Rancher v2.8 head | usr/local/bin/etcd | stdlib@v1.20.7 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/hardened-etcd:v3.5.13-k3s1-build20240531 | false | Rancher v2.8 head | usr/local/bin/etcd | stdlib@v1.20.7 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-etcd:v3.5.13-k3s1-build20240531 | false | Rancher v2.8 head | usr/local/bin/etcd | stdlib@v1.20.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-etcd:v3.5.13-k3s1-build20240531 | false | Rancher v2.8 head | usr/local/bin/etcd | stdlib@v1.20.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-etcd:v3.5.13-k3s1-build20240531 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.20.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-etcd:v3.5.13-k3s1-build20240531 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.20.7 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/hardened-etcd:v3.5.13-k3s1-build20240531 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.20.7 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-etcd:v3.5.13-k3s1-build20240531 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.20.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-etcd:v3.5.13-k3s1-build20240531 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.20.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-flannel:v0.25.5-build20240801 | false | Rancher v2.8 head | curl | curl@8.6.0-150600.2.2 | SUSE-SU-2024:2784-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.5-build20240801 | false | Rancher v2.8 head | glib2-tools | glib2-tools@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.5-build20240801 | false | Rancher v2.8 head | libcurl4 | libcurl4@8.6.0-150600.2.2 | SUSE-SU-2024:2784-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.5-build20240801 | false | Rancher v2.8 head | libgio-2_0-0 | libgio-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.5-build20240801 | false | Rancher v2.8 head | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.5-build20240801 | false | Rancher v2.8 head | libgmodule-2_0-0 | libgmodule-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.5-build20240801 | false | Rancher v2.8 head | libgobject-2_0-0 | libgobject-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.5-build20240801 | false | Rancher v2.8 head | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.1.4-150600.5.10.1 | SUSE-SU-2024:3106-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.5-build20240801 | false | Rancher v2.8 head | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.1.4-150600.5.10.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.5-build20240801 | false | Rancher v2.8 head | libopenssl3 | libopenssl3@3.1.4-150600.5.10.1 | SUSE-SU-2024:3106-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.5-build20240801 | false | Rancher v2.8 head | libopenssl3 | libopenssl3@3.1.4-150600.5.10.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.5-build20240801 | false | Rancher v2.8 head | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150600.16.4.2 | SUSE-SU-2024:3745-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.5-build20240801 | false | Rancher v2.8 head | libsoup-2_4-1 | libsoup-2_4-1@2.74.3-150600.2.2 | SUSE-SU-2024:4290-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.5-build20240801 | false | Rancher v2.8 head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.5-build20240801 | false | Rancher v2.8 head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.5-build20240801 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.5-build20240801 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.5-build20240801 | false | Rancher v2.8 head | openssl-3 | openssl-3@3.1.4-150600.5.10.1 | SUSE-SU-2024:3106-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.5-build20240801 | false | Rancher v2.8 head | openssl-3 | openssl-3@3.1.4-150600.5.10.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.5-build20240801 | false | Rancher v2.8 head | opt/bin/flanneld | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-flannel:v0.25.6-build20240910 | false | Rancher v2.8 head | glib2-tools | glib2-tools@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.6-build20240910 | false | Rancher v2.8 head | libgio-2_0-0 | libgio-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.6-build20240910 | false | Rancher v2.8 head | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.6-build20240910 | false | Rancher v2.8 head | libgmodule-2_0-0 | libgmodule-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.6-build20240910 | false | Rancher v2.8 head | libgobject-2_0-0 | libgobject-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.6-build20240910 | false | Rancher v2.8 head | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.1.4-150600.5.15.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.6-build20240910 | false | Rancher v2.8 head | libopenssl3 | libopenssl3@3.1.4-150600.5.15.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.6-build20240910 | false | Rancher v2.8 head | libsoup-2_4-1 | libsoup-2_4-1@2.74.3-150600.2.2 | SUSE-SU-2024:4290-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.6-build20240910 | false | Rancher v2.8 head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.6-build20240910 | false | Rancher v2.8 head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.6-build20240910 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.6-build20240910 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.6-build20240910 | false | Rancher v2.8 head | openssl-3 | openssl-3@3.1.4-150600.5.15.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.7-build20241008 | false | Rancher v2.8 head | glib2-tools | glib2-tools@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.7-build20241008 | false | Rancher v2.8 head | libgio-2_0-0 | libgio-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.7-build20241008 | false | Rancher v2.8 head | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.7-build20241008 | false | Rancher v2.8 head | libgmodule-2_0-0 | libgmodule-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.7-build20241008 | false | Rancher v2.8 head | libgobject-2_0-0 | libgobject-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.7-build20241008 | false | Rancher v2.8 head | libsoup-2_4-1 | libsoup-2_4-1@2.74.3-150600.2.2 | SUSE-SU-2024:4290-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.7-build20241008 | false | Rancher v2.8 head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.7-build20241008 | false | Rancher v2.8 head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.7-build20241008 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/hardened-flannel:v0.25.7-build20241008 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-ib-sriov-cni:v1.0.3-build20240327 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.68.1 | SUSE-SU-2024:1375-1 | HIGH | affected | sles | |
rancher/hardened-ib-sriov-cni:v1.0.3-build20240327 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.68.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
rancher/hardened-ib-sriov-cni:v1.0.3-build20240327 | false | Rancher v2.8 head | krb5 | krb5@1.20.1-150500.3.6.1 | SUSE-SU-2024:2302-1 | HIGH | affected | sles | |
rancher/hardened-ib-sriov-cni:v1.0.3-build20240327 | false | Rancher v2.8 head | libblkid1 | libblkid1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-ib-sriov-cni:v1.0.3-build20240327 | false | Rancher v2.8 head | libfdisk1 | libfdisk1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-ib-sriov-cni:v1.0.3-build20240327 | false | Rancher v2.8 head | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.8.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
rancher/hardened-ib-sriov-cni:v1.0.3-build20240327 | false | Rancher v2.8 head | libmount1 | libmount1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-ib-sriov-cni:v1.0.3-build20240327 | false | Rancher v2.8 head | libnghttp2-14 | libnghttp2-14@1.40.0-150200.12.1 | SUSE-SU-2024:1167-1 | HIGH | affected | sles | |
rancher/hardened-ib-sriov-cni:v1.0.3-build20240327 | false | Rancher v2.8 head | libopenssl1_1 | libopenssl1_1@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/hardened-ib-sriov-cni:v1.0.3-build20240327 | false | Rancher v2.8 head | libopenssl1_1-hmac | libopenssl1_1-hmac@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/hardened-ib-sriov-cni:v1.0.3-build20240327 | false | Rancher v2.8 head | libsmartcols1 | libsmartcols1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-ib-sriov-cni:v1.0.3-build20240327 | false | Rancher v2.8 head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-ib-sriov-cni:v1.0.3-build20240327 | false | Rancher v2.8 head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-ib-sriov-cni:v1.0.3-build20240327 | false | Rancher v2.8 head | libuuid1 | libuuid1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-ib-sriov-cni:v1.0.3-build20240327 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/hardened-ib-sriov-cni:v1.0.3-build20240327 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-ib-sriov-cni:v1.0.3-build20240327 | false | Rancher v2.8 head | openssl-1_1 | openssl-1_1@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/hardened-ib-sriov-cni:v1.0.3-build20240327 | false | Rancher v2.8 head | perl-base | perl-base@5.26.1-150300.17.14.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
rancher/hardened-ib-sriov-cni:v1.0.3-build20240327 | false | Rancher v2.8 head | util-linux | util-linux@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-ib-sriov-cni:v1.0.3-build20240327 | false | Rancher v2.8 head | usr/bin/ib-sriov | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-ib-sriov-cni:v1.0.3-build20240327 | false | Rancher v2.8 head | usr/bin/ib-sriov | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-ib-sriov-cni:v1.0.3-build20240327 | false | Rancher v2.8 head | usr/bin/ib-sriov | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-k8s-metrics-server:v0.7.1-build20240401 | false | Rancher v2.8 head | metrics-server | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-k8s-metrics-server:v0.7.1-build20240401 | false | Rancher v2.8 head | metrics-server | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-k8s-metrics-server:v0.7.1-build20240401 | false | Rancher v2.8 head | metrics-server | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kube-apiserver | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kube-controller-manager | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kube-proxy | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kube-scheduler | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kubeadm | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kubelet | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.0.2-build20240612 | false | Rancher v2.8 head | thin_entrypoint | stdlib@v1.21.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.0.2-build20240612 | false | Rancher v2.8 head | thin_entrypoint | stdlib@v1.21.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.0.2-build20240612 | false | Rancher v2.8 head | usr/src/multus-cni/bin/multus | stdlib@v1.21.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-multus-cni:v4.0.2-build20240612 | false | Rancher v2.8 head | usr/src/multus-cni/bin/multus | stdlib@v1.21.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.52.2 | SUSE-SU-2024:1375-1 | HIGH | affected | sles | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.52.2 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | libgcc_s1 | libgcc_s1@12.3.0+git1204-150000.1.16.1 | SUSE-SU-2023:4162-1 | HIGH | affected | sles | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | libgcc_s1 | libgcc_s1@12.3.0+git1204-150000.1.16.1 | SUSE-SU-2023:4458-1 | HIGH | affected | sles | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | libstdc++6 | libstdc++6@12.3.0+git1204-150000.1.16.1 | SUSE-SU-2023:4162-1 | HIGH | affected | sles | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | libstdc++6 | libstdc++6@12.3.0+git1204-150000.1.16.1 | SUSE-SU-2023:4458-1 | HIGH | affected | sles | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/grpc_health_probe | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/grpc_health_probe | stdlib@v1.20.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/grpc_health_probe | stdlib@v1.20.7 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/grpc_health_probe | stdlib@v1.20.7 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/grpc_health_probe | stdlib@v1.20.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/grpc_health_probe | stdlib@v1.20.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-gc | k8s.io/kubernetes@v1.28.1 | CVE-2023-5528 | HIGH | affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-gc | k8s.io/kubernetes@v1.28.1 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-gc | stdlib@v1.20.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-gc | stdlib@v1.20.7 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-gc | stdlib@v1.20.7 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-gc | stdlib@v1.20.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-gc | stdlib@v1.20.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-master | k8s.io/kubernetes@v1.28.1 | CVE-2023-5528 | HIGH | affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-master | k8s.io/kubernetes@v1.28.1 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-master | stdlib@v1.20.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-master | stdlib@v1.20.7 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-master | stdlib@v1.20.7 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-master | stdlib@v1.20.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-master | stdlib@v1.20.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-topology-updater | k8s.io/kubernetes@v1.28.1 | CVE-2023-5528 | HIGH | affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-topology-updater | k8s.io/kubernetes@v1.28.1 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-topology-updater | stdlib@v1.20.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-topology-updater | stdlib@v1.20.7 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-topology-updater | stdlib@v1.20.7 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-topology-updater | stdlib@v1.20.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-topology-updater | stdlib@v1.20.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-worker | k8s.io/kubernetes@v1.28.1 | CVE-2023-5528 | HIGH | affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-worker | k8s.io/kubernetes@v1.28.1 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-worker | stdlib@v1.20.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-worker | stdlib@v1.20.7 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-worker | stdlib@v1.20.7 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-worker | stdlib@v1.20.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-worker | stdlib@v1.20.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.74.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/grpc_health_probe | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/grpc_health_probe | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/grpc_health_probe | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/grpc_health_probe | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/kubectl-nfd | k8s.io/kubernetes@v1.29.0 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/kubectl-nfd | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/kubectl-nfd | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/kubectl-nfd | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/nfd-gc | k8s.io/kubernetes@v1.29.0 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/nfd-gc | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/nfd-gc | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/nfd-gc | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/nfd-master | k8s.io/kubernetes@v1.29.0 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/nfd-master | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/nfd-master | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/nfd-master | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/nfd-topology-updater | k8s.io/kubernetes@v1.29.0 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/nfd-topology-updater | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/nfd-topology-updater | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/nfd-topology-updater | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/nfd-worker | k8s.io/kubernetes@v1.29.0 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/nfd-worker | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/nfd-worker | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/nfd-worker | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-sriov-cni:v2.7.0-build20240327 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.68.1 | SUSE-SU-2024:1375-1 | HIGH | affected | sles | |
rancher/hardened-sriov-cni:v2.7.0-build20240327 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.68.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
rancher/hardened-sriov-cni:v2.7.0-build20240327 | false | Rancher v2.8 head | krb5 | krb5@1.20.1-150500.3.6.1 | SUSE-SU-2024:2302-1 | HIGH | affected | sles | |
rancher/hardened-sriov-cni:v2.7.0-build20240327 | false | Rancher v2.8 head | libblkid1 | libblkid1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-sriov-cni:v2.7.0-build20240327 | false | Rancher v2.8 head | libfdisk1 | libfdisk1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-sriov-cni:v2.7.0-build20240327 | false | Rancher v2.8 head | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.8.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
rancher/hardened-sriov-cni:v2.7.0-build20240327 | false | Rancher v2.8 head | libmount1 | libmount1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-sriov-cni:v2.7.0-build20240327 | false | Rancher v2.8 head | libnghttp2-14 | libnghttp2-14@1.40.0-150200.12.1 | SUSE-SU-2024:1167-1 | HIGH | affected | sles | |
rancher/hardened-sriov-cni:v2.7.0-build20240327 | false | Rancher v2.8 head | libopenssl1_1 | libopenssl1_1@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/hardened-sriov-cni:v2.7.0-build20240327 | false | Rancher v2.8 head | libopenssl1_1-hmac | libopenssl1_1-hmac@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/hardened-sriov-cni:v2.7.0-build20240327 | false | Rancher v2.8 head | libsmartcols1 | libsmartcols1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-sriov-cni:v2.7.0-build20240327 | false | Rancher v2.8 head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-sriov-cni:v2.7.0-build20240327 | false | Rancher v2.8 head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-sriov-cni:v2.7.0-build20240327 | false | Rancher v2.8 head | libuuid1 | libuuid1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-sriov-cni:v2.7.0-build20240327 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/hardened-sriov-cni:v2.7.0-build20240327 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-sriov-cni:v2.7.0-build20240327 | false | Rancher v2.8 head | openssl-1_1 | openssl-1_1@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/hardened-sriov-cni:v2.7.0-build20240327 | false | Rancher v2.8 head | perl-base | perl-base@5.26.1-150300.17.14.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
rancher/hardened-sriov-cni:v2.7.0-build20240327 | false | Rancher v2.8 head | util-linux | util-linux@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-sriov-cni:v2.7.0-build20240327 | false | Rancher v2.8 head | usr/bin/sriov | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-sriov-cni:v2.7.0-build20240327 | false | Rancher v2.8 head | usr/bin/sriov | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-sriov-cni:v2.7.0-build20240327 | false | Rancher v2.8 head | usr/bin/sriov | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-sriov-network-config-daemon:v1.2.0-build20240327 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.68.1 | SUSE-SU-2024:1375-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-config-daemon:v1.2.0-build20240327 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.68.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-config-daemon:v1.2.0-build20240327 | false | Rancher v2.8 head | krb5 | krb5@1.20.1-150500.3.6.1 | SUSE-SU-2024:2302-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-config-daemon:v1.2.0-build20240327 | false | Rancher v2.8 head | libblkid1 | libblkid1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-config-daemon:v1.2.0-build20240327 | false | Rancher v2.8 head | libfdisk1 | libfdisk1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-config-daemon:v1.2.0-build20240327 | false | Rancher v2.8 head | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.8.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-config-daemon:v1.2.0-build20240327 | false | Rancher v2.8 head | libmount1 | libmount1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-config-daemon:v1.2.0-build20240327 | false | Rancher v2.8 head | libnghttp2-14 | libnghttp2-14@1.40.0-150200.12.1 | SUSE-SU-2024:1167-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-config-daemon:v1.2.0-build20240327 | false | Rancher v2.8 head | libopenssl1_1 | libopenssl1_1@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-config-daemon:v1.2.0-build20240327 | false | Rancher v2.8 head | libopenssl1_1-hmac | libopenssl1_1-hmac@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-config-daemon:v1.2.0-build20240327 | false | Rancher v2.8 head | libsmartcols1 | libsmartcols1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-config-daemon:v1.2.0-build20240327 | false | Rancher v2.8 head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-config-daemon:v1.2.0-build20240327 | false | Rancher v2.8 head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-config-daemon:v1.2.0-build20240327 | false | Rancher v2.8 head | libuuid1 | libuuid1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-config-daemon:v1.2.0-build20240327 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-config-daemon:v1.2.0-build20240327 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-config-daemon:v1.2.0-build20240327 | false | Rancher v2.8 head | openssl-1_1 | openssl-1_1@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-config-daemon:v1.2.0-build20240327 | false | Rancher v2.8 head | perl | perl@5.26.1-150300.17.14.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-config-daemon:v1.2.0-build20240327 | false | Rancher v2.8 head | perl-base | perl-base@5.26.1-150300.17.14.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-config-daemon:v1.2.0-build20240327 | false | Rancher v2.8 head | util-linux | util-linux@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-config-daemon:v1.2.0-build20240327 | false | Rancher v2.8 head | usr/bin/sriov-network-config-daemon | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-sriov-network-config-daemon:v1.2.0-build20240327 | false | Rancher v2.8 head | usr/bin/sriov-network-config-daemon | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-sriov-network-config-daemon:v1.2.0-build20240327 | false | Rancher v2.8 head | usr/bin/sriov-network-config-daemon | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-sriov-network-device-plugin:v3.6.2-build20240327 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.68.1 | SUSE-SU-2024:1375-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-device-plugin:v3.6.2-build20240327 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.68.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-device-plugin:v3.6.2-build20240327 | false | Rancher v2.8 head | krb5 | krb5@1.20.1-150500.3.6.1 | SUSE-SU-2024:2302-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-device-plugin:v3.6.2-build20240327 | false | Rancher v2.8 head | libblkid1 | libblkid1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-device-plugin:v3.6.2-build20240327 | false | Rancher v2.8 head | libfdisk1 | libfdisk1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-device-plugin:v3.6.2-build20240327 | false | Rancher v2.8 head | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.8.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-device-plugin:v3.6.2-build20240327 | false | Rancher v2.8 head | libmount1 | libmount1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-device-plugin:v3.6.2-build20240327 | false | Rancher v2.8 head | libnghttp2-14 | libnghttp2-14@1.40.0-150200.12.1 | SUSE-SU-2024:1167-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-device-plugin:v3.6.2-build20240327 | false | Rancher v2.8 head | libopenssl1_1 | libopenssl1_1@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-device-plugin:v3.6.2-build20240327 | false | Rancher v2.8 head | libopenssl1_1-hmac | libopenssl1_1-hmac@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-device-plugin:v3.6.2-build20240327 | false | Rancher v2.8 head | libsmartcols1 | libsmartcols1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-device-plugin:v3.6.2-build20240327 | false | Rancher v2.8 head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-device-plugin:v3.6.2-build20240327 | false | Rancher v2.8 head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-device-plugin:v3.6.2-build20240327 | false | Rancher v2.8 head | libuuid1 | libuuid1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-device-plugin:v3.6.2-build20240327 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-device-plugin:v3.6.2-build20240327 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-device-plugin:v3.6.2-build20240327 | false | Rancher v2.8 head | openssl-1_1 | openssl-1_1@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-device-plugin:v3.6.2-build20240327 | false | Rancher v2.8 head | perl | perl@5.26.1-150300.17.14.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-device-plugin:v3.6.2-build20240327 | false | Rancher v2.8 head | perl-base | perl-base@5.26.1-150300.17.14.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-device-plugin:v3.6.2-build20240327 | false | Rancher v2.8 head | util-linux | util-linux@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-device-plugin:v3.6.2-build20240327 | false | Rancher v2.8 head | usr/bin/sriovdp | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-sriov-network-device-plugin:v3.6.2-build20240327 | false | Rancher v2.8 head | usr/bin/sriovdp | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-sriov-network-device-plugin:v3.6.2-build20240327 | false | Rancher v2.8 head | usr/bin/sriovdp | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-sriov-network-operator:v1.2.0-build20240327 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.68.1 | SUSE-SU-2024:1375-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-operator:v1.2.0-build20240327 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.68.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-operator:v1.2.0-build20240327 | false | Rancher v2.8 head | krb5 | krb5@1.20.1-150500.3.3.1 | SUSE-SU-2024:0997-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-operator:v1.2.0-build20240327 | false | Rancher v2.8 head | krb5 | krb5@1.20.1-150500.3.3.1 | SUSE-SU-2024:2302-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-operator:v1.2.0-build20240327 | false | Rancher v2.8 head | libblkid1 | libblkid1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-operator:v1.2.0-build20240327 | false | Rancher v2.8 head | libfdisk1 | libfdisk1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-operator:v1.2.0-build20240327 | false | Rancher v2.8 head | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.8.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-operator:v1.2.0-build20240327 | false | Rancher v2.8 head | libmount1 | libmount1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-operator:v1.2.0-build20240327 | false | Rancher v2.8 head | libnghttp2-14 | libnghttp2-14@1.40.0-150200.12.1 | SUSE-SU-2024:1167-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-operator:v1.2.0-build20240327 | false | Rancher v2.8 head | libopenssl1_1 | libopenssl1_1@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-operator:v1.2.0-build20240327 | false | Rancher v2.8 head | libopenssl1_1-hmac | libopenssl1_1-hmac@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-operator:v1.2.0-build20240327 | false | Rancher v2.8 head | libsmartcols1 | libsmartcols1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-operator:v1.2.0-build20240327 | false | Rancher v2.8 head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-operator:v1.2.0-build20240327 | false | Rancher v2.8 head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-operator:v1.2.0-build20240327 | false | Rancher v2.8 head | libuuid1 | libuuid1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-operator:v1.2.0-build20240327 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-operator:v1.2.0-build20240327 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-operator:v1.2.0-build20240327 | false | Rancher v2.8 head | openssl-1_1 | openssl-1_1@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-operator:v1.2.0-build20240327 | false | Rancher v2.8 head | perl-base | perl-base@5.26.1-150300.17.14.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-operator:v1.2.0-build20240327 | false | Rancher v2.8 head | util-linux | util-linux@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-operator:v1.2.0-build20240327 | false | Rancher v2.8 head | usr/bin/sriov-network-operator | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-sriov-network-operator:v1.2.0-build20240327 | false | Rancher v2.8 head | usr/bin/sriov-network-operator | golang.org/x/net@v0.17.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-sriov-network-operator:v1.2.0-build20240327 | false | Rancher v2.8 head | usr/bin/sriov-network-operator | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-sriov-network-operator:v1.2.0-build20240327 | false | Rancher v2.8 head | usr/bin/sriov-network-operator | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-sriov-network-operator:v1.2.0-build20240327 | false | Rancher v2.8 head | usr/bin/sriov-network-operator | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-sriov-network-resources-injector:v1.5-build20240327 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.68.1 | SUSE-SU-2024:1375-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-resources-injector:v1.5-build20240327 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.68.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-resources-injector:v1.5-build20240327 | false | Rancher v2.8 head | krb5 | krb5@1.20.1-150500.3.6.1 | SUSE-SU-2024:2302-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-resources-injector:v1.5-build20240327 | false | Rancher v2.8 head | libblkid1 | libblkid1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-resources-injector:v1.5-build20240327 | false | Rancher v2.8 head | libfdisk1 | libfdisk1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-resources-injector:v1.5-build20240327 | false | Rancher v2.8 head | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.8.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-resources-injector:v1.5-build20240327 | false | Rancher v2.8 head | libmount1 | libmount1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-resources-injector:v1.5-build20240327 | false | Rancher v2.8 head | libnghttp2-14 | libnghttp2-14@1.40.0-150200.12.1 | SUSE-SU-2024:1167-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-resources-injector:v1.5-build20240327 | false | Rancher v2.8 head | libopenssl1_1 | libopenssl1_1@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-resources-injector:v1.5-build20240327 | false | Rancher v2.8 head | libopenssl1_1-hmac | libopenssl1_1-hmac@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-resources-injector:v1.5-build20240327 | false | Rancher v2.8 head | libsmartcols1 | libsmartcols1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-resources-injector:v1.5-build20240327 | false | Rancher v2.8 head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-resources-injector:v1.5-build20240327 | false | Rancher v2.8 head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-resources-injector:v1.5-build20240327 | false | Rancher v2.8 head | libuuid1 | libuuid1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-resources-injector:v1.5-build20240327 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-resources-injector:v1.5-build20240327 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-resources-injector:v1.5-build20240327 | false | Rancher v2.8 head | openssl-1_1 | openssl-1_1@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-resources-injector:v1.5-build20240327 | false | Rancher v2.8 head | perl-base | perl-base@5.26.1-150300.17.14.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-resources-injector:v1.5-build20240327 | false | Rancher v2.8 head | util-linux | util-linux@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-resources-injector:v1.5-build20240327 | false | Rancher v2.8 head | usr/bin/installer | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-sriov-network-resources-injector:v1.5-build20240327 | false | Rancher v2.8 head | usr/bin/installer | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-sriov-network-resources-injector:v1.5-build20240327 | false | Rancher v2.8 head | usr/bin/installer | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-sriov-network-resources-injector:v1.5-build20240327 | false | Rancher v2.8 head | usr/bin/webhook | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-sriov-network-resources-injector:v1.5-build20240327 | false | Rancher v2.8 head | usr/bin/webhook | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-sriov-network-resources-injector:v1.5-build20240327 | false | Rancher v2.8 head | usr/bin/webhook | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-sriov-network-webhook:v1.2.0-build20240327 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.68.1 | SUSE-SU-2024:1375-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-webhook:v1.2.0-build20240327 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.68.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-webhook:v1.2.0-build20240327 | false | Rancher v2.8 head | krb5 | krb5@1.20.1-150500.3.3.1 | SUSE-SU-2024:0997-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-webhook:v1.2.0-build20240327 | false | Rancher v2.8 head | krb5 | krb5@1.20.1-150500.3.3.1 | SUSE-SU-2024:2302-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-webhook:v1.2.0-build20240327 | false | Rancher v2.8 head | libblkid1 | libblkid1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-webhook:v1.2.0-build20240327 | false | Rancher v2.8 head | libfdisk1 | libfdisk1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-webhook:v1.2.0-build20240327 | false | Rancher v2.8 head | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.8.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-webhook:v1.2.0-build20240327 | false | Rancher v2.8 head | libmount1 | libmount1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-webhook:v1.2.0-build20240327 | false | Rancher v2.8 head | libnghttp2-14 | libnghttp2-14@1.40.0-150200.12.1 | SUSE-SU-2024:1167-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-webhook:v1.2.0-build20240327 | false | Rancher v2.8 head | libopenssl1_1 | libopenssl1_1@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-webhook:v1.2.0-build20240327 | false | Rancher v2.8 head | libopenssl1_1-hmac | libopenssl1_1-hmac@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-webhook:v1.2.0-build20240327 | false | Rancher v2.8 head | libsmartcols1 | libsmartcols1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-webhook:v1.2.0-build20240327 | false | Rancher v2.8 head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-webhook:v1.2.0-build20240327 | false | Rancher v2.8 head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-webhook:v1.2.0-build20240327 | false | Rancher v2.8 head | libuuid1 | libuuid1@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-webhook:v1.2.0-build20240327 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-webhook:v1.2.0-build20240327 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.14.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-webhook:v1.2.0-build20240327 | false | Rancher v2.8 head | openssl-1_1 | openssl-1_1@1.1.1l-150500.17.25.1 | SUSE-SU-2024:2051-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-webhook:v1.2.0-build20240327 | false | Rancher v2.8 head | perl-base | perl-base@5.26.1-150300.17.14.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-webhook:v1.2.0-build20240327 | false | Rancher v2.8 head | util-linux | util-linux@2.37.4-150500.9.3.1 | SUSE-SU-2024:1172-1 | HIGH | affected | sles | |
rancher/hardened-sriov-network-webhook:v1.2.0-build20240327 | false | Rancher v2.8 head | usr/bin/webhook | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-sriov-network-webhook:v1.2.0-build20240327 | false | Rancher v2.8 head | usr/bin/webhook | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-sriov-network-webhook:v1.2.0-build20240327 | false | Rancher v2.8 head | usr/bin/webhook | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-whereabouts:v0.7.0-build20240429 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.74.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
rancher/hardened-whereabouts:v0.7.0-build20240429 | false | Rancher v2.8 head | ip-control-loop | golang.org/x/net@v0.20.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-whereabouts:v0.7.0-build20240429 | false | Rancher v2.8 head | ip-control-loop | stdlib@v1.21.9 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-whereabouts:v0.7.0-build20240429 | false | Rancher v2.8 head | ip-control-loop | stdlib@v1.21.9 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-whereabouts:v0.7.0-build20240429 | false | Rancher v2.8 head | whereabouts | golang.org/x/net@v0.20.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-whereabouts:v0.7.0-build20240429 | false | Rancher v2.8 head | whereabouts | stdlib@v1.21.9 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-whereabouts:v0.7.0-build20240429 | false | Rancher v2.8 head | whereabouts | stdlib@v1.21.9 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-whereabouts:v0.8.0-build20240910 | false | Rancher v2.8 head | ip-control-loop | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-whereabouts:v0.8.0-build20240910 | false | Rancher v2.8 head | whereabouts | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-whereabouts:v0.8.0-build20241011 | false | Rancher v2.8 head | ip-control-loop | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hardened-whereabouts:v0.8.0-build20241011 | false | Rancher v2.8 head | whereabouts | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.0 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.46.1 | SUSE-SU-2024:1375-1 | HIGH | affected | sles | |
rancher/harvester-cloud-provider:v0.2.0 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.46.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
rancher/harvester-cloud-provider:v0.2.0 | false | Rancher v2.8 head | libgcc_s1 | libgcc_s1@12.2.1+git416-150000.1.7.1 | SUSE-SU-2023:3661-1 | HIGH | affected | sles | |
rancher/harvester-cloud-provider:v0.2.0 | false | Rancher v2.8 head | libgcc_s1 | libgcc_s1@12.2.1+git416-150000.1.7.1 | SUSE-SU-2023:4162-1 | HIGH | affected | sles | |
rancher/harvester-cloud-provider:v0.2.0 | false | Rancher v2.8 head | libgcc_s1 | libgcc_s1@12.2.1+git416-150000.1.7.1 | SUSE-SU-2023:4458-1 | HIGH | affected | sles | |
rancher/harvester-cloud-provider:v0.2.0 | false | Rancher v2.8 head | libstdc++6 | libstdc++6@12.2.1+git416-150000.1.7.1 | SUSE-SU-2023:3661-1 | HIGH | affected | sles | |
rancher/harvester-cloud-provider:v0.2.0 | false | Rancher v2.8 head | libstdc++6 | libstdc++6@12.2.1+git416-150000.1.7.1 | SUSE-SU-2023:4162-1 | HIGH | affected | sles | |
rancher/harvester-cloud-provider:v0.2.0 | false | Rancher v2.8 head | libstdc++6 | libstdc++6@12.2.1+git416-150000.1.7.1 | SUSE-SU-2023:4458-1 | HIGH | affected | sles | |
rancher/harvester-cloud-provider:v0.2.0 | false | Rancher v2.8 head | perl-base | perl-base@5.26.1-150300.17.11.1 | SUSE-SU-2023:2882-1 | HIGH | affected | sles | |
rancher/harvester-cloud-provider:v0.2.0 | false | Rancher v2.8 head | perl-base | perl-base@5.26.1-150300.17.11.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
rancher/harvester-cloud-provider:v0.2.0 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2019-12274 | HIGH | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.0 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2021-36775 | HIGH | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.0 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | github.com/rancher/steve@v0.0.0-20221209194631-acf9d31ce0dd | CVE-2024-52280 | HIGH | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.0 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | golang.org/x/net@v0.7.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.0 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | kubevirt.io/kubevirt@v0.54.0 | CVE-2023-26484 | HIGH | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.0 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | kubevirt.io/kubevirt@v0.54.0 | GHSA-qv98-3369-g364 | HIGH | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.0 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | stdlib@v1.19.9 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.0 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | stdlib@v1.19.9 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.0 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | stdlib@v1.19.9 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.0 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | stdlib@v1.19.9 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.0 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | stdlib@v1.19.9 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.0 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | stdlib@v1.19.9 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.0 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | stdlib@v1.19.9 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.1 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.63.1 | SUSE-SU-2024:1375-1 | HIGH | affected | sles | |
rancher/harvester-cloud-provider:v0.2.1 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.63.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
rancher/harvester-cloud-provider:v0.2.1 | false | Rancher v2.8 head | perl-base | perl-base@5.26.1-150300.17.14.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
rancher/harvester-cloud-provider:v0.2.1 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2019-12274 | HIGH | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.1 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2021-36775 | HIGH | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.1 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | github.com/rancher/steve@v0.0.0-20221209194631-acf9d31ce0dd | CVE-2024-52280 | HIGH | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.1 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.1 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | stdlib@v1.20.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.1 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | stdlib@v1.20.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.1 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | stdlib@v1.20.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.2 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2019-12274 | HIGH | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.2 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2021-36775 | HIGH | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.2 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | github.com/rancher/steve@v0.0.0-20221209194631-acf9d31ce0dd | CVE-2024-52280 | HIGH | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.2 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.2 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2019-12274 | HIGH | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | github.com/rancher/rancher@v0.0.0-20230124173128-2207cfed1803 | CVE-2021-36775 | HIGH | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | github.com/rancher/steve@v0.0.0-20221209194631-acf9d31ce0dd | CVE-2024-52280 | HIGH | affected | gobinary | |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | container-suseconnect | container-suseconnect@2.4.0-150000.4.22.1 | SUSE-SU-2023:0871-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | curl | curl@7.79.1-150400.5.15.1 | SUSE-SU-2023:2224-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | curl | curl@7.79.1-150400.5.15.1 | SUSE-SU-2023:3823-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | curl | curl@7.79.1-150400.5.15.1 | SUSE-SU-2023:4044-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.41.1 | SUSE-SU-2024:1375-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.41.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | krb5 | krb5@1.19.2-150400.3.3.1 | SUSE-SU-2023:3363-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | krb5 | krb5@1.19.2-150400.3.3.1 | SUSE-SU-2024:1006-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | krb5 | krb5@1.19.2-150400.3.3.1 | SUSE-SU-2024:2322-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | libblkid1 | libblkid1@2.37.2-150400.8.14.1 | SUSE-SU-2024:1169-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | libcurl4 | libcurl4@7.79.1-150400.5.15.1 | SUSE-SU-2023:2224-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | libcurl4 | libcurl4@7.79.1-150400.5.15.1 | SUSE-SU-2023:3823-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | libcurl4 | libcurl4@7.79.1-150400.5.15.1 | SUSE-SU-2023:4044-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | libeconf0 | libeconf0@0.4.6+git20220427.3016f4e-150400.3.3.1 | SUSE-SU-2023:3954-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | libexpat1 | libexpat1@2.4.4-150400.3.12.1 | SUSE-SU-2024:1129-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | libfdisk1 | libfdisk1@2.37.2-150400.8.14.1 | SUSE-SU-2024:1169-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | libgcc_s1 | libgcc_s1@12.2.1+git416-150000.1.5.1 | SUSE-SU-2023:3661-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | libgcc_s1 | libgcc_s1@12.2.1+git416-150000.1.5.1 | SUSE-SU-2023:4162-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | libgcc_s1 | libgcc_s1@12.2.1+git416-150000.1.5.1 | SUSE-SU-2023:4458-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.3.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | libmount1 | libmount1@2.37.2-150400.8.14.1 | SUSE-SU-2024:1169-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | libnghttp2-14 | libnghttp2-14@1.40.0-6.1 | SUSE-SU-2023:3997-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | libnghttp2-14 | libnghttp2-14@1.40.0-6.1 | SUSE-SU-2023:4200-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | libnghttp2-14 | libnghttp2-14@1.40.0-6.1 | SUSE-SU-2024:1167-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | libopenssl1_1 | libopenssl1_1@1.1.1l-150400.7.22.1 | SUSE-SU-2024:2089-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | libopenssl1_1-hmac | libopenssl1_1-hmac@1.1.1l-150400.7.22.1 | SUSE-SU-2024:2089-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | libsmartcols1 | libsmartcols1@2.37.2-150400.8.14.1 | SUSE-SU-2024:1169-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | libsqlite3-0 | libsqlite3-0@3.39.3-150000.3.20.1 | SUSE-SU-2023:4619-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | libssh-config | libssh-config@0.9.6-150400.1.5 | SUSE-SU-2024:0140-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | libssh4 | libssh4@0.9.6-150400.1.5 | SUSE-SU-2024:0140-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | libstdc++6 | libstdc++6@12.2.1+git416-150000.1.5.1 | SUSE-SU-2023:3661-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | libstdc++6 | libstdc++6@12.2.1+git416-150000.1.5.1 | SUSE-SU-2023:4162-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | libstdc++6 | libstdc++6@12.2.1+git416-150000.1.5.1 | SUSE-SU-2023:4458-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | libuuid1 | libuuid1@2.37.2-150400.8.14.1 | SUSE-SU-2024:1169-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.9.14-150400.5.13.1 | SUSE-SU-2024:0613-2 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.9.14-150400.5.13.1 | SUSE-SU-2025:0341-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.9.14-150400.5.13.1 | SUSE-SU-2025:0748-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | libzck1 | libzck1@1.1.16-150400.3.2.1 | SUSE-SU-2023:4225-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | openssl-1_1 | openssl-1_1@1.1.1l-150400.7.22.1 | SUSE-SU-2024:2089-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | perl | perl@5.26.1-150300.17.11.1 | SUSE-SU-2023:2882-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | perl | perl@5.26.1-150300.17.11.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | perl-base | perl-base@5.26.1-150300.17.11.1 | SUSE-SU-2023:2882-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | perl-base | perl-base@5.26.1-150300.17.11.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | util-linux | util-linux@2.37.2-150400.8.14.1 | SUSE-SU-2024:1169-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | vim | vim@9.0.1234-150000.5.34.1 | SUSE-SU-2023:0781-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | vim | vim@9.0.1234-150000.5.34.1 | SUSE-SU-2023:2640-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | vim | vim@9.0.1234-150000.5.34.1 | SUSE-SU-2023:3955-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | vim | vim@9.0.1234-150000.5.34.1 | SUSE-SU-2023:4587-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | vim | vim@9.0.1234-150000.5.34.1 | SUSE-SU-2024:0871-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | vim-data-common | vim-data-common@9.0.1234-150000.5.34.1 | SUSE-SU-2023:0781-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | vim-data-common | vim-data-common@9.0.1234-150000.5.34.1 | SUSE-SU-2023:2640-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | vim-data-common | vim-data-common@9.0.1234-150000.5.34.1 | SUSE-SU-2023:3955-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | vim-data-common | vim-data-common@9.0.1234-150000.5.34.1 | SUSE-SU-2023:4587-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | vim-data-common | vim-data-common@9.0.1234-150000.5.34.1 | SUSE-SU-2024:0871-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | google.golang.org/grpc@v1.40.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | k8s.io/kubernetes@v1.24.9 | CVE-2023-3955 | HIGH | affected | gobinary | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | k8s.io/kubernetes@v1.24.9 | CVE-2023-5528 | HIGH | affected | gobinary | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | k8s.io/kubernetes@v1.24.9 | CVE-2024-0793 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | k8s.io/kubernetes@v1.24.9 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | stdlib@v1.18.9 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | stdlib@v1.18.9 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | stdlib@v1.18.9 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | stdlib@v1.18.9 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | stdlib@v1.18.9 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | stdlib@v1.18.9 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | stdlib@v1.18.9 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | stdlib@v1.18.9 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | stdlib@v1.18.9 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | stdlib@v1.18.9 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | stdlib@v1.18.9 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | stdlib@v1.18.9 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | stdlib@v1.18.9 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | stdlib@v1.18.9 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | stdlib@v1.18.9 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | stdlib@v1.18.9 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | stdlib@v1.18.9 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | stdlib@v1.18.9 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.58.1 | SUSE-SU-2024:1375-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.58.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | krb5 | krb5@1.19.2-150400.3.6.1 | SUSE-SU-2024:1006-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | krb5 | krb5@1.19.2-150400.3.6.1 | SUSE-SU-2024:2322-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | libblkid1 | libblkid1@2.37.2-150400.8.20.1 | SUSE-SU-2024:1169-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | libexpat1 | libexpat1@2.4.4-150400.3.12.1 | SUSE-SU-2024:1129-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | libfdisk1 | libfdisk1@2.37.2-150400.8.20.1 | SUSE-SU-2024:1169-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | libgcc_s1 | libgcc_s1@12.3.0+git1204-150000.1.16.1 | SUSE-SU-2023:4162-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | libgcc_s1 | libgcc_s1@12.3.0+git1204-150000.1.16.1 | SUSE-SU-2023:4458-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.8.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | libmount1 | libmount1@2.37.2-150400.8.20.1 | SUSE-SU-2024:1169-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | libnghttp2-14 | libnghttp2-14@1.40.0-150200.9.1 | SUSE-SU-2023:4200-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | libnghttp2-14 | libnghttp2-14@1.40.0-150200.9.1 | SUSE-SU-2024:1167-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | libopenssl1_1 | libopenssl1_1@1.1.1l-150400.7.53.1 | SUSE-SU-2024:2089-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | libopenssl1_1-hmac | libopenssl1_1-hmac@1.1.1l-150400.7.53.1 | SUSE-SU-2024:2089-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | libsmartcols1 | libsmartcols1@2.37.2-150400.8.20.1 | SUSE-SU-2024:1169-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | libsqlite3-0 | libsqlite3-0@3.39.3-150000.3.20.1 | SUSE-SU-2023:4619-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | libssh-config | libssh-config@0.9.6-150400.1.5 | SUSE-SU-2024:0140-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | libssh4 | libssh4@0.9.6-150400.1.5 | SUSE-SU-2024:0140-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | libstdc++6 | libstdc++6@12.3.0+git1204-150000.1.16.1 | SUSE-SU-2023:4162-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | libstdc++6 | libstdc++6@12.3.0+git1204-150000.1.16.1 | SUSE-SU-2023:4458-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | libuuid1 | libuuid1@2.37.2-150400.8.20.1 | SUSE-SU-2024:1169-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.9.14-150400.5.22.1 | SUSE-SU-2024:0613-2 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.9.14-150400.5.22.1 | SUSE-SU-2025:0341-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.9.14-150400.5.22.1 | SUSE-SU-2025:0748-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | libzck1 | libzck1@1.1.16-150400.3.4.1 | SUSE-SU-2023:4225-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | openssl-1_1 | openssl-1_1@1.1.1l-150400.7.53.1 | SUSE-SU-2024:2089-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | perl | perl@5.26.1-150300.17.14.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | perl-base | perl-base@5.26.1-150300.17.14.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | util-linux | util-linux@2.37.2-150400.8.20.1 | SUSE-SU-2024:1169-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | vim | vim@9.0.1894-150000.5.54.1 | SUSE-SU-2023:4587-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | vim | vim@9.0.1894-150000.5.54.1 | SUSE-SU-2024:0871-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | vim-data-common | vim-data-common@9.0.1894-150000.5.54.1 | SUSE-SU-2023:4587-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | vim-data-common | vim-data-common@9.0.1894-150000.5.54.1 | SUSE-SU-2024:0871-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | google.golang.org/grpc@v1.40.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | k8s.io/kubernetes@v1.24.9 | CVE-2023-3955 | HIGH | affected | gobinary | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | k8s.io/kubernetes@v1.24.9 | CVE-2023-5528 | HIGH | affected | gobinary | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | k8s.io/kubernetes@v1.24.9 | CVE-2024-0793 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | k8s.io/kubernetes@v1.24.9 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | stdlib@v1.18.10 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | stdlib@v1.18.10 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | stdlib@v1.18.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | stdlib@v1.18.10 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | stdlib@v1.18.10 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | stdlib@v1.18.10 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | stdlib@v1.18.10 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | stdlib@v1.18.10 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | stdlib@v1.18.10 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | stdlib@v1.18.10 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | stdlib@v1.18.10 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | stdlib@v1.18.10 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | stdlib@v1.18.10 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | stdlib@v1.18.10 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | stdlib@v1.18.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | stdlib@v1.18.10 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | stdlib@v1.18.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | stdlib@v1.18.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-csi-driver:v0.1.7 | false | Rancher v2.8 head | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.11.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.7 | false | Rancher v2.8 head | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150500.12.2.2 | SUSE-SU-2024:3747-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.7 | false | Rancher v2.8 head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.7 | false | Rancher v2.8 head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.7 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.7 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.1.7 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | k8s.io/kubernetes@v1.24.9 | CVE-2023-3955 | HIGH | affected | gobinary | |
rancher/harvester-csi-driver:v0.1.7 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | k8s.io/kubernetes@v1.24.9 | CVE-2023-5528 | HIGH | affected | gobinary | |
rancher/harvester-csi-driver:v0.1.7 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | k8s.io/kubernetes@v1.24.9 | CVE-2024-0793 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-csi-driver:v0.1.7 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | k8s.io/kubernetes@v1.24.9 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/harvester-csi-driver:v0.1.7 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/harvester-csi-driver:v0.2.1 | false | Rancher v2.8 head | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.1 | false | Rancher v2.8 head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.1 | false | Rancher v2.8 head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.1 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.1 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher v2.8 head | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher v2.8 head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher v2.8 head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/helm-project-operator:v0.2.1 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.46.1 | SUSE-SU-2024:1375-1 | HIGH | affected | sles | |
rancher/helm-project-operator:v0.2.1 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.46.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
rancher/helm-project-operator:v0.2.1 | false | Rancher v2.8 head | libgcc_s1 | libgcc_s1@12.3.0+git1204-150000.1.10.1 | SUSE-SU-2023:3661-1 | HIGH | affected | sles | |
rancher/helm-project-operator:v0.2.1 | false | Rancher v2.8 head | libgcc_s1 | libgcc_s1@12.3.0+git1204-150000.1.10.1 | SUSE-SU-2023:4162-1 | HIGH | affected | sles | |
rancher/helm-project-operator:v0.2.1 | false | Rancher v2.8 head | libgcc_s1 | libgcc_s1@12.3.0+git1204-150000.1.10.1 | SUSE-SU-2023:4458-1 | HIGH | affected | sles | |
rancher/helm-project-operator:v0.2.1 | false | Rancher v2.8 head | libstdc++6 | libstdc++6@12.3.0+git1204-150000.1.10.1 | SUSE-SU-2023:3661-1 | HIGH | affected | sles | |
rancher/helm-project-operator:v0.2.1 | false | Rancher v2.8 head | libstdc++6 | libstdc++6@12.3.0+git1204-150000.1.10.1 | SUSE-SU-2023:4162-1 | HIGH | affected | sles | |
rancher/helm-project-operator:v0.2.1 | false | Rancher v2.8 head | libstdc++6 | libstdc++6@12.3.0+git1204-150000.1.10.1 | SUSE-SU-2023:4458-1 | HIGH | affected | sles | |
rancher/helm-project-operator:v0.2.1 | false | Rancher v2.8 head | usr/bin/helm-project-operator | stdlib@v1.19.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/helm-project-operator:v0.2.1 | false | Rancher v2.8 head | usr/bin/helm-project-operator | stdlib@v1.19.10 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/helm-project-operator:v0.2.1 | false | Rancher v2.8 head | usr/bin/helm-project-operator | stdlib@v1.19.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/helm-project-operator:v0.2.1 | false | Rancher v2.8 head | usr/bin/helm-project-operator | stdlib@v1.19.10 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/helm-project-operator:v0.2.1 | false | Rancher v2.8 head | usr/bin/helm-project-operator | stdlib@v1.19.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/helm-project-operator:v0.2.1 | false | Rancher v2.8 head | usr/bin/helm-project-operator | stdlib@v1.19.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hyperkube:v1.27.16-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-apiserver | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hyperkube:v1.27.16-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-controller-manager | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hyperkube:v1.27.16-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-proxy | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hyperkube:v1.27.16-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-scheduler | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hyperkube:v1.27.16-rancher1 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/hyperkube:v1.27.16-rancher1 | false | Rancher v2.8 head | usr/local/bin/kubelet | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.63.1 | SUSE-SU-2024:1375-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.63.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.8 head | krb5 | krb5@1.19.2-150300.13.1 | SUSE-SU-2024:1001-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.8 head | krb5 | krb5@1.19.2-150300.13.1 | SUSE-SU-2024:2303-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.8 head | libblkid1 | libblkid1@2.36.2-150300.4.35.1 | SUSE-SU-2024:1170-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.8 head | libfdisk1 | libfdisk1@2.36.2-150300.4.35.1 | SUSE-SU-2024:1170-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.8 head | libglib-2_0-0 | libglib-2_0-0@2.62.6-150200.3.15.1 | SUSE-SU-2024:3998-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.8 head | libmount1 | libmount1@2.36.2-150300.4.35.1 | SUSE-SU-2024:1170-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.8 head | libnghttp2-14 | libnghttp2-14@1.40.0-150200.12.1 | SUSE-SU-2024:1167-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.8 head | libopenssl1_1 | libopenssl1_1@1.1.1d-150200.11.82.1 | SUSE-SU-2024:2035-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.8 head | libopenssl1_1-hmac | libopenssl1_1-hmac@1.1.1d-150200.11.82.1 | SUSE-SU-2024:2035-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.8 head | libsmartcols1 | libsmartcols1@2.36.2-150300.4.35.1 | SUSE-SU-2024:1170-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.8 head | libssh4 | libssh4@0.8.7-10.12.1 | SUSE-SU-2024:0525-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.8 head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.8 head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.8 head | libuuid1 | libuuid1@2.36.2-150300.4.35.1 | SUSE-SU-2024:1170-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.9.7-150000.3.63.1 | SUSE-SU-2024:0461-2 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.9.7-150000.3.63.1 | SUSE-SU-2025:0303-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.8 head | openssl-1_1 | openssl-1_1@1.1.1d-150200.11.82.1 | SUSE-SU-2024:2035-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.8 head | perl | perl@5.26.1-150300.17.14.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.8 head | perl-base | perl-base@5.26.1-150300.17.14.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.8 head | util-linux | util-linux@2.36.2-150300.4.35.1 | SUSE-SU-2024:1170-1 | HIGH | affected | sles | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.8 head | usr/bin/istioctl | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.8 head | usr/bin/istioctl | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.8 head | usr/bin/istioctl | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.21.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.21.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.21.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.63.1 | SUSE-SU-2024:1375-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.63.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.8 head | krb5 | krb5@1.19.2-150300.13.1 | SUSE-SU-2024:1001-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.8 head | krb5 | krb5@1.19.2-150300.13.1 | SUSE-SU-2024:2303-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.8 head | libblkid1 | libblkid1@2.36.2-150300.4.35.1 | SUSE-SU-2024:1170-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.8 head | libfdisk1 | libfdisk1@2.36.2-150300.4.35.1 | SUSE-SU-2024:1170-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.8 head | libglib-2_0-0 | libglib-2_0-0@2.62.6-150200.3.15.1 | SUSE-SU-2024:3998-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.8 head | libmount1 | libmount1@2.36.2-150300.4.35.1 | SUSE-SU-2024:1170-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.8 head | libnghttp2-14 | libnghttp2-14@1.40.0-150200.12.1 | SUSE-SU-2024:1167-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.8 head | libopenssl1_1 | libopenssl1_1@1.1.1d-150200.11.82.1 | SUSE-SU-2024:2035-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.8 head | libopenssl1_1-hmac | libopenssl1_1-hmac@1.1.1d-150200.11.82.1 | SUSE-SU-2024:2035-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.8 head | libsmartcols1 | libsmartcols1@2.36.2-150300.4.35.1 | SUSE-SU-2024:1170-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.8 head | libssh4 | libssh4@0.8.7-10.12.1 | SUSE-SU-2024:0525-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.8 head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.8 head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.8 head | libuuid1 | libuuid1@2.36.2-150300.4.35.1 | SUSE-SU-2024:1170-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.9.7-150000.3.63.1 | SUSE-SU-2024:0461-2 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.9.7-150000.3.63.1 | SUSE-SU-2025:0303-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.8 head | openssl-1_1 | openssl-1_1@1.1.1d-150200.11.82.1 | SUSE-SU-2024:2035-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.8 head | perl | perl@5.26.1-150300.17.14.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.8 head | perl-base | perl-base@5.26.1-150300.17.14.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.8 head | util-linux | util-linux@2.36.2-150300.4.35.1 | SUSE-SU-2024:1170-1 | HIGH | affected | sles | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.8 head | usr/bin/istioctl | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.8 head | usr/bin/istioctl | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.8 head | usr/bin/istioctl | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/k3s-upgrade:v1.27.16-k3s1 | false | Rancher v2.8 head | libcrypto3 | libcrypto3@3.0.8-r0 | CVE-2023-0464 | HIGH | affected | alpine | |
rancher/k3s-upgrade:v1.27.16-k3s1 | false | Rancher v2.8 head | libcrypto3 | libcrypto3@3.0.8-r0 | CVE-2023-5363 | HIGH | affected | alpine | |
rancher/k3s-upgrade:v1.27.16-k3s1 | false | Rancher v2.8 head | libssl3 | libssl3@3.0.8-r0 | CVE-2023-0464 | HIGH | affected | alpine | |
rancher/k3s-upgrade:v1.27.16-k3s1 | false | Rancher v2.8 head | libssl3 | libssl3@3.0.8-r0 | CVE-2023-5363 | HIGH | affected | alpine | |
rancher/k3s-upgrade:v1.27.16-k3s1 | false | Rancher v2.8 head | opt/k3s | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | github.com/docker/docker@v23.0.1+incompatible | CVE-2023-28840 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | stdlib@v1.22.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | stdlib@v1.22.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | github.com/docker/docker@v23.0.1+incompatible | CVE-2023-28840 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | stdlib@v1.22.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | stdlib@v1.22.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2020-28362 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2021-27918 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2021-33195 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2021-33196 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2021-33198 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2021-39293 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v2 | stdlib@v1.14.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v3 | stdlib@v1.22.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v3 | stdlib@v1.22.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2020-28362 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2021-27918 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2021-33195 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2021-33196 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2021-33198 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2021-39293 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/tiller | stdlib@v1.14.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.9.2-build20240828 | false | Rancher v2.8 head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | stdlib@v1.23.0 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.9.2-build20240828 | false | Rancher v2.8 head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.9.2-build20240828 | false | Rancher v2.8 head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | golang.org/x/net@v0.28.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.9.2-build20240828 | false | Rancher v2.8 head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | stdlib@v1.23.0 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/klipper-helm:v0.9.2-build20240828 | false | Rancher v2.8 head | usr/bin/helm | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kube-api-auth:v0.2.1 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.63.1 | SUSE-SU-2024:1375-1 | HIGH | affected | sles | |
rancher/kube-api-auth:v0.2.1 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.63.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
rancher/kube-api-auth:v0.2.1 | false | Rancher v2.8 head | usr/bin/kube-api-auth | k8s.io/kubernetes@v1.27.10 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/kube-api-auth:v0.2.1 | false | Rancher v2.8 head | usr/bin/kube-api-auth | stdlib@v1.21.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kube-api-auth:v0.2.1 | false | Rancher v2.8 head | usr/bin/kube-api-auth | stdlib@v1.21.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kube-api-auth:v0.2.1 | false | Rancher v2.8 head | usr/bin/kube-api-auth | stdlib@v1.21.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2021-27918 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2021-33195 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2021-33196 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2021-33198 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2021-39293 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.20.2 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.15.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.21.5 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.22.6 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.16.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.23.3 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.17.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/kubectl:v1.27.16 | false | Rancher v2.8 head | bin/kubectl | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/local-path-provisioner:v0.0.28 | false | Rancher v2.8 head | usr/bin/local-path-provisioner | stdlib@v1.21.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/local-path-provisioner:v0.0.28 | false | Rancher v2.8 head | usr/bin/local-path-provisioner | stdlib@v1.21.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/local-path-provisioner:v0.0.28 | false | Rancher v2.8 head | usr/bin/local-path-provisioner | stdlib@v1.21.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | github.com/prometheus/client_golang@v1.9.0 | CVE-2022-21698 | HIGH | affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | golang.org/x/net@v0.0.0-20210410081132-afb366fc7cd1 | CVE-2021-33194 | HIGH | affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | golang.org/x/net@v0.0.0-20210410081132-afb366fc7cd1 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | golang.org/x/net@v0.0.0-20210410081132-afb366fc7cd1 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | golang.org/x/net@v0.0.0-20210410081132-afb366fc7cd1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | golang.org/x/net@v0.0.0-20210410081132-afb366fc7cd1 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | golang.org/x/text@v0.3.6 | CVE-2021-38561 | HIGH | affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | golang.org/x/text@v0.3.6 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | google.golang.org/grpc@v1.36.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | gopkg.in/yaml.v3@v3.0.0-20210107192922-496545a6307b | CVE-2022-28948 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2021-27918 | HIGH | affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2021-33195 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2021-33196 | HIGH | affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2021-33198 | HIGH | affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2021-39293 | HIGH | affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-attacher:v3.2.1 | false | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | github.com/prometheus/client_golang@v1.11.0 | CVE-2022-21698 | HIGH | affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | golang.org/x/net@v0.0.0-20210520170846-37e1c6afe023 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | golang.org/x/net@v0.0.0-20210520170846-37e1c6afe023 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | golang.org/x/net@v0.0.0-20210520170846-37e1c6afe023 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | golang.org/x/net@v0.0.0-20210520170846-37e1c6afe023 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | golang.org/x/text@v0.3.6 | CVE-2021-38561 | HIGH | affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | golang.org/x/text@v0.3.6 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | google.golang.org/grpc@v1.38.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-33195 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-33196 | HIGH | affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-33198 | HIGH | affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-39293 | HIGH | affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-node-driver-registrar:v2.3.0 | false | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | github.com/gogo/protobuf@v1.3.1 | CVE-2021-3121 | HIGH | affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | github.com/prometheus/client_golang@v1.8.0 | CVE-2022-21698 | HIGH | affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | golang.org/x/crypto@v0.0.0-20201208171446-5f87f3452ae9 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | golang.org/x/crypto@v0.0.0-20201208171446-5f87f3452ae9 | CVE-2020-29652 | HIGH | affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | golang.org/x/crypto@v0.0.0-20201208171446-5f87f3452ae9 | CVE-2021-43565 | HIGH | affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | golang.org/x/crypto@v0.0.0-20201208171446-5f87f3452ae9 | CVE-2022-27191 | HIGH | affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | golang.org/x/net@v0.0.0-20201209123823-ac852fbbde11 | CVE-2021-33194 | HIGH | affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | golang.org/x/net@v0.0.0-20201209123823-ac852fbbde11 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | golang.org/x/net@v0.0.0-20201209123823-ac852fbbde11 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | golang.org/x/net@v0.0.0-20201209123823-ac852fbbde11 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | golang.org/x/net@v0.0.0-20201209123823-ac852fbbde11 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | golang.org/x/text@v0.3.4 | CVE-2021-38561 | HIGH | affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | golang.org/x/text@v0.3.4 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | google.golang.org/grpc@v1.34.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | gopkg.in/yaml.v3@v3.0.0-20200615113413-eeeca48fe776 | CVE-2022-28948 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2020-28362 | HIGH | affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2021-27918 | HIGH | affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2021-33195 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2021-33196 | HIGH | affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2021-33198 | HIGH | affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2021-39293 | HIGH | affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-provisioner:v2.1.2 | false | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | github.com/prometheus/client_golang@v1.9.0 | CVE-2022-21698 | HIGH | affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | golang.org/x/net@v0.0.0-20210316092652-d523dce5a7f4 | CVE-2021-33194 | HIGH | affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | golang.org/x/net@v0.0.0-20210316092652-d523dce5a7f4 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | golang.org/x/net@v0.0.0-20210316092652-d523dce5a7f4 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | golang.org/x/net@v0.0.0-20210316092652-d523dce5a7f4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | golang.org/x/net@v0.0.0-20210316092652-d523dce5a7f4 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | golang.org/x/text@v0.3.5 | CVE-2021-38561 | HIGH | affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | golang.org/x/text@v0.3.5 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | google.golang.org/grpc@v1.36.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | gopkg.in/yaml.v3@v3.0.0-20210107192922-496545a6307b | CVE-2022-28948 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2021-27918 | HIGH | affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2021-33195 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2021-33196 | HIGH | affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2021-33198 | HIGH | affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2021-39293 | HIGH | affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/longhornio-csi-resizer:v1.2.0 | false | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/machine:v0.15.0-rancher118 | false | Rancher v2.8 head | git-core | git-core@2.43.0-150600.3.6.1 | SUSE-SU-2025:0116-1 | HIGH | affected | sles | |
rancher/machine:v0.15.0-rancher118 | false | Rancher v2.8 head | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/machine:v0.15.0-rancher118 | false | Rancher v2.8 head | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.1.4-150600.5.15.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/machine:v0.15.0-rancher118 | false | Rancher v2.8 head | libopenssl3 | libopenssl3@3.1.4-150600.5.15.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/machine:v0.15.0-rancher118 | false | Rancher v2.8 head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/machine:v0.15.0-rancher118 | false | Rancher v2.8 head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/machine:v0.15.0-rancher118 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/machine:v0.15.0-rancher118 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/machine:v0.15.0-rancher118 | false | Rancher v2.8 head | openssl-3 | openssl-3@3.1.4-150600.5.15.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/machine:v0.15.0-rancher118 | false | Rancher v2.8 head | usr/local/bin/rancher-machine | stdlib@v1.22.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | ca-certificates | ca-certificates@2021.2.50-72.amzn2.0.3 | CVE-2022-23491 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | ca-certificates | ca-certificates@2021.2.50-72.amzn2.0.3 | CVE-2023-32803 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | ca-certificates | ca-certificates@2021.2.50-72.amzn2.0.3 | CVE-2023-37920 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | cpio | cpio@2.11-28.amzn2 | CVE-2015-1197 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | curl | curl@7.79.1-7.amzn2.0.1 | CVE-2023-38039 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | curl | curl@7.79.1-7.amzn2.0.1 | CVE-2023-38545 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | curl | curl@7.79.1-7.amzn2.0.1 | CVE-2023-38546 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | expat | expat@2.1.0-15.amzn2.0.2 | CVE-2022-23990 | CRITICAL | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | expat | expat@2.1.0-15.amzn2.0.2 | CVE-2022-25313 | CRITICAL | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | expat | expat@2.1.0-15.amzn2.0.2 | CVE-2024-45490 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | glib2 | glib2@2.56.1-9.amzn2.0.2 | CVE-2018-16428 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | glib2 | glib2@2.56.1-9.amzn2.0.2 | CVE-2018-16429 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | glib2 | glib2@2.56.1-9.amzn2.0.2 | CVE-2020-35457 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | glib2 | glib2@2.56.1-9.amzn2.0.2 | CVE-2023-32636 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | glib2 | glib2@2.56.1-9.amzn2.0.2 | CVE-2023-32643 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | glibc | glibc@2.26-62.amzn2 | CVE-2024-2961 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | glibc-common | glibc-common@2.26-62.amzn2 | CVE-2024-2961 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | glibc-langpack-en | glibc-langpack-en@2.26-62.amzn2 | CVE-2024-2961 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | glibc-minimal-langpack | glibc-minimal-langpack@2.26-62.amzn2 | CVE-2024-2961 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | krb5-libs | krb5-libs@1.15.1-37.amzn2.2.4 | CVE-2022-42898 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | less | less@458-9.amzn2.0.2 | CVE-2022-48624 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | less | less@458-9.amzn2.0.2 | CVE-2024-32487 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | libcrypt | libcrypt@2.26-62.amzn2 | CVE-2024-2961 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | libcurl | libcurl@7.79.1-7.amzn2.0.1 | CVE-2023-38039 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | libcurl | libcurl@7.79.1-7.amzn2.0.1 | CVE-2023-38545 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | libcurl | libcurl@7.79.1-7.amzn2.0.1 | CVE-2023-38546 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | libdb | libdb@5.3.21-24.amzn2.0.3 | CVE-2017-10140 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | libdb-utils | libdb-utils@5.3.21-24.amzn2.0.3 | CVE-2017-10140 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | libnghttp2 | libnghttp2@1.41.0-1.amzn2 | CVE-2023-35945 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | libnghttp2 | libnghttp2@1.41.0-1.amzn2 | CVE-2023-44487 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | libnghttp2 | libnghttp2@1.41.0-1.amzn2 | CVE-2024-28182 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | libssh2 | libssh2@1.4.3-12.amzn2.2.3 | CVE-2020-22218 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | libtasn1 | libtasn1@4.10-1.amzn2.0.2 | CVE-2021-46848 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | libxml2 | libxml2@2.9.1-6.amzn2.5.6 | CVE-2022-49043 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | libxml2 | libxml2@2.9.1-6.amzn2.5.6 | CVE-2023-45322 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | ncurses | ncurses@6.0-8.20170212.amzn2.1.4 | CVE-2023-29491 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | ncurses-base | ncurses-base@6.0-8.20170212.amzn2.1.4 | CVE-2023-29491 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | ncurses-libs | ncurses-libs@6.0-8.20170212.amzn2.1.4 | CVE-2023-29491 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | nss | nss@3.79.0-4.amzn2 | CVE-2023-0767 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | nss | nss@3.79.0-4.amzn2 | CVE-2023-7104 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | nss-sysinit | nss-sysinit@3.79.0-4.amzn2 | CVE-2023-0767 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | nss-sysinit | nss-sysinit@3.79.0-4.amzn2 | CVE-2023-7104 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | nss-tools | nss-tools@3.79.0-4.amzn2 | CVE-2023-0767 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | nss-tools | nss-tools@3.79.0-4.amzn2 | CVE-2023-7104 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | openldap | openldap@2.4.44-23.amzn2.0.4 | CVE-2019-13565 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | openldap | openldap@2.4.44-23.amzn2.0.4 | CVE-2020-36221 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | openldap | openldap@2.4.44-23.amzn2.0.4 | CVE-2020-36222 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | openldap | openldap@2.4.44-23.amzn2.0.4 | CVE-2020-36223 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | openldap | openldap@2.4.44-23.amzn2.0.4 | CVE-2020-36224 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | openldap | openldap@2.4.44-23.amzn2.0.4 | CVE-2020-36226 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | openldap | openldap@2.4.44-23.amzn2.0.4 | CVE-2020-36227 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | openldap | openldap@2.4.44-23.amzn2.0.4 | CVE-2020-36228 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | openldap | openldap@2.4.44-23.amzn2.0.4 | CVE-2020-36229 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | openldap | openldap@2.4.44-23.amzn2.0.4 | CVE-2020-36230 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | openldap | openldap@2.4.44-23.amzn2.0.4 | CVE-2021-27212 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | openssl-libs | openssl-libs@1:1.0.2k-24.amzn2.0.4 | CVE-2022-4304 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | openssl-libs | openssl-libs@1:1.0.2k-24.amzn2.0.4 | CVE-2023-0215 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | openssl-libs | openssl-libs@1:1.0.2k-24.amzn2.0.4 | CVE-2023-0286 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | python | python@2.7.18-1.amzn2.0.5 | CVE-2022-45061 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | python | python@2.7.18-1.amzn2.0.5 | CVE-2022-48565 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | python | python@2.7.18-1.amzn2.0.5 | CVE-2023-27043 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | python-libs | python-libs@2.7.18-1.amzn2.0.5 | CVE-2022-45061 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | python-libs | python-libs@2.7.18-1.amzn2.0.5 | CVE-2022-48565 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | python-libs | python-libs@2.7.18-1.amzn2.0.5 | CVE-2023-27043 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | sqlite | sqlite@3.7.17-8.amzn2.1.1 | CVE-2022-35737 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-data | vim-data@2:9.0.828-1.amzn2.0.1 | CVE-2021-3236 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-data | vim-data@2:9.0.828-1.amzn2.0.1 | CVE-2022-2522 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-data | vim-data@2:9.0.828-1.amzn2.0.1 | CVE-2022-2571 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-data | vim-data@2:9.0.828-1.amzn2.0.1 | CVE-2022-2580 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-data | vim-data@2:9.0.828-1.amzn2.0.1 | CVE-2022-2581 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-data | vim-data@2:9.0.828-1.amzn2.0.1 | CVE-2022-2874 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-data | vim-data@2:9.0.828-1.amzn2.0.1 | CVE-2022-3134 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-data | vim-data@2:9.0.828-1.amzn2.0.1 | CVE-2022-3153 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-data | vim-data@2:9.0.828-1.amzn2.0.1 | CVE-2022-3234 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-data | vim-data@2:9.0.828-1.amzn2.0.1 | CVE-2022-3235 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-data | vim-data@2:9.0.828-1.amzn2.0.1 | CVE-2022-3256 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-data | vim-data@2:9.0.828-1.amzn2.0.1 | CVE-2022-3278 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-data | vim-data@2:9.0.828-1.amzn2.0.1 | CVE-2022-3296 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-data | vim-data@2:9.0.828-1.amzn2.0.1 | CVE-2022-3297 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-data | vim-data@2:9.0.828-1.amzn2.0.1 | CVE-2022-3324 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-data | vim-data@2:9.0.828-1.amzn2.0.1 | CVE-2022-3352 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-data | vim-data@2:9.0.828-1.amzn2.0.1 | CVE-2022-3491 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-data | vim-data@2:9.0.828-1.amzn2.0.1 | CVE-2022-4141 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-data | vim-data@2:9.0.828-1.amzn2.0.1 | CVE-2022-4292 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-data | vim-data@2:9.0.828-1.amzn2.0.1 | CVE-2022-47024 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-data | vim-data@2:9.0.828-1.amzn2.0.1 | CVE-2023-0049 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-data | vim-data@2:9.0.828-1.amzn2.0.1 | CVE-2023-0051 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-data | vim-data@2:9.0.828-1.amzn2.0.1 | CVE-2023-0054 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-data | vim-data@2:9.0.828-1.amzn2.0.1 | CVE-2023-0288 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-data | vim-data@2:9.0.828-1.amzn2.0.1 | CVE-2023-0433 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-data | vim-data@2:9.0.828-1.amzn2.0.1 | CVE-2023-0512 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-data | vim-data@2:9.0.828-1.amzn2.0.1 | CVE-2023-2609 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-data | vim-data@2:9.0.828-1.amzn2.0.1 | CVE-2023-2610 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-data | vim-data@2:9.0.828-1.amzn2.0.1 | CVE-2023-4733 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-data | vim-data@2:9.0.828-1.amzn2.0.1 | CVE-2023-4734 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-data | vim-data@2:9.0.828-1.amzn2.0.1 | CVE-2023-4735 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-data | vim-data@2:9.0.828-1.amzn2.0.1 | CVE-2023-4738 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-data | vim-data@2:9.0.828-1.amzn2.0.1 | CVE-2023-4750 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-data | vim-data@2:9.0.828-1.amzn2.0.1 | CVE-2023-4751 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-data | vim-data@2:9.0.828-1.amzn2.0.1 | CVE-2023-4752 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-data | vim-data@2:9.0.828-1.amzn2.0.1 | CVE-2023-4781 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-minimal | vim-minimal@2:9.0.828-1.amzn2.0.1 | CVE-2021-3236 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-minimal | vim-minimal@2:9.0.828-1.amzn2.0.1 | CVE-2022-2522 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-minimal | vim-minimal@2:9.0.828-1.amzn2.0.1 | CVE-2022-2571 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-minimal | vim-minimal@2:9.0.828-1.amzn2.0.1 | CVE-2022-2580 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-minimal | vim-minimal@2:9.0.828-1.amzn2.0.1 | CVE-2022-2581 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-minimal | vim-minimal@2:9.0.828-1.amzn2.0.1 | CVE-2022-2874 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-minimal | vim-minimal@2:9.0.828-1.amzn2.0.1 | CVE-2022-3134 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-minimal | vim-minimal@2:9.0.828-1.amzn2.0.1 | CVE-2022-3153 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-minimal | vim-minimal@2:9.0.828-1.amzn2.0.1 | CVE-2022-3234 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-minimal | vim-minimal@2:9.0.828-1.amzn2.0.1 | CVE-2022-3235 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-minimal | vim-minimal@2:9.0.828-1.amzn2.0.1 | CVE-2022-3256 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-minimal | vim-minimal@2:9.0.828-1.amzn2.0.1 | CVE-2022-3278 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-minimal | vim-minimal@2:9.0.828-1.amzn2.0.1 | CVE-2022-3296 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-minimal | vim-minimal@2:9.0.828-1.amzn2.0.1 | CVE-2022-3297 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-minimal | vim-minimal@2:9.0.828-1.amzn2.0.1 | CVE-2022-3324 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-minimal | vim-minimal@2:9.0.828-1.amzn2.0.1 | CVE-2022-3352 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-minimal | vim-minimal@2:9.0.828-1.amzn2.0.1 | CVE-2022-3491 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-minimal | vim-minimal@2:9.0.828-1.amzn2.0.1 | CVE-2022-4141 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-minimal | vim-minimal@2:9.0.828-1.amzn2.0.1 | CVE-2022-4292 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-minimal | vim-minimal@2:9.0.828-1.amzn2.0.1 | CVE-2022-47024 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-minimal | vim-minimal@2:9.0.828-1.amzn2.0.1 | CVE-2023-0049 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-minimal | vim-minimal@2:9.0.828-1.amzn2.0.1 | CVE-2023-0051 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-minimal | vim-minimal@2:9.0.828-1.amzn2.0.1 | CVE-2023-0054 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-minimal | vim-minimal@2:9.0.828-1.amzn2.0.1 | CVE-2023-0288 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-minimal | vim-minimal@2:9.0.828-1.amzn2.0.1 | CVE-2023-0433 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-minimal | vim-minimal@2:9.0.828-1.amzn2.0.1 | CVE-2023-0512 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-minimal | vim-minimal@2:9.0.828-1.amzn2.0.1 | CVE-2023-2609 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-minimal | vim-minimal@2:9.0.828-1.amzn2.0.1 | CVE-2023-2610 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-minimal | vim-minimal@2:9.0.828-1.amzn2.0.1 | CVE-2023-4733 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-minimal | vim-minimal@2:9.0.828-1.amzn2.0.1 | CVE-2023-4734 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-minimal | vim-minimal@2:9.0.828-1.amzn2.0.1 | CVE-2023-4735 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-minimal | vim-minimal@2:9.0.828-1.amzn2.0.1 | CVE-2023-4738 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-minimal | vim-minimal@2:9.0.828-1.amzn2.0.1 | CVE-2023-4750 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-minimal | vim-minimal@2:9.0.828-1.amzn2.0.1 | CVE-2023-4751 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-minimal | vim-minimal@2:9.0.828-1.amzn2.0.1 | CVE-2023-4752 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | vim-minimal | vim-minimal@2:9.0.828-1.amzn2.0.1 | CVE-2023-4781 | HIGH | affected | amazon | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | Python | cryptography@3.3.2 | CVE-2023-0286 | HIGH | affected | python-pkg | |
rancher/mirrored-amazon-aws-cli:2.9.14 | true | Rancher v2.8 head | Python | cryptography@3.3.2 | CVE-2023-50782 | HIGH | affected | python-pkg | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | github.com/emicklei/go-restful@v2.9.5+incompatible | CVE-2022-1996 | CRITICAL | affected | gobinary | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | github.com/prometheus/client_golang@v1.10.0 | CVE-2022-21698 | HIGH | affected | gobinary | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | go.etcd.io/etcd@v0.5.0-alpha.5.0.20200910180754-dd1b699fc489 | CVE-2020-15114 | HIGH | affected | gobinary | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | golang.org/x/crypto@v0.0.0-20210220033148-5ea612d1eb83 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | golang.org/x/crypto@v0.0.0-20210220033148-5ea612d1eb83 | CVE-2021-43565 | HIGH | affected | gobinary | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | golang.org/x/crypto@v0.0.0-20210220033148-5ea612d1eb83 | CVE-2022-27191 | HIGH | affected | gobinary | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | golang.org/x/net@v0.0.0-20210428140749-89ef3d95e781 | CVE-2021-33194 | HIGH | affected | gobinary | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | golang.org/x/net@v0.0.0-20210428140749-89ef3d95e781 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | golang.org/x/net@v0.0.0-20210428140749-89ef3d95e781 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | golang.org/x/net@v0.0.0-20210428140749-89ef3d95e781 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | golang.org/x/net@v0.0.0-20210428140749-89ef3d95e781 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | golang.org/x/text@v0.3.7 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | google.golang.org/grpc@v1.27.1 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | gopkg.in/yaml.v3@v3.0.0-20210107192922-496545a6307b | CVE-2022-28948 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | stdlib@v1.17.12 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | stdlib@v1.17.12 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | stdlib@v1.17.12 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | stdlib@v1.17.12 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | stdlib@v1.17.12 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | stdlib@v1.17.12 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | stdlib@v1.17.12 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | stdlib@v1.17.12 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | stdlib@v1.17.12 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | stdlib@v1.17.12 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | stdlib@v1.17.12 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | stdlib@v1.17.12 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | stdlib@v1.17.12 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | stdlib@v1.17.12 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | stdlib@v1.17.12 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | stdlib@v1.17.12 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | stdlib@v1.17.12 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | stdlib@v1.17.12 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | stdlib@v1.17.12 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | stdlib@v1.17.12 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | stdlib@v1.17.12 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | stdlib@v1.17.12 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | stdlib@v1.17.12 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | stdlib@v1.17.12 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-appscode-kubed:v0.13.2 | true | Rancher v2.8 head | kubed | stdlib@v1.17.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.26.3 | true | Rancher v2.8 head | code/apiserver | github.com/projectcalico/calico@v3.26.3 | CVE-2024-33522 | HIGH | affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.26.3 | true | Rancher v2.8 head | code/apiserver | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.26.3 | true | Rancher v2.8 head | code/apiserver | google.golang.org/grpc@v1.55.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.26.3 | true | Rancher v2.8 head | code/apiserver | k8s.io/kubernetes@v1.26.8 | CVE-2023-5528 | HIGH | affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.26.3 | true | Rancher v2.8 head | code/apiserver | k8s.io/kubernetes@v1.26.8 | CVE-2024-0793 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.26.3 | true | Rancher v2.8 head | code/apiserver | k8s.io/kubernetes@v1.26.8 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.26.3 | true | Rancher v2.8 head | code/apiserver | stdlib@v1.21.1 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.26.3 | true | Rancher v2.8 head | code/apiserver | stdlib@v1.21.1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.26.3 | true | Rancher v2.8 head | code/apiserver | stdlib@v1.21.1 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.26.3 | true | Rancher v2.8 head | code/apiserver | stdlib@v1.21.1 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.26.3 | true | Rancher v2.8 head | code/apiserver | stdlib@v1.21.1 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.26.3 | true | Rancher v2.8 head | code/filecheck | github.com/projectcalico/calico@v3.26.3 | CVE-2024-33522 | HIGH | affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.26.3 | true | Rancher v2.8 head | code/filecheck | stdlib@v1.21.1 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.26.3 | true | Rancher v2.8 head | code/filecheck | stdlib@v1.21.1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.26.3 | true | Rancher v2.8 head | code/filecheck | stdlib@v1.21.1 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.26.3 | true | Rancher v2.8 head | code/filecheck | stdlib@v1.21.1 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.26.3 | true | Rancher v2.8 head | code/filecheck | stdlib@v1.21.1 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.27.0 | true | Rancher v2.8 head | code/apiserver | github.com/projectcalico/calico@v3.27.0 | CVE-2024-33522 | HIGH | affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.27.0 | true | Rancher v2.8 head | code/apiserver | k8s.io/kubernetes@v1.27.8 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.27.0 | true | Rancher v2.8 head | code/apiserver | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.27.0 | true | Rancher v2.8 head | code/apiserver | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.27.0 | true | Rancher v2.8 head | code/apiserver | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.27.0 | true | Rancher v2.8 head | code/filecheck | github.com/projectcalico/calico@v3.27.0 | CVE-2024-33522 | HIGH | affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.27.0 | true | Rancher v2.8 head | code/filecheck | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.27.0 | true | Rancher v2.8 head | code/filecheck | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.27.0 | true | Rancher v2.8 head | code/filecheck | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.27.2 | true | Rancher v2.8 head | code/apiserver | github.com/projectcalico/calico@v3.27.2 | CVE-2024-33522 | HIGH | affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.27.2 | true | Rancher v2.8 head | code/apiserver | k8s.io/kubernetes@v1.27.8 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.27.2 | true | Rancher v2.8 head | code/apiserver | stdlib@v1.21.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.27.2 | true | Rancher v2.8 head | code/apiserver | stdlib@v1.21.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.27.2 | true | Rancher v2.8 head | code/apiserver | stdlib@v1.21.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.27.2 | true | Rancher v2.8 head | code/filecheck | github.com/projectcalico/calico@v3.27.2 | CVE-2024-33522 | HIGH | affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.27.2 | true | Rancher v2.8 head | code/filecheck | stdlib@v1.21.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.27.2 | true | Rancher v2.8 head | code/filecheck | stdlib@v1.21.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.27.2 | true | Rancher v2.8 head | code/filecheck | stdlib@v1.21.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.27.3 | true | Rancher v2.8 head | code/apiserver | k8s.io/kubernetes@v1.27.8 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.27.3 | true | Rancher v2.8 head | code/apiserver | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.27.3 | true | Rancher v2.8 head | code/apiserver | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.27.3 | true | Rancher v2.8 head | code/apiserver | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.27.3 | true | Rancher v2.8 head | code/filecheck | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.27.3 | true | Rancher v2.8 head | code/filecheck | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.27.3 | true | Rancher v2.8 head | code/filecheck | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-apiserver:v3.28.1 | true | Rancher v2.8 head | code/apiserver | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/bandwidth | stdlib@v1.21.1 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/bandwidth | stdlib@v1.21.1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/bandwidth | stdlib@v1.21.1 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/bandwidth | stdlib@v1.21.1 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/bandwidth | stdlib@v1.21.1 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/calico | github.com/projectcalico/calico@v3.26.3 | CVE-2024-33522 | HIGH | affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/calico | google.golang.org/grpc@v1.55.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/calico | stdlib@v1.21.1 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/calico | stdlib@v1.21.1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/calico | stdlib@v1.21.1 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/calico | stdlib@v1.21.1 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/calico | stdlib@v1.21.1 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/calico-ipam | github.com/projectcalico/calico@v3.26.3 | CVE-2024-33522 | HIGH | affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/calico-ipam | google.golang.org/grpc@v1.55.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/calico-ipam | stdlib@v1.21.1 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/calico-ipam | stdlib@v1.21.1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/calico-ipam | stdlib@v1.21.1 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/calico-ipam | stdlib@v1.21.1 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/calico-ipam | stdlib@v1.21.1 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/flannel | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/flannel | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/flannel | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/flannel | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/flannel | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/host-local | stdlib@v1.21.1 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/host-local | stdlib@v1.21.1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/host-local | stdlib@v1.21.1 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/host-local | stdlib@v1.21.1 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/host-local | stdlib@v1.21.1 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/install | github.com/projectcalico/calico@v3.26.3 | CVE-2024-33522 | HIGH | affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/install | google.golang.org/grpc@v1.55.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/install | stdlib@v1.21.1 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/install | stdlib@v1.21.1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/install | stdlib@v1.21.1 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/install | stdlib@v1.21.1 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/install | stdlib@v1.21.1 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/loopback | stdlib@v1.21.1 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/loopback | stdlib@v1.21.1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/loopback | stdlib@v1.21.1 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/loopback | stdlib@v1.21.1 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/loopback | stdlib@v1.21.1 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.21.1 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.21.1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.21.1 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.21.1 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.21.1 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/tuning | stdlib@v1.21.1 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/tuning | stdlib@v1.21.1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/tuning | stdlib@v1.21.1 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/tuning | stdlib@v1.21.1 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/tuning | stdlib@v1.21.1 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.0 | true | Rancher v2.8 head | opt/cni/bin/bandwidth | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.0 | true | Rancher v2.8 head | opt/cni/bin/bandwidth | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.0 | true | Rancher v2.8 head | opt/cni/bin/bandwidth | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.0 | true | Rancher v2.8 head | opt/cni/bin/calico | github.com/projectcalico/calico@v3.27.0 | CVE-2024-33522 | HIGH | affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.0 | true | Rancher v2.8 head | opt/cni/bin/calico | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.0 | true | Rancher v2.8 head | opt/cni/bin/calico | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.0 | true | Rancher v2.8 head | opt/cni/bin/calico | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.0 | true | Rancher v2.8 head | opt/cni/bin/calico-ipam | github.com/projectcalico/calico@v3.27.0 | CVE-2024-33522 | HIGH | affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.0 | true | Rancher v2.8 head | opt/cni/bin/calico-ipam | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.0 | true | Rancher v2.8 head | opt/cni/bin/calico-ipam | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.0 | true | Rancher v2.8 head | opt/cni/bin/calico-ipam | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.0 | true | Rancher v2.8 head | opt/cni/bin/flannel | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.0 | true | Rancher v2.8 head | opt/cni/bin/flannel | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.0 | true | Rancher v2.8 head | opt/cni/bin/flannel | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.0 | true | Rancher v2.8 head | opt/cni/bin/host-local | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.0 | true | Rancher v2.8 head | opt/cni/bin/host-local | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.0 | true | Rancher v2.8 head | opt/cni/bin/host-local | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.0 | true | Rancher v2.8 head | opt/cni/bin/install | github.com/projectcalico/calico@v3.27.0 | CVE-2024-33522 | HIGH | affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.0 | true | Rancher v2.8 head | opt/cni/bin/install | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.0 | true | Rancher v2.8 head | opt/cni/bin/install | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.0 | true | Rancher v2.8 head | opt/cni/bin/install | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.0 | true | Rancher v2.8 head | opt/cni/bin/loopback | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.0 | true | Rancher v2.8 head | opt/cni/bin/loopback | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.0 | true | Rancher v2.8 head | opt/cni/bin/loopback | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.0 | true | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.0 | true | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.0 | true | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.0 | true | Rancher v2.8 head | opt/cni/bin/tuning | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.0 | true | Rancher v2.8 head | opt/cni/bin/tuning | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.0 | true | Rancher v2.8 head | opt/cni/bin/tuning | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.2 | true | Rancher v2.8 head | opt/cni/bin/bandwidth | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.2 | true | Rancher v2.8 head | opt/cni/bin/bandwidth | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.2 | true | Rancher v2.8 head | opt/cni/bin/bandwidth | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.2 | true | Rancher v2.8 head | opt/cni/bin/calico | github.com/projectcalico/calico@v3.27.2 | CVE-2024-33522 | HIGH | affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.2 | true | Rancher v2.8 head | opt/cni/bin/calico | stdlib@v1.21.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.2 | true | Rancher v2.8 head | opt/cni/bin/calico | stdlib@v1.21.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.2 | true | Rancher v2.8 head | opt/cni/bin/calico | stdlib@v1.21.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.2 | true | Rancher v2.8 head | opt/cni/bin/calico-ipam | github.com/projectcalico/calico@v3.27.2 | CVE-2024-33522 | HIGH | affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.2 | true | Rancher v2.8 head | opt/cni/bin/calico-ipam | stdlib@v1.21.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.2 | true | Rancher v2.8 head | opt/cni/bin/calico-ipam | stdlib@v1.21.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.2 | true | Rancher v2.8 head | opt/cni/bin/calico-ipam | stdlib@v1.21.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.2 | true | Rancher v2.8 head | opt/cni/bin/flannel | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.2 | true | Rancher v2.8 head | opt/cni/bin/flannel | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.2 | true | Rancher v2.8 head | opt/cni/bin/flannel | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.2 | true | Rancher v2.8 head | opt/cni/bin/host-local | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.2 | true | Rancher v2.8 head | opt/cni/bin/host-local | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.2 | true | Rancher v2.8 head | opt/cni/bin/host-local | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.2 | true | Rancher v2.8 head | opt/cni/bin/install | github.com/projectcalico/calico@v3.27.2 | CVE-2024-33522 | HIGH | affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.2 | true | Rancher v2.8 head | opt/cni/bin/install | stdlib@v1.21.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.2 | true | Rancher v2.8 head | opt/cni/bin/install | stdlib@v1.21.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.2 | true | Rancher v2.8 head | opt/cni/bin/install | stdlib@v1.21.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.2 | true | Rancher v2.8 head | opt/cni/bin/loopback | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.2 | true | Rancher v2.8 head | opt/cni/bin/loopback | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.2 | true | Rancher v2.8 head | opt/cni/bin/loopback | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.2 | true | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.2 | true | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.2 | true | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.2 | true | Rancher v2.8 head | opt/cni/bin/tuning | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.2 | true | Rancher v2.8 head | opt/cni/bin/tuning | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.2 | true | Rancher v2.8 head | opt/cni/bin/tuning | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.3 | true | Rancher v2.8 head | opt/cni/bin/bandwidth | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.3 | true | Rancher v2.8 head | opt/cni/bin/bandwidth | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.3 | true | Rancher v2.8 head | opt/cni/bin/bandwidth | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.3 | true | Rancher v2.8 head | opt/cni/bin/calico | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.3 | true | Rancher v2.8 head | opt/cni/bin/calico | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.3 | true | Rancher v2.8 head | opt/cni/bin/calico | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.3 | true | Rancher v2.8 head | opt/cni/bin/calico-ipam | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.3 | true | Rancher v2.8 head | opt/cni/bin/calico-ipam | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.3 | true | Rancher v2.8 head | opt/cni/bin/calico-ipam | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.3 | true | Rancher v2.8 head | opt/cni/bin/flannel | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.3 | true | Rancher v2.8 head | opt/cni/bin/flannel | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.3 | true | Rancher v2.8 head | opt/cni/bin/flannel | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.3 | true | Rancher v2.8 head | opt/cni/bin/host-local | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.3 | true | Rancher v2.8 head | opt/cni/bin/host-local | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.3 | true | Rancher v2.8 head | opt/cni/bin/host-local | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.3 | true | Rancher v2.8 head | opt/cni/bin/install | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.3 | true | Rancher v2.8 head | opt/cni/bin/install | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.3 | true | Rancher v2.8 head | opt/cni/bin/install | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.3 | true | Rancher v2.8 head | opt/cni/bin/loopback | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.3 | true | Rancher v2.8 head | opt/cni/bin/loopback | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.3 | true | Rancher v2.8 head | opt/cni/bin/loopback | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.3 | true | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.3 | true | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.3 | true | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.3 | true | Rancher v2.8 head | opt/cni/bin/tuning | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.3 | true | Rancher v2.8 head | opt/cni/bin/tuning | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.27.3 | true | Rancher v2.8 head | opt/cni/bin/tuning | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.28.1 | true | Rancher v2.8 head | opt/cni/bin/bandwidth | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.28.1 | true | Rancher v2.8 head | opt/cni/bin/calico | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.28.1 | true | Rancher v2.8 head | opt/cni/bin/calico-ipam | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.28.1 | true | Rancher v2.8 head | opt/cni/bin/flannel | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.28.1 | true | Rancher v2.8 head | opt/cni/bin/host-local | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.28.1 | true | Rancher v2.8 head | opt/cni/bin/install | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.28.1 | true | Rancher v2.8 head | opt/cni/bin/loopback | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.28.1 | true | Rancher v2.8 head | opt/cni/bin/portmap | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-cni:v3.28.1 | true | Rancher v2.8 head | opt/cni/bin/tuning | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-csi:v3.27.2 | true | Rancher v2.8 head | usr/local/bin/csi-driver | golang.org/x/net@v0.19.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-csi:v3.27.2 | true | Rancher v2.8 head | usr/local/bin/csi-driver | stdlib@v1.21.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-csi:v3.27.2 | true | Rancher v2.8 head | usr/local/bin/csi-driver | stdlib@v1.21.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-csi:v3.27.2 | true | Rancher v2.8 head | usr/local/bin/csi-driver | stdlib@v1.21.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-csi:v3.27.3 | true | Rancher v2.8 head | usr/local/bin/csi-driver | golang.org/x/net@v0.19.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-csi:v3.27.3 | true | Rancher v2.8 head | usr/local/bin/csi-driver | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-csi:v3.27.3 | true | Rancher v2.8 head | usr/local/bin/csi-driver | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-csi:v3.27.3 | true | Rancher v2.8 head | usr/local/bin/csi-driver | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-csi:v3.28.1 | true | Rancher v2.8 head | usr/bin/csi-driver | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-csi:v3.28.1 | true | Rancher v2.8 head | usr/bin/csi-driver | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-csi:v3.28.2 | true | Rancher v2.8 head | usr/bin/csi-driver | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.26.3 | true | Rancher v2.8 head | calicoctl | golang.org/x/crypto@v0.13.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.26.3 | true | Rancher v2.8 head | calicoctl | golang.org/x/net@v0.15.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-calico-ctl:v3.26.3 | true | Rancher v2.8 head | calicoctl | golang.org/x/net@v0.15.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.26.3 | true | Rancher v2.8 head | calicoctl | google.golang.org/grpc@v1.55.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-calico-ctl:v3.26.3 | true | Rancher v2.8 head | calicoctl | stdlib@v1.21.1 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.26.3 | true | Rancher v2.8 head | calicoctl | stdlib@v1.21.1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-calico-ctl:v3.26.3 | true | Rancher v2.8 head | calicoctl | stdlib@v1.21.1 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.26.3 | true | Rancher v2.8 head | calicoctl | stdlib@v1.21.1 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.26.3 | true | Rancher v2.8 head | calicoctl | stdlib@v1.21.1 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.27.0 | true | Rancher v2.8 head | calicoctl | golang.org/x/crypto@v0.15.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.27.0 | true | Rancher v2.8 head | calicoctl | golang.org/x/net@v0.18.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.27.0 | true | Rancher v2.8 head | calicoctl | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.27.0 | true | Rancher v2.8 head | calicoctl | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.27.0 | true | Rancher v2.8 head | calicoctl | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.27.2 | true | Rancher v2.8 head | calicoctl | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.27.2 | true | Rancher v2.8 head | calicoctl | golang.org/x/net@v0.19.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.27.2 | true | Rancher v2.8 head | calicoctl | stdlib@v1.21.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.27.2 | true | Rancher v2.8 head | calicoctl | stdlib@v1.21.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.27.2 | true | Rancher v2.8 head | calicoctl | stdlib@v1.21.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.27.3 | true | Rancher v2.8 head | calicoctl | golang.org/x/crypto@v0.19.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.27.3 | true | Rancher v2.8 head | calicoctl | golang.org/x/net@v0.19.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.27.3 | true | Rancher v2.8 head | calicoctl | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.27.3 | true | Rancher v2.8 head | calicoctl | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.27.3 | true | Rancher v2.8 head | calicoctl | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.27.4 | true | Rancher v2.8 head | calicoctl | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.27.4 | true | Rancher v2.8 head | calicoctl | golang.org/x/net@v0.26.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.27.4 | true | Rancher v2.8 head | calicoctl | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.28.1 | true | Rancher v2.8 head | usr/bin/calicoctl | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.28.1 | true | Rancher v2.8 head | usr/bin/calicoctl | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.28.1 | true | Rancher v2.8 head | usr/bin/calicoctl | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.28.2 | true | Rancher v2.8 head | usr/bin/calicoctl | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-ctl:v3.28.2 | true | Rancher v2.8 head | usr/bin/calicoctl | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.26.3 | true | Rancher v2.8 head | usr/bin/check-status | github.com/projectcalico/calico@v3.26.3 | CVE-2024-33522 | HIGH | affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.26.3 | true | Rancher v2.8 head | usr/bin/check-status | stdlib@v1.21.1 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.26.3 | true | Rancher v2.8 head | usr/bin/check-status | stdlib@v1.21.1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.26.3 | true | Rancher v2.8 head | usr/bin/check-status | stdlib@v1.21.1 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.26.3 | true | Rancher v2.8 head | usr/bin/check-status | stdlib@v1.21.1 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.26.3 | true | Rancher v2.8 head | usr/bin/check-status | stdlib@v1.21.1 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.26.3 | true | Rancher v2.8 head | usr/bin/kube-controllers | github.com/projectcalico/calico@v3.26.3 | CVE-2024-33522 | HIGH | affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.26.3 | true | Rancher v2.8 head | usr/bin/kube-controllers | google.golang.org/grpc@v1.55.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.26.3 | true | Rancher v2.8 head | usr/bin/kube-controllers | stdlib@v1.21.1 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.26.3 | true | Rancher v2.8 head | usr/bin/kube-controllers | stdlib@v1.21.1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.26.3 | true | Rancher v2.8 head | usr/bin/kube-controllers | stdlib@v1.21.1 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.26.3 | true | Rancher v2.8 head | usr/bin/kube-controllers | stdlib@v1.21.1 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.26.3 | true | Rancher v2.8 head | usr/bin/kube-controllers | stdlib@v1.21.1 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.27.0 | true | Rancher v2.8 head | usr/bin/check-status | github.com/projectcalico/calico@v3.27.0 | CVE-2024-33522 | HIGH | affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.27.0 | true | Rancher v2.8 head | usr/bin/check-status | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.27.0 | true | Rancher v2.8 head | usr/bin/check-status | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.27.0 | true | Rancher v2.8 head | usr/bin/check-status | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.27.0 | true | Rancher v2.8 head | usr/bin/kube-controllers | github.com/projectcalico/calico@v3.27.0 | CVE-2024-33522 | HIGH | affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.27.0 | true | Rancher v2.8 head | usr/bin/kube-controllers | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.27.0 | true | Rancher v2.8 head | usr/bin/kube-controllers | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.27.0 | true | Rancher v2.8 head | usr/bin/kube-controllers | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.27.2 | true | Rancher v2.8 head | usr/bin/check-status | github.com/projectcalico/calico@v3.27.2 | CVE-2024-33522 | HIGH | affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.27.2 | true | Rancher v2.8 head | usr/bin/check-status | stdlib@v1.21.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.27.2 | true | Rancher v2.8 head | usr/bin/check-status | stdlib@v1.21.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.27.2 | true | Rancher v2.8 head | usr/bin/check-status | stdlib@v1.21.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.27.2 | true | Rancher v2.8 head | usr/bin/kube-controllers | github.com/projectcalico/calico@v3.27.2 | CVE-2024-33522 | HIGH | affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.27.2 | true | Rancher v2.8 head | usr/bin/kube-controllers | stdlib@v1.21.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.27.2 | true | Rancher v2.8 head | usr/bin/kube-controllers | stdlib@v1.21.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.27.2 | true | Rancher v2.8 head | usr/bin/kube-controllers | stdlib@v1.21.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.27.3 | true | Rancher v2.8 head | usr/bin/check-status | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.27.3 | true | Rancher v2.8 head | usr/bin/check-status | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.27.3 | true | Rancher v2.8 head | usr/bin/check-status | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.27.3 | true | Rancher v2.8 head | usr/bin/kube-controllers | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.27.3 | true | Rancher v2.8 head | usr/bin/kube-controllers | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.27.3 | true | Rancher v2.8 head | usr/bin/kube-controllers | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.27.4 | true | Rancher v2.8 head | usr/bin/check-status | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.27.4 | true | Rancher v2.8 head | usr/bin/kube-controllers | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.28.1 | true | Rancher v2.8 head | usr/bin/check-status | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-kube-controllers:v3.28.1 | true | Rancher v2.8 head | usr/bin/kube-controllers | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node-driver-registrar:v3.27.2 | true | Rancher v2.8 head | usr/local/bin/node-driver-registrar | golang.org/x/net@v0.17.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node-driver-registrar:v3.27.2 | true | Rancher v2.8 head | usr/local/bin/node-driver-registrar | stdlib@v1.21.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node-driver-registrar:v3.27.2 | true | Rancher v2.8 head | usr/local/bin/node-driver-registrar | stdlib@v1.21.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node-driver-registrar:v3.27.2 | true | Rancher v2.8 head | usr/local/bin/node-driver-registrar | stdlib@v1.21.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node-driver-registrar:v3.27.3 | true | Rancher v2.8 head | usr/local/bin/node-driver-registrar | golang.org/x/net@v0.18.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node-driver-registrar:v3.27.3 | true | Rancher v2.8 head | usr/local/bin/node-driver-registrar | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node-driver-registrar:v3.27.3 | true | Rancher v2.8 head | usr/local/bin/node-driver-registrar | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node-driver-registrar:v3.27.3 | true | Rancher v2.8 head | usr/local/bin/node-driver-registrar | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node-driver-registrar:v3.28.1 | true | Rancher v2.8 head | usr/bin/node-driver-registrar | golang.org/x/net@v0.25.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node-driver-registrar:v3.28.1 | true | Rancher v2.8 head | usr/bin/node-driver-registrar | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node-driver-registrar:v3.28.2 | true | Rancher v2.8 head | usr/bin/node-driver-registrar | golang.org/x/net@v0.25.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.26.3 | true | Rancher v2.8 head | glibc | glibc@2.28-225.el8_8.6 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-calico-node:v3.26.3 | true | Rancher v2.8 head | glibc | glibc@2.28-225.el8_8.6 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-calico-node:v3.26.3 | true | Rancher v2.8 head | glibc-common | glibc-common@2.28-225.el8_8.6 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-calico-node:v3.26.3 | true | Rancher v2.8 head | glibc-common | glibc-common@2.28-225.el8_8.6 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-calico-node:v3.26.3 | true | Rancher v2.8 head | glibc-gconv-extra | glibc-gconv-extra@2.28-225.el8_8.6 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-calico-node:v3.26.3 | true | Rancher v2.8 head | glibc-gconv-extra | glibc-gconv-extra@2.28-225.el8_8.6 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-calico-node:v3.26.3 | true | Rancher v2.8 head | glibc-langpack-en | glibc-langpack-en@2.28-225.el8_8.6 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-calico-node:v3.26.3 | true | Rancher v2.8 head | glibc-langpack-en | glibc-langpack-en@2.28-225.el8_8.6 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-calico-node:v3.26.3 | true | Rancher v2.8 head | glibc-minimal-langpack | glibc-minimal-langpack@2.28-225.el8_8.6 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-calico-node:v3.26.3 | true | Rancher v2.8 head | glibc-minimal-langpack | glibc-minimal-langpack@2.28-225.el8_8.6 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-calico-node:v3.26.3 | true | Rancher v2.8 head | usr/bin/calico-node | golang.org/x/crypto@v0.13.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.26.3 | true | Rancher v2.8 head | usr/bin/calico-node | golang.org/x/net@v0.15.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-calico-node:v3.26.3 | true | Rancher v2.8 head | usr/bin/calico-node | golang.org/x/net@v0.15.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.26.3 | true | Rancher v2.8 head | usr/bin/calico-node | google.golang.org/grpc@v1.55.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-calico-node:v3.26.3 | true | Rancher v2.8 head | usr/bin/calico-node | k8s.io/kubernetes@v1.26.8 | CVE-2023-5528 | HIGH | affected | gobinary | |
rancher/mirrored-calico-node:v3.26.3 | true | Rancher v2.8 head | usr/bin/calico-node | k8s.io/kubernetes@v1.26.8 | CVE-2024-0793 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.26.3 | true | Rancher v2.8 head | usr/bin/calico-node | k8s.io/kubernetes@v1.26.8 | CVE-2024-10220 | HIGH | affected | gobinary | |
rancher/mirrored-calico-node:v3.26.3 | true | Rancher v2.8 head | usr/bin/calico-node | k8s.io/kubernetes@v1.26.8 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/mirrored-calico-node:v3.26.3 | true | Rancher v2.8 head | usr/bin/calico-node | stdlib@v1.21.1 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.26.3 | true | Rancher v2.8 head | usr/bin/calico-node | stdlib@v1.21.1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-calico-node:v3.26.3 | true | Rancher v2.8 head | usr/bin/calico-node | stdlib@v1.21.1 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.26.3 | true | Rancher v2.8 head | usr/bin/calico-node | stdlib@v1.21.1 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.26.3 | true | Rancher v2.8 head | usr/bin/calico-node | stdlib@v1.21.1 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.26.3 | true | Rancher v2.8 head | usr/bin/mountns | github.com/projectcalico/calico@v3.26.3 | CVE-2024-33522 | HIGH | affected | gobinary | |
rancher/mirrored-calico-node:v3.26.3 | true | Rancher v2.8 head | usr/bin/mountns | stdlib@v1.21.1 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.26.3 | true | Rancher v2.8 head | usr/bin/mountns | stdlib@v1.21.1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-calico-node:v3.26.3 | true | Rancher v2.8 head | usr/bin/mountns | stdlib@v1.21.1 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.26.3 | true | Rancher v2.8 head | usr/bin/mountns | stdlib@v1.21.1 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.26.3 | true | Rancher v2.8 head | usr/bin/mountns | stdlib@v1.21.1 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.27.0 | true | Rancher v2.8 head | glibc | glibc@2.28-236.el8.7 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-calico-node:v3.27.0 | true | Rancher v2.8 head | glibc | glibc@2.28-236.el8.7 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-calico-node:v3.27.0 | true | Rancher v2.8 head | glibc-common | glibc-common@2.28-236.el8.7 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-calico-node:v3.27.0 | true | Rancher v2.8 head | glibc-common | glibc-common@2.28-236.el8.7 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-calico-node:v3.27.0 | true | Rancher v2.8 head | glibc-minimal-langpack | glibc-minimal-langpack@2.28-236.el8.7 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-calico-node:v3.27.0 | true | Rancher v2.8 head | glibc-minimal-langpack | glibc-minimal-langpack@2.28-236.el8.7 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-calico-node:v3.27.0 | true | Rancher v2.8 head | usr/bin/calico-node | golang.org/x/crypto@v0.15.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.27.0 | true | Rancher v2.8 head | usr/bin/calico-node | golang.org/x/net@v0.18.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.27.0 | true | Rancher v2.8 head | usr/bin/calico-node | k8s.io/kubernetes@v1.27.8 | CVE-2024-10220 | HIGH | affected | gobinary | |
rancher/mirrored-calico-node:v3.27.0 | true | Rancher v2.8 head | usr/bin/calico-node | k8s.io/kubernetes@v1.27.8 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/mirrored-calico-node:v3.27.0 | true | Rancher v2.8 head | usr/bin/calico-node | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.27.0 | true | Rancher v2.8 head | usr/bin/calico-node | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.27.0 | true | Rancher v2.8 head | usr/bin/calico-node | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.27.0 | true | Rancher v2.8 head | usr/bin/mountns | github.com/projectcalico/calico@v3.27.0 | CVE-2024-33522 | HIGH | affected | gobinary | |
rancher/mirrored-calico-node:v3.27.0 | true | Rancher v2.8 head | usr/bin/mountns | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.27.0 | true | Rancher v2.8 head | usr/bin/mountns | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.27.0 | true | Rancher v2.8 head | usr/bin/mountns | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.27.2 | true | Rancher v2.8 head | glibc | glibc@2.28-236.el8.7 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-calico-node:v3.27.2 | true | Rancher v2.8 head | glibc | glibc@2.28-236.el8.7 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-calico-node:v3.27.2 | true | Rancher v2.8 head | glibc-common | glibc-common@2.28-236.el8.7 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-calico-node:v3.27.2 | true | Rancher v2.8 head | glibc-common | glibc-common@2.28-236.el8.7 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-calico-node:v3.27.2 | true | Rancher v2.8 head | glibc-minimal-langpack | glibc-minimal-langpack@2.28-236.el8.7 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-calico-node:v3.27.2 | true | Rancher v2.8 head | glibc-minimal-langpack | glibc-minimal-langpack@2.28-236.el8.7 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-calico-node:v3.27.2 | true | Rancher v2.8 head | usr/bin/calico-node | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.27.2 | true | Rancher v2.8 head | usr/bin/calico-node | golang.org/x/net@v0.19.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.27.2 | true | Rancher v2.8 head | usr/bin/calico-node | k8s.io/kubernetes@v1.27.8 | CVE-2024-10220 | HIGH | affected | gobinary | |
rancher/mirrored-calico-node:v3.27.2 | true | Rancher v2.8 head | usr/bin/calico-node | k8s.io/kubernetes@v1.27.8 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/mirrored-calico-node:v3.27.2 | true | Rancher v2.8 head | usr/bin/calico-node | stdlib@v1.21.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.27.2 | true | Rancher v2.8 head | usr/bin/calico-node | stdlib@v1.21.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.27.2 | true | Rancher v2.8 head | usr/bin/calico-node | stdlib@v1.21.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.27.2 | true | Rancher v2.8 head | usr/bin/mountns | github.com/projectcalico/calico@v3.27.2 | CVE-2024-33522 | HIGH | affected | gobinary | |
rancher/mirrored-calico-node:v3.27.2 | true | Rancher v2.8 head | usr/bin/mountns | stdlib@v1.21.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.27.2 | true | Rancher v2.8 head | usr/bin/mountns | stdlib@v1.21.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.27.2 | true | Rancher v2.8 head | usr/bin/mountns | stdlib@v1.21.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.27.3 | true | Rancher v2.8 head | glibc | glibc@2.28-236.el8_9.12 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-calico-node:v3.27.3 | true | Rancher v2.8 head | glibc | glibc@2.28-236.el8_9.12 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-calico-node:v3.27.3 | true | Rancher v2.8 head | glibc-common | glibc-common@2.28-236.el8_9.12 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-calico-node:v3.27.3 | true | Rancher v2.8 head | glibc-common | glibc-common@2.28-236.el8_9.12 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-calico-node:v3.27.3 | true | Rancher v2.8 head | glibc-minimal-langpack | glibc-minimal-langpack@2.28-236.el8_9.12 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-calico-node:v3.27.3 | true | Rancher v2.8 head | glibc-minimal-langpack | glibc-minimal-langpack@2.28-236.el8_9.12 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-calico-node:v3.27.3 | true | Rancher v2.8 head | usr/bin/calico-node | golang.org/x/crypto@v0.19.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.27.3 | true | Rancher v2.8 head | usr/bin/calico-node | golang.org/x/net@v0.19.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.27.3 | true | Rancher v2.8 head | usr/bin/calico-node | k8s.io/kubernetes@v1.27.8 | CVE-2024-10220 | HIGH | affected | gobinary | |
rancher/mirrored-calico-node:v3.27.3 | true | Rancher v2.8 head | usr/bin/calico-node | k8s.io/kubernetes@v1.27.8 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/mirrored-calico-node:v3.27.3 | true | Rancher v2.8 head | usr/bin/calico-node | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.27.3 | true | Rancher v2.8 head | usr/bin/calico-node | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.27.3 | true | Rancher v2.8 head | usr/bin/calico-node | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.27.3 | true | Rancher v2.8 head | usr/bin/mountns | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.27.3 | true | Rancher v2.8 head | usr/bin/mountns | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.27.3 | true | Rancher v2.8 head | usr/bin/mountns | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.27.4 | true | Rancher v2.8 head | usr/bin/calico-node | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.27.4 | true | Rancher v2.8 head | usr/bin/calico-node | golang.org/x/net@v0.26.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.27.4 | true | Rancher v2.8 head | usr/bin/calico-node | k8s.io/kubernetes@v1.27.15 | CVE-2024-10220 | HIGH | affected | gobinary | |
rancher/mirrored-calico-node:v3.27.4 | true | Rancher v2.8 head | usr/bin/calico-node | k8s.io/kubernetes@v1.27.15 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/mirrored-calico-node:v3.27.4 | true | Rancher v2.8 head | usr/bin/calico-node | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.27.4 | true | Rancher v2.8 head | usr/bin/mountns | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.28.1 | true | Rancher v2.8 head | usr/bin/calico-node | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.28.1 | true | Rancher v2.8 head | usr/bin/calico-node | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.28.1 | true | Rancher v2.8 head | usr/bin/calico-node | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.28.1 | true | Rancher v2.8 head | usr/bin/mountns | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.28.2 | true | Rancher v2.8 head | usr/bin/calico-node | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-node:v3.28.2 | true | Rancher v2.8 head | usr/bin/calico-node | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.30.7 | true | Rancher v2.8 head | usr/local/bin/operator | golang.org/x/crypto@v0.6.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.30.7 | true | Rancher v2.8 head | usr/local/bin/operator | golang.org/x/net@v0.8.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-calico-operator:v1.30.7 | true | Rancher v2.8 head | usr/local/bin/operator | golang.org/x/net@v0.8.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.30.7 | true | Rancher v2.8 head | usr/local/bin/operator | stdlib@v1.21.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.30.7 | true | Rancher v2.8 head | usr/local/bin/operator | stdlib@v1.21.2 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-calico-operator:v1.30.7 | true | Rancher v2.8 head | usr/local/bin/operator | stdlib@v1.21.2 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.30.7 | true | Rancher v2.8 head | usr/local/bin/operator | stdlib@v1.21.2 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.30.7 | true | Rancher v2.8 head | usr/local/bin/operator | stdlib@v1.21.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.32.3 | true | Rancher v2.8 head | usr/local/bin/operator | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.32.3 | true | Rancher v2.8 head | usr/local/bin/operator | golang.org/x/net@v0.17.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.32.3 | true | Rancher v2.8 head | usr/local/bin/operator | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.32.3 | true | Rancher v2.8 head | usr/local/bin/operator | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.32.3 | true | Rancher v2.8 head | usr/local/bin/operator | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.32.5 | true | Rancher v2.8 head | usr/local/bin/operator | golang.org/x/crypto@v0.18.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.32.5 | true | Rancher v2.8 head | usr/local/bin/operator | golang.org/x/net@v0.17.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.32.5 | true | Rancher v2.8 head | usr/local/bin/operator | stdlib@v1.21.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.32.5 | true | Rancher v2.8 head | usr/local/bin/operator | stdlib@v1.21.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.32.5 | true | Rancher v2.8 head | usr/local/bin/operator | stdlib@v1.21.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.32.7 | true | Rancher v2.8 head | usr/local/bin/operator | golang.org/x/crypto@v0.18.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.32.7 | true | Rancher v2.8 head | usr/local/bin/operator | golang.org/x/net@v0.17.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.32.7 | true | Rancher v2.8 head | usr/local/bin/operator | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.32.7 | true | Rancher v2.8 head | usr/local/bin/operator | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.32.7 | true | Rancher v2.8 head | usr/local/bin/operator | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.34.3 | true | Rancher v2.8 head | usr/bin/operator | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.34.3 | true | Rancher v2.8 head | usr/bin/operator | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.34.3 | true | Rancher v2.8 head | usr/bin/operator | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.34.5 | true | Rancher v2.8 head | usr/bin/operator | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-operator:v1.34.5 | true | Rancher v2.8 head | usr/bin/operator | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-pod2daemon-flexvol:v3.26.1 | true | Rancher v2.8 head | usr/local/bin/flexvol | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-pod2daemon-flexvol:v3.26.1 | true | Rancher v2.8 head | usr/local/bin/flexvol | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-calico-pod2daemon-flexvol:v3.26.1 | true | Rancher v2.8 head | usr/local/bin/flexvol | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-pod2daemon-flexvol:v3.26.1 | true | Rancher v2.8 head | usr/local/bin/flexvol | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-pod2daemon-flexvol:v3.26.1 | true | Rancher v2.8 head | usr/local/bin/flexvol | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-pod2daemon-flexvol:v3.26.3 | true | Rancher v2.8 head | usr/local/bin/flexvol | stdlib@v1.21.1 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-pod2daemon-flexvol:v3.26.3 | true | Rancher v2.8 head | usr/local/bin/flexvol | stdlib@v1.21.1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-calico-pod2daemon-flexvol:v3.26.3 | true | Rancher v2.8 head | usr/local/bin/flexvol | stdlib@v1.21.1 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-pod2daemon-flexvol:v3.26.3 | true | Rancher v2.8 head | usr/local/bin/flexvol | stdlib@v1.21.1 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-pod2daemon-flexvol:v3.26.3 | true | Rancher v2.8 head | usr/local/bin/flexvol | stdlib@v1.21.1 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-pod2daemon-flexvol:v3.27.0 | true | Rancher v2.8 head | usr/local/bin/flexvol | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-pod2daemon-flexvol:v3.27.0 | true | Rancher v2.8 head | usr/local/bin/flexvol | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-pod2daemon-flexvol:v3.27.0 | true | Rancher v2.8 head | usr/local/bin/flexvol | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-pod2daemon-flexvol:v3.27.2 | true | Rancher v2.8 head | usr/local/bin/flexvol | stdlib@v1.21.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-pod2daemon-flexvol:v3.27.2 | true | Rancher v2.8 head | usr/local/bin/flexvol | stdlib@v1.21.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-pod2daemon-flexvol:v3.27.2 | true | Rancher v2.8 head | usr/local/bin/flexvol | stdlib@v1.21.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-pod2daemon-flexvol:v3.27.3 | true | Rancher v2.8 head | usr/local/bin/flexvol | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-pod2daemon-flexvol:v3.27.3 | true | Rancher v2.8 head | usr/local/bin/flexvol | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-pod2daemon-flexvol:v3.27.3 | true | Rancher v2.8 head | usr/local/bin/flexvol | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-pod2daemon-flexvol:v3.27.4 | true | Rancher v2.8 head | usr/local/bin/flexvol | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-pod2daemon-flexvol:v3.28.1 | true | Rancher v2.8 head | usr/local/bin/flexvol | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-typha:v3.26.3 | true | Rancher v2.8 head | code/calico-typha | google.golang.org/grpc@v1.55.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-calico-typha:v3.26.3 | true | Rancher v2.8 head | code/calico-typha | stdlib@v1.21.1 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-typha:v3.26.3 | true | Rancher v2.8 head | code/calico-typha | stdlib@v1.21.1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-calico-typha:v3.26.3 | true | Rancher v2.8 head | code/calico-typha | stdlib@v1.21.1 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-typha:v3.26.3 | true | Rancher v2.8 head | code/calico-typha | stdlib@v1.21.1 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-typha:v3.26.3 | true | Rancher v2.8 head | code/calico-typha | stdlib@v1.21.1 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-typha:v3.27.0 | true | Rancher v2.8 head | code/calico-typha | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-typha:v3.27.0 | true | Rancher v2.8 head | code/calico-typha | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-typha:v3.27.0 | true | Rancher v2.8 head | code/calico-typha | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-typha:v3.27.2 | true | Rancher v2.8 head | code/calico-typha | stdlib@v1.21.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-typha:v3.27.2 | true | Rancher v2.8 head | code/calico-typha | stdlib@v1.21.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-typha:v3.27.2 | true | Rancher v2.8 head | code/calico-typha | stdlib@v1.21.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-typha:v3.27.3 | true | Rancher v2.8 head | code/calico-typha | stdlib@v1.21.8 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-typha:v3.27.3 | true | Rancher v2.8 head | code/calico-typha | stdlib@v1.21.8 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-typha:v3.27.3 | true | Rancher v2.8 head | code/calico-typha | stdlib@v1.21.8 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-calico-typha:v3.28.1 | true | Rancher v2.8 head | usr/bin/calico-typha | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-certgen:v0.1.12 | true | Rancher v2.8 head | usr/bin/cilium-certgen | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-certgen:v0.1.12 | true | Rancher v2.8 head | usr/bin/cilium-certgen | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-certgen:v0.1.12 | true | Rancher v2.8 head | usr/bin/cilium-certgen | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-certgen:v0.1.12 | true | Rancher v2.8 head | usr/bin/cilium-certgen | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-certgen:v0.1.12 | true | Rancher v2.8 head | usr/bin/cilium-certgen | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-certgen:v0.2.0 | true | Rancher v2.8 head | usr/bin/cilium-certgen | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-certgen:v0.2.0 | true | Rancher v2.8 head | usr/bin/cilium-certgen | golang.org/x/net@v0.24.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-certgen:v0.2.0 | true | Rancher v2.8 head | usr/bin/cilium-certgen | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.0 | true | Rancher v2.8 head | cni/loopback | stdlib@v1.22.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.0 | true | Rancher v2.8 head | cni/loopback | stdlib@v1.22.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.0 | true | Rancher v2.8 head | opt/cni/bin/cilium-cni | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.0 | true | Rancher v2.8 head | usr/bin/cilium-agent | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.0 | true | Rancher v2.8 head | usr/bin/cilium-bugtool | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.0 | true | Rancher v2.8 head | usr/bin/cilium-dbg | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.0 | true | Rancher v2.8 head | usr/bin/cilium-health | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.0 | true | Rancher v2.8 head | usr/bin/cilium-health-responder | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.0 | true | Rancher v2.8 head | usr/bin/cilium-mount | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.0 | true | Rancher v2.8 head | usr/bin/cilium-sysctlfix | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.0 | true | Rancher v2.8 head | usr/bin/gops | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.0 | true | Rancher v2.8 head | usr/bin/hubble | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.1 | true | Rancher v2.8 head | cni/loopback | stdlib@v1.22.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.1 | true | Rancher v2.8 head | cni/loopback | stdlib@v1.22.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.1 | true | Rancher v2.8 head | opt/cni/bin/cilium-cni | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.1 | true | Rancher v2.8 head | usr/bin/cilium-agent | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.1 | true | Rancher v2.8 head | usr/bin/cilium-bugtool | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.1 | true | Rancher v2.8 head | usr/bin/cilium-dbg | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.1 | true | Rancher v2.8 head | usr/bin/cilium-health | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.1 | true | Rancher v2.8 head | usr/bin/cilium-health-responder | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.1 | true | Rancher v2.8 head | usr/bin/cilium-mount | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.1 | true | Rancher v2.8 head | usr/bin/cilium-sysctlfix | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.1 | true | Rancher v2.8 head | usr/bin/gops | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.1 | true | Rancher v2.8 head | usr/bin/hubble | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.2 | true | Rancher v2.8 head | cni/loopback | stdlib@v1.22.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-cilium:v1.16.2 | true | Rancher v2.8 head | cni/loopback | stdlib@v1.22.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.0 | true | Rancher v2.8 head | bin/gops | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.0 | true | Rancher v2.8 head | usr/bin/clustermesh-apiserver | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.0 | true | Rancher v2.8 head | usr/bin/etcd | stdlib@v1.21.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.0 | true | Rancher v2.8 head | usr/bin/etcd | stdlib@v1.21.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.1 | true | Rancher v2.8 head | bin/gops | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.1 | true | Rancher v2.8 head | usr/bin/clustermesh-apiserver | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.1 | true | Rancher v2.8 head | usr/bin/etcd | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-relay:v1.16.0 | true | Rancher v2.8 head | bin/gops | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-relay:v1.16.0 | true | Rancher v2.8 head | bin/grpc_health_probe | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-relay:v1.16.0 | true | Rancher v2.8 head | usr/bin/hubble-relay | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-relay:v1.16.1 | true | Rancher v2.8 head | bin/gops | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-relay:v1.16.1 | true | Rancher v2.8 head | bin/grpc_health_probe | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-relay:v1.16.1 | true | Rancher v2.8 head | usr/bin/hubble-relay | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-relay:v1.16.2 | true | Rancher v2.8 head | bin/grpc_health_probe | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-ui-backend:v0.13.1 | true | Rancher v2.8 head | usr/bin/backend | github.com/cilium/cilium@v1.15.5 | CVE-2024-37307 | HIGH | affected | gobinary | |
rancher/mirrored-cilium-hubble-ui-backend:v0.13.1 | true | Rancher v2.8 head | usr/bin/backend | golang.org/x/net@v0.25.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-ui-backend:v0.13.1 | true | Rancher v2.8 head | usr/bin/backend | stdlib@v1.22.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-hubble-ui-backend:v0.13.1 | true | Rancher v2.8 head | usr/bin/backend | stdlib@v1.22.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-aws:v1.16.0 | true | Rancher v2.8 head | bin/gops | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-aws:v1.16.0 | true | Rancher v2.8 head | usr/bin/cilium-operator-aws | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-aws:v1.16.1 | true | Rancher v2.8 head | bin/gops | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-aws:v1.16.1 | true | Rancher v2.8 head | usr/bin/cilium-operator-aws | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-azure:v1.15.5 | true | Rancher v2.8 head | bin/gops | stdlib@v1.21.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-azure:v1.15.5 | true | Rancher v2.8 head | bin/gops | stdlib@v1.21.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-azure:v1.15.5 | true | Rancher v2.8 head | usr/bin/cilium-operator-azure | stdlib@v1.21.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-azure:v1.15.5 | true | Rancher v2.8 head | usr/bin/cilium-operator-azure | stdlib@v1.21.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-azure:v1.16.0 | true | Rancher v2.8 head | bin/gops | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-azure:v1.16.0 | true | Rancher v2.8 head | usr/bin/cilium-operator-azure | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-azure:v1.16.1 | true | Rancher v2.8 head | bin/gops | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-azure:v1.16.1 | true | Rancher v2.8 head | usr/bin/cilium-operator-azure | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-generic:v1.16.0 | true | Rancher v2.8 head | bin/gops | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-generic:v1.16.0 | true | Rancher v2.8 head | usr/bin/cilium-operator-generic | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-generic:v1.16.1 | true | Rancher v2.8 head | bin/gops | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cilium-operator-generic:v1.16.1 | true | Rancher v2.8 head | usr/bin/cilium-operator-generic | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher v2.8 head | bin/vsphere-cloud-controller-manager | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.41.1 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher v2.8 head | bin/vsphere-cloud-controller-manager | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.41.1 | CVE-2023-45142 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher v2.8 head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher v2.8 head | bin/vsphere-cloud-controller-manager | golang.org/x/net@v0.10.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher v2.8 head | bin/vsphere-cloud-controller-manager | golang.org/x/net@v0.10.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher v2.8 head | bin/vsphere-cloud-controller-manager | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher v2.8 head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher v2.8 head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher v2.8 head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher v2.8 head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher v2.8 head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher v2.8 head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher v2.8 head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher v2.8 head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher v2.8 head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher v2.8 head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher v2.8 head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher v2.8 head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.27.0 | true | Rancher v2.8 head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher v2.8 head | bin/vsphere-cloud-controller-manager | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.41.1 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher v2.8 head | bin/vsphere-cloud-controller-manager | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.41.1 | CVE-2023-45142 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher v2.8 head | bin/vsphere-cloud-controller-manager | golang.org/x/crypto@v0.11.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher v2.8 head | bin/vsphere-cloud-controller-manager | golang.org/x/net@v0.13.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher v2.8 head | bin/vsphere-cloud-controller-manager | golang.org/x/net@v0.13.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher v2.8 head | bin/vsphere-cloud-controller-manager | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher v2.8 head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher v2.8 head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.7 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher v2.8 head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.7 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher v2.8 head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-cpi-release-manager:v1.28.0 | true | Rancher v2.8 head | bin/vsphere-cloud-controller-manager | stdlib@v1.20.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.8 head | curl | curl@8.1.2-7.ph4 | CVE-2024-2398 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.8 head | curl | curl@8.1.2-7.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.8 head | curl-libs | curl-libs@8.1.2-7.ph4 | CVE-2024-2398 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.8 head | curl-libs | curl-libs@8.1.2-7.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.8 head | expat | expat@2.4.9-2.ph4 | CVE-2024-45491 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.8 head | expat | expat@2.4.9-2.ph4 | CVE-2024-45492 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.8 head | expat | expat@2.4.9-2.ph4 | CVE-2024-45490 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.8 head | expat-libs | expat-libs@2.4.9-2.ph4 | CVE-2024-45491 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.8 head | expat-libs | expat-libs@2.4.9-2.ph4 | CVE-2024-45492 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.8 head | expat-libs | expat-libs@2.4.9-2.ph4 | CVE-2024-45490 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.8 head | glib | glib@2.68.4-2.ph4 | CVE-2024-52533 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.8 head | krb5 | krb5@1.17-10.ph4 | CVE-2024-37371 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.8 head | krb5 | krb5@1.17-10.ph4 | CVE-2024-37370 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.8 head | libtasn1 | libtasn1@4.14-2.ph4 | CVE-2024-12133 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.8 head | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2024-56171 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.8 head | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2025-24928 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.8 head | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2025-27113 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.8 head | nss-libs | nss-libs@3.72-4.ph4 | CVE-2024-0743 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.8 head | openssl | openssl@3.0.13-2.ph4 | CVE-2024-5535 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.8 head | openssl | openssl@3.0.13-2.ph4 | CVE-2024-2511 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.8 head | openssl | openssl@3.0.13-2.ph4 | CVE-2024-6119 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.8 head | python3 | python3@3.10.11-8.ph4 | CVE-2023-6597 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.8 head | python3 | python3@3.10.11-8.ph4 | CVE-2024-6232 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.8 head | python3 | python3@3.10.11-8.ph4 | cve-2024-7592 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.8 head | python3-libs | python3-libs@3.10.11-8.ph4 | CVE-2023-6597 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.8 head | python3-libs | python3-libs@3.10.11-8.ph4 | CVE-2024-6232 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.8 head | python3-libs | python3-libs@3.10.11-8.ph4 | cve-2024-7592 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.8 head | usr/bin/vsphere-csi | golang.org/x/net@v0.19.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.8 head | usr/bin/vsphere-csi | k8s.io/kubernetes@v1.27.10 | CVE-2024-10220 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.8 head | usr/bin/vsphere-csi | k8s.io/kubernetes@v1.27.10 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-driver:v3.3.0 | true | Rancher v2.8 head | usr/bin/vsphere-csi | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.8 head | curl | curl@8.1.2-7.ph4 | CVE-2024-2398 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.8 head | curl | curl@8.1.2-7.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.8 head | curl-libs | curl-libs@8.1.2-7.ph4 | CVE-2024-2398 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.8 head | curl-libs | curl-libs@8.1.2-7.ph4 | CVE-2024-6197 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.8 head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-45491 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.8 head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-45492 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.8 head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2023-52425 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.8 head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-28757 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.8 head | expat-libs | expat-libs@2.2.9-11.ph4 | CVE-2024-45490 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.8 head | glibc | glibc@2.32-15.ph4 | CVE-2024-2961 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.8 head | krb5 | krb5@1.17-10.ph4 | CVE-2024-37371 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.8 head | krb5 | krb5@1.17-10.ph4 | CVE-2024-37370 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.8 head | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2024-56171 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.8 head | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2025-24928 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.8 head | libxml2 | libxml2@2.9.12-13.ph4 | CVE-2025-27113 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.8 head | nss-libs | nss-libs@3.72-4.ph4 | CVE-2024-0743 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.8 head | openssl | openssl@3.0.13-2.ph4 | CVE-2024-5535 | CRITICAL | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.8 head | openssl | openssl@3.0.13-2.ph4 | CVE-2024-2511 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.8 head | openssl | openssl@3.0.13-2.ph4 | CVE-2024-6119 | HIGH | affected | photon | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.8 head | usr/bin/vsphere-syncer | golang.org/x/net@v0.19.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.8 head | usr/bin/vsphere-syncer | k8s.io/kubernetes@v1.27.10 | CVE-2024-10220 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.8 head | usr/bin/vsphere-syncer | k8s.io/kubernetes@v1.27.10 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/mirrored-cloud-provider-vsphere-csi-release-syncer:v3.3.0 | true | Rancher v2.8 head | usr/bin/vsphere-syncer | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cluster-api-controller:v1.4.4 | true | Rancher v2.8 head | manager | golang.org/x/net@v0.8.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-cluster-api-controller:v1.4.4 | true | Rancher v2.8 head | manager | stdlib@v1.19.6 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cluster-api-controller:v1.4.4 | true | Rancher v2.8 head | manager | stdlib@v1.19.6 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cluster-api-controller:v1.4.4 | true | Rancher v2.8 head | manager | stdlib@v1.19.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cluster-api-controller:v1.4.4 | true | Rancher v2.8 head | manager | stdlib@v1.19.6 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-cluster-api-controller:v1.4.4 | true | Rancher v2.8 head | manager | stdlib@v1.19.6 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cluster-api-controller:v1.4.4 | true | Rancher v2.8 head | manager | stdlib@v1.19.6 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-cluster-api-controller:v1.4.4 | true | Rancher v2.8 head | manager | stdlib@v1.19.6 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-cluster-api-controller:v1.4.4 | true | Rancher v2.8 head | manager | stdlib@v1.19.6 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-cluster-api-controller:v1.4.4 | true | Rancher v2.8 head | manager | stdlib@v1.19.6 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-cluster-api-controller:v1.4.4 | true | Rancher v2.8 head | manager | stdlib@v1.19.6 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-cluster-api-controller:v1.4.4 | true | Rancher v2.8 head | manager | stdlib@v1.19.6 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cluster-api-controller:v1.4.4 | true | Rancher v2.8 head | manager | stdlib@v1.19.6 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-cluster-api-controller:v1.4.4 | true | Rancher v2.8 head | manager | stdlib@v1.19.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cluster-api-controller:v1.4.4 | true | Rancher v2.8 head | manager | stdlib@v1.19.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cluster-proportional-autoscaler:v1.8.9 | true | Rancher v2.8 head | cluster-proportional-autoscaler | golang.org/x/net@v0.8.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-cluster-proportional-autoscaler:v1.8.9 | true | Rancher v2.8 head | cluster-proportional-autoscaler | golang.org/x/net@v0.8.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cluster-proportional-autoscaler:v1.8.9 | true | Rancher v2.8 head | cluster-proportional-autoscaler | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cluster-proportional-autoscaler:v1.8.9 | true | Rancher v2.8 head | cluster-proportional-autoscaler | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-cluster-proportional-autoscaler:v1.8.9 | true | Rancher v2.8 head | cluster-proportional-autoscaler | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cluster-proportional-autoscaler:v1.8.9 | true | Rancher v2.8 head | cluster-proportional-autoscaler | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-cluster-proportional-autoscaler:v1.8.9 | true | Rancher v2.8 head | cluster-proportional-autoscaler | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.8 head | coredns | golang.org/x/net@v0.4.0 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.8 head | coredns | google.golang.org/grpc@v1.52.3 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.8 head | coredns | stdlib@v1.20 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.8 head | coredns | stdlib@v1.20 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.8 head | coredns | stdlib@v1.20 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.8 head | coredns | stdlib@v1.20 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.8 head | coredns | stdlib@v1.20 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.8 head | coredns | stdlib@v1.20 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.8 head | coredns | stdlib@v1.20 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.8 head | coredns | stdlib@v1.20 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.8 head | coredns | stdlib@v1.20 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.8 head | coredns | stdlib@v1.20 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.8 head | coredns | stdlib@v1.20 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.8 head | coredns | stdlib@v1.20 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.8 head | coredns | stdlib@v1.20 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.8 head | coredns | stdlib@v1.20 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.8 head | coredns | stdlib@v1.20 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.8 head | coredns | stdlib@v1.20 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.8 head | coredns | stdlib@v1.20 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.11.3 | true | Rancher v2.8 head | coredns | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.9.4 | true | Rancher v2.8 head | coredns | golang.org/x/net@v0.0.0-20220722155237-a158d28d115b | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.9.4 | true | Rancher v2.8 head | coredns | google.golang.org/grpc@v1.49.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.9.4 | true | Rancher v2.8 head | coredns | stdlib@v1.19.1 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.9.4 | true | Rancher v2.8 head | coredns | stdlib@v1.19.1 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.9.4 | true | Rancher v2.8 head | coredns | stdlib@v1.19.1 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.9.4 | true | Rancher v2.8 head | coredns | stdlib@v1.19.1 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.9.4 | true | Rancher v2.8 head | coredns | stdlib@v1.19.1 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.9.4 | true | Rancher v2.8 head | coredns | stdlib@v1.19.1 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.9.4 | true | Rancher v2.8 head | coredns | stdlib@v1.19.1 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.9.4 | true | Rancher v2.8 head | coredns | stdlib@v1.19.1 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.9.4 | true | Rancher v2.8 head | coredns | stdlib@v1.19.1 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.9.4 | true | Rancher v2.8 head | coredns | stdlib@v1.19.1 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.9.4 | true | Rancher v2.8 head | coredns | stdlib@v1.19.1 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.9.4 | true | Rancher v2.8 head | coredns | stdlib@v1.19.1 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.9.4 | true | Rancher v2.8 head | coredns | stdlib@v1.19.1 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.9.4 | true | Rancher v2.8 head | coredns | stdlib@v1.19.1 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.9.4 | true | Rancher v2.8 head | coredns | stdlib@v1.19.1 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.9.4 | true | Rancher v2.8 head | coredns | stdlib@v1.19.1 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.9.4 | true | Rancher v2.8 head | coredns | stdlib@v1.19.1 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.9.4 | true | Rancher v2.8 head | coredns | stdlib@v1.19.1 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.9.4 | true | Rancher v2.8 head | coredns | stdlib@v1.19.1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.9.4 | true | Rancher v2.8 head | coredns | stdlib@v1.19.1 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.9.4 | true | Rancher v2.8 head | coredns | stdlib@v1.19.1 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-coredns-coredns:1.9.4 | true | Rancher v2.8 head | coredns | stdlib@v1.19.1 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coredns-coredns:1.9.4 | true | Rancher v2.8 head | coredns | stdlib@v1.19.1 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.8 head | usr/local/bin/etcd | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.25.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.8 head | usr/local/bin/etcd | stdlib@v1.20.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.8 head | usr/local/bin/etcd | stdlib@v1.20.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.8 head | usr/local/bin/etcd | stdlib@v1.20.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.8 head | usr/local/bin/etcd | stdlib@v1.20.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.20.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.20.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.20.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.20.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.8 head | usr/local/bin/etcdutl | stdlib@v1.20.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.8 head | usr/local/bin/etcdutl | stdlib@v1.20.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.8 head | usr/local/bin/etcdutl | stdlib@v1.20.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.8 head | usr/local/bin/etcdutl | stdlib@v1.20.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.9 | true | Rancher v2.8 head | usr/local/bin/etcd | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.25.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.9 | true | Rancher v2.8 head | usr/local/bin/etcd | golang.org/x/net@v0.7.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.9 | true | Rancher v2.8 head | usr/local/bin/etcd | google.golang.org/grpc@v1.41.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.9 | true | Rancher v2.8 head | usr/local/bin/etcd | stdlib@v1.19.9 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.9 | true | Rancher v2.8 head | usr/local/bin/etcd | stdlib@v1.19.9 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.9 | true | Rancher v2.8 head | usr/local/bin/etcd | stdlib@v1.19.9 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.9 | true | Rancher v2.8 head | usr/local/bin/etcd | stdlib@v1.19.9 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.9 | true | Rancher v2.8 head | usr/local/bin/etcd | stdlib@v1.19.9 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.9 | true | Rancher v2.8 head | usr/local/bin/etcd | stdlib@v1.19.9 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.9 | true | Rancher v2.8 head | usr/local/bin/etcd | stdlib@v1.19.9 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.9 | true | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.19.9 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.9 | true | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.19.9 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.9 | true | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.19.9 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.9 | true | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.19.9 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.9 | true | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.19.9 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.9 | true | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.19.9 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.9 | true | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.19.9 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.9 | true | Rancher v2.8 head | usr/local/bin/etcdutl | stdlib@v1.19.9 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.9 | true | Rancher v2.8 head | usr/local/bin/etcdutl | stdlib@v1.19.9 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.9 | true | Rancher v2.8 head | usr/local/bin/etcdutl | stdlib@v1.19.9 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.9 | true | Rancher v2.8 head | usr/local/bin/etcdutl | stdlib@v1.19.9 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.9 | true | Rancher v2.8 head | usr/local/bin/etcdutl | stdlib@v1.19.9 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.9 | true | Rancher v2.8 head | usr/local/bin/etcdutl | stdlib@v1.19.9 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-coreos-etcd:v3.5.9 | true | Rancher v2.8 head | usr/local/bin/etcdutl | stdlib@v1.19.9 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-curlimages-curl:7.83.1 | true | Rancher v2.8 head | libcrypto1.1 | libcrypto1.1@1.1.1n-r0 | CVE-2022-4450 | HIGH | affected | alpine | |
rancher/mirrored-curlimages-curl:7.83.1 | true | Rancher v2.8 head | libcrypto1.1 | libcrypto1.1@1.1.1n-r0 | CVE-2023-0215 | HIGH | affected | alpine | |
rancher/mirrored-curlimages-curl:7.83.1 | true | Rancher v2.8 head | libcrypto1.1 | libcrypto1.1@1.1.1n-r0 | CVE-2023-0286 | HIGH | affected | alpine | |
rancher/mirrored-curlimages-curl:7.83.1 | true | Rancher v2.8 head | libcrypto1.1 | libcrypto1.1@1.1.1n-r0 | CVE-2023-0464 | HIGH | affected | alpine | |
rancher/mirrored-curlimages-curl:7.83.1 | true | Rancher v2.8 head | libssl1.1 | libssl1.1@1.1.1n-r0 | CVE-2022-4450 | HIGH | affected | alpine | |
rancher/mirrored-curlimages-curl:7.83.1 | true | Rancher v2.8 head | libssl1.1 | libssl1.1@1.1.1n-r0 | CVE-2023-0215 | HIGH | affected | alpine | |
rancher/mirrored-curlimages-curl:7.83.1 | true | Rancher v2.8 head | libssl1.1 | libssl1.1@1.1.1n-r0 | CVE-2023-0286 | HIGH | affected | alpine | |
rancher/mirrored-curlimages-curl:7.83.1 | true | Rancher v2.8 head | libssl1.1 | libssl1.1@1.1.1n-r0 | CVE-2023-0464 | HIGH | affected | alpine | |
rancher/mirrored-curlimages-curl:7.83.1 | true | Rancher v2.8 head | nghttp2-dev | nghttp2-dev@1.46.0-r0 | CVE-2023-35945 | HIGH | affected | alpine | |
rancher/mirrored-curlimages-curl:7.83.1 | true | Rancher v2.8 head | nghttp2-dev | nghttp2-dev@1.46.0-r0 | CVE-2023-44487 | HIGH | affected | alpine | |
rancher/mirrored-curlimages-curl:7.83.1 | true | Rancher v2.8 head | nghttp2-libs | nghttp2-libs@1.46.0-r0 | CVE-2023-35945 | HIGH | affected | alpine | |
rancher/mirrored-curlimages-curl:7.83.1 | true | Rancher v2.8 head | nghttp2-libs | nghttp2-libs@1.46.0-r0 | CVE-2023-44487 | HIGH | affected | alpine | |
rancher/mirrored-curlimages-curl:7.83.1 | true | Rancher v2.8 head | zlib | zlib@1.2.12-r1 | CVE-2022-37434 | CRITICAL | affected | alpine | |
rancher/mirrored-curlimages-curl:7.85.0 | true | Rancher v2.8 head | libcrypto1.1 | libcrypto1.1@1.1.1q-r0 | CVE-2022-4450 | HIGH | affected | alpine | |
rancher/mirrored-curlimages-curl:7.85.0 | true | Rancher v2.8 head | libcrypto1.1 | libcrypto1.1@1.1.1q-r0 | CVE-2023-0215 | HIGH | affected | alpine | |
rancher/mirrored-curlimages-curl:7.85.0 | true | Rancher v2.8 head | libcrypto1.1 | libcrypto1.1@1.1.1q-r0 | CVE-2023-0286 | HIGH | affected | alpine | |
rancher/mirrored-curlimages-curl:7.85.0 | true | Rancher v2.8 head | libcrypto1.1 | libcrypto1.1@1.1.1q-r0 | CVE-2023-0464 | HIGH | affected | alpine | |
rancher/mirrored-curlimages-curl:7.85.0 | true | Rancher v2.8 head | libssl1.1 | libssl1.1@1.1.1q-r0 | CVE-2022-4450 | HIGH | affected | alpine | |
rancher/mirrored-curlimages-curl:7.85.0 | true | Rancher v2.8 head | libssl1.1 | libssl1.1@1.1.1q-r0 | CVE-2023-0215 | HIGH | affected | alpine | |
rancher/mirrored-curlimages-curl:7.85.0 | true | Rancher v2.8 head | libssl1.1 | libssl1.1@1.1.1q-r0 | CVE-2023-0286 | HIGH | affected | alpine | |
rancher/mirrored-curlimages-curl:7.85.0 | true | Rancher v2.8 head | libssl1.1 | libssl1.1@1.1.1q-r0 | CVE-2023-0464 | HIGH | affected | alpine | |
rancher/mirrored-curlimages-curl:7.85.0 | true | Rancher v2.8 head | nghttp2-dev | nghttp2-dev@1.46.0-r0 | CVE-2023-35945 | HIGH | affected | alpine | |
rancher/mirrored-curlimages-curl:7.85.0 | true | Rancher v2.8 head | nghttp2-dev | nghttp2-dev@1.46.0-r0 | CVE-2023-44487 | HIGH | affected | alpine | |
rancher/mirrored-curlimages-curl:7.85.0 | true | Rancher v2.8 head | nghttp2-libs | nghttp2-libs@1.46.0-r0 | CVE-2023-35945 | HIGH | affected | alpine | |
rancher/mirrored-curlimages-curl:7.85.0 | true | Rancher v2.8 head | nghttp2-libs | nghttp2-libs@1.46.0-r0 | CVE-2023-44487 | HIGH | affected | alpine | |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | busybox | busybox@1.36.1-r0 | CVE-2022-48174 | CRITICAL | affected | alpine | |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | busybox-binsh | busybox-binsh@1.36.1-r0 | CVE-2022-48174 | CRITICAL | affected | alpine | |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | libcrypto3 | libcrypto3@3.1.1-r1 | CVE-2023-5363 | HIGH | affected | alpine | |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | libssl3 | libssl3@3.1.1-r1 | CVE-2023-5363 | HIGH | affected | alpine | |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | ssl_client | ssl_client@1.36.1-r0 | CVE-2022-48174 | CRITICAL | affected | alpine | |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | usr/local/bin/dex | golang.org/x/net@v0.11.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | usr/local/bin/dex | google.golang.org/grpc@v1.56.1 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | usr/local/bin/dex | stdlib@v1.20.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | usr/local/bin/dex | stdlib@v1.20.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | usr/local/bin/dex | stdlib@v1.20.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | usr/local/bin/dex | stdlib@v1.20.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | usr/local/bin/dex | stdlib@v1.20.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | usr/local/bin/dex | stdlib@v1.20.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | usr/local/bin/docker-entrypoint | stdlib@v1.20.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | usr/local/bin/docker-entrypoint | stdlib@v1.20.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | usr/local/bin/docker-entrypoint | stdlib@v1.20.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | usr/local/bin/docker-entrypoint | stdlib@v1.20.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | usr/local/bin/docker-entrypoint | stdlib@v1.20.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | usr/local/bin/docker-entrypoint | stdlib@v1.20.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | usr/local/bin/gomplate | github.com/go-git/go-git/v5@v5.4.2 | CVE-2023-49569 | CRITICAL | affected | gobinary | |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | usr/local/bin/gomplate | github.com/go-git/go-git/v5@v5.4.2 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | usr/local/bin/gomplate | github.com/go-git/go-git/v5@v5.4.2 | CVE-2023-49568 | HIGH | affected | gobinary | |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | usr/local/bin/gomplate | github.com/go-git/go-git/v5@v5.4.2 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | usr/local/bin/gomplate | stdlib@v1.19.6 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | usr/local/bin/gomplate | stdlib@v1.19.6 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | usr/local/bin/gomplate | stdlib@v1.19.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | usr/local/bin/gomplate | stdlib@v1.19.6 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | usr/local/bin/gomplate | stdlib@v1.19.6 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | usr/local/bin/gomplate | stdlib@v1.19.6 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | usr/local/bin/gomplate | stdlib@v1.19.6 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | usr/local/bin/gomplate | stdlib@v1.19.6 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | usr/local/bin/gomplate | stdlib@v1.19.6 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | usr/local/bin/gomplate | stdlib@v1.19.6 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | usr/local/bin/gomplate | stdlib@v1.19.6 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | usr/local/bin/gomplate | stdlib@v1.19.6 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | usr/local/bin/gomplate | stdlib@v1.19.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | usr/local/bin/gomplate | stdlib@v1.19.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-epinio-epinio-server:v1.10.0 | true | Rancher v2.8 head | epinio | github.com/cloudflare/circl@v1.3.3 | GHSA-9763-4f94-gfch | HIGH | affected | gobinary | |
rancher/mirrored-epinio-epinio-server:v1.10.0 | true | Rancher v2.8 head | epinio | github.com/docker/docker@v23.0.1+incompatible | CVE-2024-41110 | CRITICAL | affected | gobinary | |
rancher/mirrored-epinio-epinio-server:v1.10.0 | true | Rancher v2.8 head | epinio | github.com/docker/docker@v23.0.1+incompatible | CVE-2023-28840 | HIGH | affected | gobinary | |
rancher/mirrored-epinio-epinio-server:v1.10.0 | true | Rancher v2.8 head | epinio | github.com/go-git/go-git@v4.7.0+incompatible | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/mirrored-epinio-epinio-server:v1.10.0 | true | Rancher v2.8 head | epinio | github.com/go-git/go-git/v5@v5.7.0 | CVE-2023-49569 | CRITICAL | affected | gobinary | |
rancher/mirrored-epinio-epinio-server:v1.10.0 | true | Rancher v2.8 head | epinio | github.com/go-git/go-git/v5@v5.7.0 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-epinio-epinio-server:v1.10.0 | true | Rancher v2.8 head | epinio | github.com/go-git/go-git/v5@v5.7.0 | CVE-2023-49568 | HIGH | affected | gobinary | |
rancher/mirrored-epinio-epinio-server:v1.10.0 | true | Rancher v2.8 head | epinio | github.com/go-git/go-git/v5@v5.7.0 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/mirrored-epinio-epinio-server:v1.10.0 | true | Rancher v2.8 head | epinio | golang.org/x/crypto@v0.11.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-epinio-epinio-server:v1.10.0 | true | Rancher v2.8 head | epinio | golang.org/x/net@v0.12.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-epinio-epinio-server:v1.10.0 | true | Rancher v2.8 head | epinio | golang.org/x/net@v0.12.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-epinio-epinio-server:v1.10.0 | true | Rancher v2.8 head | epinio | google.golang.org/grpc@v1.55.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-epinio-epinio-server:v1.10.0 | true | Rancher v2.8 head | epinio | gopkg.in/src-d/go-git.v4@v4.13.1 | CVE-2023-49569 | CRITICAL | affected | gobinary | |
rancher/mirrored-epinio-epinio-server:v1.10.0 | true | Rancher v2.8 head | epinio | gopkg.in/src-d/go-git.v4@v4.13.1 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-epinio-epinio-server:v1.10.0 | true | Rancher v2.8 head | epinio | gopkg.in/src-d/go-git.v4@v4.13.1 | CVE-2023-49568 | HIGH | affected | gobinary | |
rancher/mirrored-epinio-epinio-server:v1.10.0 | true | Rancher v2.8 head | epinio | gopkg.in/src-d/go-git.v4@v4.13.1 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/mirrored-epinio-epinio-server:v1.10.0 | true | Rancher v2.8 head | epinio | helm.sh/helm/v3@v3.12.2 | CVE-2024-26147 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-epinio-epinio-server:v1.10.0 | true | Rancher v2.8 head | epinio | stdlib@v1.20.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-epinio-epinio-server:v1.10.0 | true | Rancher v2.8 head | epinio | stdlib@v1.20.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-epinio-epinio-server:v1.10.0 | true | Rancher v2.8 head | epinio | stdlib@v1.20.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-epinio-epinio-server:v1.10.0 | true | Rancher v2.8 head | epinio | stdlib@v1.20.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-epinio-epinio-server:v1.10.0 | true | Rancher v2.8 head | epinio | stdlib@v1.20.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-epinio-epinio-server:v1.10.0 | true | Rancher v2.8 head | epinio | stdlib@v1.20.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-epinio-epinio-ui:v1.10.0-0.0.1 | true | Rancher v2.8 head | glibc | glibc@2.31-150300.52.2 | SUSE-SU-2024:1375-1 | HIGH | affected | sles | |
rancher/mirrored-epinio-epinio-ui:v1.10.0-0.0.1 | true | Rancher v2.8 head | glibc | glibc@2.31-150300.52.2 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
rancher/mirrored-epinio-epinio-ui:v1.10.0-0.0.1 | true | Rancher v2.8 head | libgcc_s1 | libgcc_s1@12.3.0+git1204-150000.1.10.1 | SUSE-SU-2023:3661-1 | HIGH | affected | sles | |
rancher/mirrored-epinio-epinio-ui:v1.10.0-0.0.1 | true | Rancher v2.8 head | libgcc_s1 | libgcc_s1@12.3.0+git1204-150000.1.10.1 | SUSE-SU-2023:4162-1 | HIGH | affected | sles | |
rancher/mirrored-epinio-epinio-ui:v1.10.0-0.0.1 | true | Rancher v2.8 head | libgcc_s1 | libgcc_s1@12.3.0+git1204-150000.1.10.1 | SUSE-SU-2023:4458-1 | HIGH | affected | sles | |
rancher/mirrored-epinio-epinio-ui:v1.10.0-0.0.1 | true | Rancher v2.8 head | libstdc++6 | libstdc++6@12.3.0+git1204-150000.1.10.1 | SUSE-SU-2023:3661-1 | HIGH | affected | sles | |
rancher/mirrored-epinio-epinio-ui:v1.10.0-0.0.1 | true | Rancher v2.8 head | libstdc++6 | libstdc++6@12.3.0+git1204-150000.1.10.1 | SUSE-SU-2023:4162-1 | HIGH | affected | sles | |
rancher/mirrored-epinio-epinio-ui:v1.10.0-0.0.1 | true | Rancher v2.8 head | libstdc++6 | libstdc++6@12.3.0+git1204-150000.1.10.1 | SUSE-SU-2023:4458-1 | HIGH | affected | sles | |
rancher/mirrored-epinio-epinio-ui:v1.10.0-0.0.1 | true | Rancher v2.8 head | epinio-ui | github.com/labstack/echo/v4@v4.7.2 | CVE-2022-40083 | CRITICAL | affected | gobinary | |
rancher/mirrored-epinio-epinio-ui:v1.10.0-0.0.1 | true | Rancher v2.8 head | epinio-ui | golang.org/x/crypto@v0.0.0-20220511200225-c6db032c6c88 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-epinio-epinio-ui:v1.10.0-0.0.1 | true | Rancher v2.8 head | epinio-ui | golang.org/x/net@v0.0.0-20220826154423-83b083e8dc8b | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-epinio-epinio-ui:v1.10.0-0.0.1 | true | Rancher v2.8 head | epinio-ui | golang.org/x/net@v0.0.0-20220826154423-83b083e8dc8b | CVE-2022-41721 | HIGH | affected | gobinary | |
rancher/mirrored-epinio-epinio-ui:v1.10.0-0.0.1 | true | Rancher v2.8 head | epinio-ui | golang.org/x/net@v0.0.0-20220826154423-83b083e8dc8b | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-epinio-epinio-ui:v1.10.0-0.0.1 | true | Rancher v2.8 head | epinio-ui | golang.org/x/net@v0.0.0-20220826154423-83b083e8dc8b | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-epinio-epinio-ui:v1.10.0-0.0.1 | true | Rancher v2.8 head | epinio-ui | golang.org/x/net@v0.0.0-20220826154423-83b083e8dc8b | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-epinio-epinio-ui:v1.10.0-0.0.1 | true | Rancher v2.8 head | epinio-ui | golang.org/x/text@v0.3.7 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/mirrored-epinio-epinio-ui:v1.10.0-0.0.1 | true | Rancher v2.8 head | epinio-ui | stdlib@v1.20 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-epinio-epinio-ui:v1.10.0-0.0.1 | true | Rancher v2.8 head | epinio-ui | stdlib@v1.20 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-epinio-epinio-ui:v1.10.0-0.0.1 | true | Rancher v2.8 head | epinio-ui | stdlib@v1.20 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-epinio-epinio-ui:v1.10.0-0.0.1 | true | Rancher v2.8 head | epinio-ui | stdlib@v1.20 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-epinio-epinio-ui:v1.10.0-0.0.1 | true | Rancher v2.8 head | epinio-ui | stdlib@v1.20 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-epinio-epinio-ui:v1.10.0-0.0.1 | true | Rancher v2.8 head | epinio-ui | stdlib@v1.20 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-epinio-epinio-ui:v1.10.0-0.0.1 | true | Rancher v2.8 head | epinio-ui | stdlib@v1.20 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-epinio-epinio-ui:v1.10.0-0.0.1 | true | Rancher v2.8 head | epinio-ui | stdlib@v1.20 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-epinio-epinio-ui:v1.10.0-0.0.1 | true | Rancher v2.8 head | epinio-ui | stdlib@v1.20 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-epinio-epinio-ui:v1.10.0-0.0.1 | true | Rancher v2.8 head | epinio-ui | stdlib@v1.20 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-epinio-epinio-ui:v1.10.0-0.0.1 | true | Rancher v2.8 head | epinio-ui | stdlib@v1.20 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-epinio-epinio-ui:v1.10.0-0.0.1 | true | Rancher v2.8 head | epinio-ui | stdlib@v1.20 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-epinio-epinio-ui:v1.10.0-0.0.1 | true | Rancher v2.8 head | epinio-ui | stdlib@v1.20 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-epinio-epinio-ui:v1.10.0-0.0.1 | true | Rancher v2.8 head | epinio-ui | stdlib@v1.20 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-epinio-epinio-ui:v1.10.0-0.0.1 | true | Rancher v2.8 head | epinio-ui | stdlib@v1.20 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-epinio-epinio-ui:v1.10.0-0.0.1 | true | Rancher v2.8 head | epinio-ui | stdlib@v1.20 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-epinio-epinio-ui:v1.10.0-0.0.1 | true | Rancher v2.8 head | epinio-ui | stdlib@v1.20 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-epinio-epinio-unpacker:v1.10.0 | true | Rancher v2.8 head | glibc | glibc@2.31-150300.52.2 | SUSE-SU-2024:1375-1 | HIGH | affected | sles | |
rancher/mirrored-epinio-epinio-unpacker:v1.10.0 | true | Rancher v2.8 head | glibc | glibc@2.31-150300.52.2 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
rancher/mirrored-epinio-epinio-unpacker:v1.10.0 | true | Rancher v2.8 head | libgcc_s1 | libgcc_s1@12.3.0+git1204-150000.1.10.1 | SUSE-SU-2023:3661-1 | HIGH | affected | sles | |
rancher/mirrored-epinio-epinio-unpacker:v1.10.0 | true | Rancher v2.8 head | libgcc_s1 | libgcc_s1@12.3.0+git1204-150000.1.10.1 | SUSE-SU-2023:4162-1 | HIGH | affected | sles | |
rancher/mirrored-epinio-epinio-unpacker:v1.10.0 | true | Rancher v2.8 head | libgcc_s1 | libgcc_s1@12.3.0+git1204-150000.1.10.1 | SUSE-SU-2023:4458-1 | HIGH | affected | sles | |
rancher/mirrored-epinio-epinio-unpacker:v1.10.0 | true | Rancher v2.8 head | libstdc++6 | libstdc++6@12.3.0+git1204-150000.1.10.1 | SUSE-SU-2023:3661-1 | HIGH | affected | sles | |
rancher/mirrored-epinio-epinio-unpacker:v1.10.0 | true | Rancher v2.8 head | libstdc++6 | libstdc++6@12.3.0+git1204-150000.1.10.1 | SUSE-SU-2023:4162-1 | HIGH | affected | sles | |
rancher/mirrored-epinio-epinio-unpacker:v1.10.0 | true | Rancher v2.8 head | libstdc++6 | libstdc++6@12.3.0+git1204-150000.1.10.1 | SUSE-SU-2023:4458-1 | HIGH | affected | sles | |
rancher/mirrored-flannel-flannel:v0.21.4 | true | Rancher v2.8 head | libcap2 | libcap2@2.66-r0 | CVE-2023-2603 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.21.4 | true | Rancher v2.8 head | libcrypto3 | libcrypto3@3.0.8-r0 | CVE-2023-0464 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.21.4 | true | Rancher v2.8 head | libcrypto3 | libcrypto3@3.0.8-r0 | CVE-2023-5363 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.21.4 | true | Rancher v2.8 head | libcurl | libcurl@7.88.1-r1 | CVE-2023-38545 | CRITICAL | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.21.4 | true | Rancher v2.8 head | libcurl | libcurl@7.88.1-r1 | CVE-2023-28319 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.21.4 | true | Rancher v2.8 head | libcurl | libcurl@7.88.1-r1 | CVE-2023-38039 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.21.4 | true | Rancher v2.8 head | libcurl | libcurl@7.88.1-r1 | CVE-2024-2398 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.21.4 | true | Rancher v2.8 head | libcurl | libcurl@7.88.1-r1 | CVE-2024-6197 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.21.4 | true | Rancher v2.8 head | libssl3 | libssl3@3.0.8-r0 | CVE-2023-0464 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.21.4 | true | Rancher v2.8 head | libssl3 | libssl3@3.0.8-r0 | CVE-2023-5363 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.21.4 | true | Rancher v2.8 head | ncurses-libs | ncurses-libs@6.3_p20221119-r0 | CVE-2023-29491 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.21.4 | true | Rancher v2.8 head | ncurses-terminfo-base | ncurses-terminfo-base@6.3_p20221119-r0 | CVE-2023-29491 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.21.4 | true | Rancher v2.8 head | nghttp2-libs | nghttp2-libs@1.51.0-r0 | CVE-2023-35945 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.21.4 | true | Rancher v2.8 head | nghttp2-libs | nghttp2-libs@1.51.0-r0 | CVE-2023-44487 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.21.4 | true | Rancher v2.8 head | sqlite-libs | sqlite-libs@3.40.1-r0 | CVE-2023-7104 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.21.4 | true | Rancher v2.8 head | strongswan | strongswan@5.9.8-r1 | CVE-2023-26463 | CRITICAL | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.21.4 | true | Rancher v2.8 head | strongswan | strongswan@5.9.8-r1 | CVE-2023-41913 | CRITICAL | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.21.4 | true | Rancher v2.8 head | opt/bin/flanneld | stdlib@v1.19.7 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.21.4 | true | Rancher v2.8 head | opt/bin/flanneld | stdlib@v1.19.7 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.21.4 | true | Rancher v2.8 head | opt/bin/flanneld | stdlib@v1.19.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.21.4 | true | Rancher v2.8 head | opt/bin/flanneld | stdlib@v1.19.7 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.21.4 | true | Rancher v2.8 head | opt/bin/flanneld | stdlib@v1.19.7 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.21.4 | true | Rancher v2.8 head | opt/bin/flanneld | stdlib@v1.19.7 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.21.4 | true | Rancher v2.8 head | opt/bin/flanneld | stdlib@v1.19.7 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.21.4 | true | Rancher v2.8 head | opt/bin/flanneld | stdlib@v1.19.7 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.21.4 | true | Rancher v2.8 head | opt/bin/flanneld | stdlib@v1.19.7 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.21.4 | true | Rancher v2.8 head | opt/bin/flanneld | stdlib@v1.19.7 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.21.4 | true | Rancher v2.8 head | opt/bin/flanneld | stdlib@v1.19.7 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.21.4 | true | Rancher v2.8 head | opt/bin/flanneld | stdlib@v1.19.7 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.21.4 | true | Rancher v2.8 head | opt/bin/flanneld | stdlib@v1.19.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.21.4 | true | Rancher v2.8 head | opt/bin/flanneld | stdlib@v1.19.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.24.2 | true | Rancher v2.8 head | libcrypto3 | libcrypto3@3.1.4-r4 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.24.2 | true | Rancher v2.8 head | libcurl | libcurl@8.5.0-r1 | CVE-2024-2398 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.24.2 | true | Rancher v2.8 head | libcurl | libcurl@8.5.0-r1 | CVE-2024-6197 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.24.2 | true | Rancher v2.8 head | libssl3 | libssl3@3.1.4-r4 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-flannel-flannel:v0.24.2 | true | Rancher v2.8 head | opt/bin/flanneld | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.24.2 | true | Rancher v2.8 head | opt/bin/flanneld | golang.org/x/net@v0.18.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.24.2 | true | Rancher v2.8 head | opt/bin/flanneld | stdlib@v1.21.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.24.2 | true | Rancher v2.8 head | opt/bin/flanneld | stdlib@v1.21.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.24.2 | true | Rancher v2.8 head | opt/bin/flanneld | stdlib@v1.21.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.24.2 | true | Rancher v2.8 head | sbin/iptables-wrapper | stdlib@v1.21.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.24.2 | true | Rancher v2.8 head | sbin/iptables-wrapper | stdlib@v1.21.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-flannel-flannel:v0.24.2 | true | Rancher v2.8 head | sbin/iptables-wrapper | stdlib@v1.21.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-fluent-fluent-bit:3.0.4 | true | Rancher v2.8 head | libcom-err2 | libcom-err2@1.46.2-2 | CVE-2022-1304 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4 | true | Rancher v2.8 head | libgcrypt20 | libgcrypt20@1.8.7-6 | CVE-2021-33560 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4 | true | Rancher v2.8 head | libgnutls30 | libgnutls30@3.7.1-5+deb11u4 | CVE-2024-0553 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4 | true | Rancher v2.8 head | libgnutls30 | libgnutls30@3.7.1-5+deb11u4 | CVE-2024-0567 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4 | true | Rancher v2.8 head | libgssapi-krb5-2 | libgssapi-krb5-2@1.18.3-6+deb11u4 | CVE-2024-37371 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4 | true | Rancher v2.8 head | libgssapi-krb5-2 | libgssapi-krb5-2@1.18.3-6+deb11u4 | CVE-2024-37370 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4 | true | Rancher v2.8 head | libk5crypto3 | libk5crypto3@1.18.3-6+deb11u4 | CVE-2024-37371 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4 | true | Rancher v2.8 head | libk5crypto3 | libk5crypto3@1.18.3-6+deb11u4 | CVE-2024-37370 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4 | true | Rancher v2.8 head | libkrb5-3 | libkrb5-3@1.18.3-6+deb11u4 | CVE-2024-37371 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4 | true | Rancher v2.8 head | libkrb5-3 | libkrb5-3@1.18.3-6+deb11u4 | CVE-2024-37370 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4 | true | Rancher v2.8 head | libkrb5support0 | libkrb5support0@1.18.3-6+deb11u4 | CVE-2024-37371 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4 | true | Rancher v2.8 head | libkrb5support0 | libkrb5support0@1.18.3-6+deb11u4 | CVE-2024-37370 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4 | true | Rancher v2.8 head | libldap-2.4-2 | libldap-2.4-2@2.4.57+dfsg-3+deb11u1 | CVE-2023-2953 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4 | true | Rancher v2.8 head | libpq5 | libpq5@13.14-0+deb11u1 | CVE-2024-10979 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4 | true | Rancher v2.8 head | libpq5 | libpq5@13.14-0+deb11u1 | CVE-2024-7348 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4 | true | Rancher v2.8 head | libpq5 | libpq5@13.14-0+deb11u1 | CVE-2025-1094 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4 | true | Rancher v2.8 head | libzstd1 | libzstd1@1.4.8+dfsg-2.1 | CVE-2022-4899 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4 | true | Rancher v2.8 head | zlib1g | zlib1g@1:1.2.11.dfsg-2+deb11u2 | CVE-2023-45853 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | bash | bash@5.1-2+deb11u1 | CVE-2022-3715 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | bind9-dnsutils | bind9-dnsutils@1:9.16.48-1 | CVE-2022-2881 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | bind9-dnsutils | bind9-dnsutils@1:9.16.48-1 | CVE-2024-11187 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | bind9-dnsutils | bind9-dnsutils@1:9.16.48-1 | CVE-2024-1737 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | bind9-dnsutils | bind9-dnsutils@1:9.16.48-1 | CVE-2024-1975 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | bind9-dnsutils | bind9-dnsutils@1:9.16.48-1 | CVE-2024-4076 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | bind9-host | bind9-host@1:9.16.48-1 | CVE-2022-2881 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | bind9-host | bind9-host@1:9.16.48-1 | CVE-2024-11187 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | bind9-host | bind9-host@1:9.16.48-1 | CVE-2024-1737 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | bind9-host | bind9-host@1:9.16.48-1 | CVE-2024-1975 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | bind9-host | bind9-host@1:9.16.48-1 | CVE-2024-4076 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | bind9-libs | bind9-libs@1:9.16.48-1 | CVE-2022-2881 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | bind9-libs | bind9-libs@1:9.16.48-1 | CVE-2024-11187 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | bind9-libs | bind9-libs@1:9.16.48-1 | CVE-2024-1737 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | bind9-libs | bind9-libs@1:9.16.48-1 | CVE-2024-1975 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | bind9-libs | bind9-libs@1:9.16.48-1 | CVE-2024-4076 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | curl | curl@7.74.0-1.3+deb11u11 | CVE-2023-23914 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | curl | curl@7.74.0-1.3+deb11u11 | CVE-2022-42916 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | curl | curl@7.74.0-1.3+deb11u11 | CVE-2022-43551 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | curl | curl@7.74.0-1.3+deb11u11 | CVE-2024-2398 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | dnsutils | dnsutils@1:9.16.48-1 | CVE-2022-2881 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | dnsutils | dnsutils@1:9.16.48-1 | CVE-2024-11187 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | dnsutils | dnsutils@1:9.16.48-1 | CVE-2024-1737 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | dnsutils | dnsutils@1:9.16.48-1 | CVE-2024-1975 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | dnsutils | dnsutils@1:9.16.48-1 | CVE-2024-4076 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | e2fsprogs | e2fsprogs@1.46.2-2 | CVE-2022-1304 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | git | git@1:2.30.2-1+deb11u2 | CVE-2024-32002 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | git | git@1:2.30.2-1+deb11u2 | CVE-2019-1387 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | git | git@1:2.30.2-1+deb11u2 | CVE-2023-25652 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | git | git@1:2.30.2-1+deb11u2 | CVE-2023-29007 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | git | git@1:2.30.2-1+deb11u2 | CVE-2024-32004 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | git | git@1:2.30.2-1+deb11u2 | CVE-2024-32465 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | git-man | git-man@1:2.30.2-1+deb11u2 | CVE-2024-32002 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | git-man | git-man@1:2.30.2-1+deb11u2 | CVE-2019-1387 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | git-man | git-man@1:2.30.2-1+deb11u2 | CVE-2023-25652 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | git-man | git-man@1:2.30.2-1+deb11u2 | CVE-2023-29007 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | git-man | git-man@1:2.30.2-1+deb11u2 | CVE-2024-32004 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | git-man | git-man@1:2.30.2-1+deb11u2 | CVE-2024-32465 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | gtk-update-icon-cache | gtk-update-icon-cache@3.24.24-4+deb11u3 | CVE-2024-6655 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libarchive13 | libarchive13@3.4.3-2+deb11u1 | CVE-2022-36227 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libarchive13 | libarchive13@3.4.3-2+deb11u1 | CVE-2024-20696 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libblas3 | libblas3@3.9.0-3+deb11u1 | CVE-2021-4048 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libcom-err2 | libcom-err2@1.46.2-2 | CVE-2022-1304 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libcups2 | libcups2@2.3.3op2-3+deb11u6 | CVE-2024-47175 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libcurl3-gnutls | libcurl3-gnutls@7.74.0-1.3+deb11u11 | CVE-2023-23914 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libcurl3-gnutls | libcurl3-gnutls@7.74.0-1.3+deb11u11 | CVE-2022-42916 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libcurl3-gnutls | libcurl3-gnutls@7.74.0-1.3+deb11u11 | CVE-2022-43551 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libcurl3-gnutls | libcurl3-gnutls@7.74.0-1.3+deb11u11 | CVE-2024-2398 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libcurl4 | libcurl4@7.74.0-1.3+deb11u11 | CVE-2023-23914 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libcurl4 | libcurl4@7.74.0-1.3+deb11u11 | CVE-2022-42916 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libcurl4 | libcurl4@7.74.0-1.3+deb11u11 | CVE-2022-43551 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libcurl4 | libcurl4@7.74.0-1.3+deb11u11 | CVE-2024-2398 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libdb5.3 | libdb5.3@5.3.28+dfsg1-0.8 | CVE-2019-8457 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libexpat1 | libexpat1@2.2.10-2+deb11u5 | CVE-2024-45491 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libexpat1 | libexpat1@2.2.10-2+deb11u5 | CVE-2024-45492 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libexpat1 | libexpat1@2.2.10-2+deb11u5 | CVE-2023-52425 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libexpat1 | libexpat1@2.2.10-2+deb11u5 | CVE-2024-45490 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libext2fs2 | libext2fs2@1.46.2-2 | CVE-2022-1304 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libfreetype6 | libfreetype6@2.10.4+dfsg-1+deb11u1 | CVE-2025-27363 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libgcrypt20 | libgcrypt20@1.8.7-6 | CVE-2021-33560 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libgdk-pixbuf-2.0-0 | libgdk-pixbuf-2.0-0@2.42.2+dfsg-1+deb11u1 | CVE-2022-48622 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libgdk-pixbuf2.0-common | libgdk-pixbuf2.0-common@2.42.2+dfsg-1+deb11u1 | CVE-2022-48622 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libglib2.0-0 | libglib2.0-0@2.66.8-1+deb11u3 | CVE-2024-52533 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libgnutls30 | libgnutls30@3.7.1-5+deb11u4 | CVE-2024-0553 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libgnutls30 | libgnutls30@3.7.1-5+deb11u4 | CVE-2024-0567 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libgssapi-krb5-2 | libgssapi-krb5-2@1.18.3-6+deb11u4 | CVE-2024-37371 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libgssapi-krb5-2 | libgssapi-krb5-2@1.18.3-6+deb11u4 | CVE-2024-37370 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libgtk2.0-0 | libgtk2.0-0@2.24.33-2 | CVE-2024-6655 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libgtk2.0-common | libgtk2.0-common@2.24.33-2 | CVE-2024-6655 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libharfbuzz0b | libharfbuzz0b@2.7.4-1 | CVE-2023-25193 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libk5crypto3 | libk5crypto3@1.18.3-6+deb11u4 | CVE-2024-37371 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libk5crypto3 | libk5crypto3@1.18.3-6+deb11u4 | CVE-2024-37370 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libkrb5-3 | libkrb5-3@1.18.3-6+deb11u4 | CVE-2024-37371 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libkrb5-3 | libkrb5-3@1.18.3-6+deb11u4 | CVE-2024-37370 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libkrb5support0 | libkrb5support0@1.18.3-6+deb11u4 | CVE-2024-37371 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libkrb5support0 | libkrb5support0@1.18.3-6+deb11u4 | CVE-2024-37370 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libldap-2.4-2 | libldap-2.4-2@2.4.57+dfsg-3+deb11u1 | CVE-2023-2953 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libperl5.32 | libperl5.32@5.32.1-4+deb11u3 | CVE-2020-16156 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libperl5.32 | libperl5.32@5.32.1-4+deb11u3 | CVE-2023-31484 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpq-dev | libpq-dev@13.14-0+deb11u1 | CVE-2024-10979 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpq-dev | libpq-dev@13.14-0+deb11u1 | CVE-2024-7348 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpq-dev | libpq-dev@13.14-0+deb11u1 | CVE-2025-1094 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpq5 | libpq5@13.14-0+deb11u1 | CVE-2024-10979 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpq5 | libpq5@13.14-0+deb11u1 | CVE-2024-7348 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpq5 | libpq5@13.14-0+deb11u1 | CVE-2025-1094 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9 | libpython3.9@3.9.2-1 | CVE-2021-29921 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9 | libpython3.9@3.9.2-1 | CVE-2015-20107 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9 | libpython3.9@3.9.2-1 | CVE-2020-10735 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9 | libpython3.9@3.9.2-1 | CVE-2021-28861 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9 | libpython3.9@3.9.2-1 | CVE-2021-3737 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9 | libpython3.9@3.9.2-1 | CVE-2022-0391 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9 | libpython3.9@3.9.2-1 | CVE-2022-42919 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9 | libpython3.9@3.9.2-1 | CVE-2022-45061 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9 | libpython3.9@3.9.2-1 | CVE-2023-24329 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9 | libpython3.9@3.9.2-1 | CVE-2023-6597 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9 | libpython3.9@3.9.2-1 | CVE-2024-6232 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9 | libpython3.9@3.9.2-1 | CVE-2024-7592 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9 | libpython3.9@3.9.2-1 | CVE-2024-9287 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9-minimal | libpython3.9-minimal@3.9.2-1 | CVE-2021-29921 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9-minimal | libpython3.9-minimal@3.9.2-1 | CVE-2015-20107 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9-minimal | libpython3.9-minimal@3.9.2-1 | CVE-2020-10735 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9-minimal | libpython3.9-minimal@3.9.2-1 | CVE-2021-28861 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9-minimal | libpython3.9-minimal@3.9.2-1 | CVE-2021-3737 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9-minimal | libpython3.9-minimal@3.9.2-1 | CVE-2022-0391 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9-minimal | libpython3.9-minimal@3.9.2-1 | CVE-2022-42919 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9-minimal | libpython3.9-minimal@3.9.2-1 | CVE-2022-45061 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9-minimal | libpython3.9-minimal@3.9.2-1 | CVE-2023-24329 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9-minimal | libpython3.9-minimal@3.9.2-1 | CVE-2023-6597 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9-minimal | libpython3.9-minimal@3.9.2-1 | CVE-2024-6232 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9-minimal | libpython3.9-minimal@3.9.2-1 | CVE-2024-7592 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9-minimal | libpython3.9-minimal@3.9.2-1 | CVE-2024-9287 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9-stdlib | libpython3.9-stdlib@3.9.2-1 | CVE-2021-29921 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9-stdlib | libpython3.9-stdlib@3.9.2-1 | CVE-2015-20107 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9-stdlib | libpython3.9-stdlib@3.9.2-1 | CVE-2020-10735 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9-stdlib | libpython3.9-stdlib@3.9.2-1 | CVE-2021-28861 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9-stdlib | libpython3.9-stdlib@3.9.2-1 | CVE-2021-3737 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9-stdlib | libpython3.9-stdlib@3.9.2-1 | CVE-2022-0391 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9-stdlib | libpython3.9-stdlib@3.9.2-1 | CVE-2022-42919 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9-stdlib | libpython3.9-stdlib@3.9.2-1 | CVE-2022-45061 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9-stdlib | libpython3.9-stdlib@3.9.2-1 | CVE-2023-24329 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9-stdlib | libpython3.9-stdlib@3.9.2-1 | CVE-2023-6597 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9-stdlib | libpython3.9-stdlib@3.9.2-1 | CVE-2024-6232 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9-stdlib | libpython3.9-stdlib@3.9.2-1 | CVE-2024-7592 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libpython3.9-stdlib | libpython3.9-stdlib@3.9.2-1 | CVE-2024-9287 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libsqlite3-0 | libsqlite3-0@3.34.1-3 | CVE-2021-36690 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libsqlite3-0 | libsqlite3-0@3.34.1-3 | CVE-2023-7104 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libss2 | libss2@1.46.2-2 | CVE-2022-1304 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libssh2-1 | libssh2-1@1.9.0-2 | CVE-2020-22218 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libtiff5 | libtiff5@4.2.0-1+deb11u5 | CVE-2023-52355 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libtiff5 | libtiff5@4.2.0-1+deb11u5 | CVE-2023-52356 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libtiff5 | libtiff5@4.2.0-1+deb11u5 | CVE-2024-7006 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libudev1 | libudev1@247.3-7+deb11u4 | CVE-2023-50387 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libudev1 | libudev1@247.3-7+deb11u4 | CVE-2023-50868 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libxml2 | libxml2@2.9.10+dfsg-6.7+deb11u4 | CVE-2022-2309 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libxml2 | libxml2@2.9.10+dfsg-6.7+deb11u4 | CVE-2024-25062 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libxml2 | libxml2@2.9.10+dfsg-6.7+deb11u4 | CVE-2024-56171 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libxml2 | libxml2@2.9.10+dfsg-6.7+deb11u4 | CVE-2025-24928 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libxml2 | libxml2@2.9.10+dfsg-6.7+deb11u4 | CVE-2025-27113 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | libzstd1 | libzstd1@1.4.8+dfsg-2.1 | CVE-2022-4899 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-47685 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2013-7445 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2019-19449 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2019-19814 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2020-12362 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2021-3847 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2021-3864 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2021-39686 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2021-4204 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2021-47014 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2021-47028 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2021-47094 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2021-47101 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2021-47198 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2021-47200 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2021-47247 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2021-47489 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2021-47624 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2022-0500 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2022-3566 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2022-43945 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2022-48626 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2022-48655 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2022-48674 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2022-48733 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2022-48950 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2022-48990 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2022-49541 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2022-49623 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2023-52452 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2023-52494 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2023-52517 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2023-52530 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2023-52531 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2023-52572 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2023-52586 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2023-52588 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2023-52664 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2023-52751 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2023-52752 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2023-52757 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2023-52760 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2023-52766 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2023-52812 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2023-52921 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-21803 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-23307 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-25742 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-25743 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-26589 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-26668 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-26669 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-26739 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-26792 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-26865 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-26913 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-26928 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-26930 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-26944 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-26982 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-26996 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-27397 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-35861 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-35862 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-35863 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-35864 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-35866 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-35867 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-35868 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-35887 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-35929 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-35937 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-36013 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-36883 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-36886 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-36899 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-36904 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-36921 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-36940 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-36946 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-36960 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-36971 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-36978 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-38381 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-38538 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-38545 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-38552 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-38555 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-38556 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-38560 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-38570 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-38577 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-38581 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-38583 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-38588 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-38627 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-38630 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-38667 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-39471 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-39479 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-39480 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-39487 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-39494 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-39495 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-39496 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-39508 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-40902 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-40958 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-41000 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-41011 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-41013 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-41040 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-41046 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-41049 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-41059 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-41070 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-41073 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-41087 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-41090 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-41091 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-41092 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-42093 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-42094 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-42104 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-42136 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-42147 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-42148 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-42160 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-42162 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-42225 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-42228 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-42271 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-42280 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-42284 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-42285 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-42301 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-42302 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-42305 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-42313 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-43839 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-43858 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-43882 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-43883 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-43900 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-44934 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-44940 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-44941 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-44942 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-44949 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-44974 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-44977 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-44986 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-44987 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-44998 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-44999 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-45026 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-46673 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-46674 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-46722 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-46723 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-46724 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-46725 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-46731 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-46738 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-46740 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-46743 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-46744 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-46747 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-46759 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-46774 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-46782 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-46798 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-46800 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-46804 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-46811 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-46812 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-46813 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-46814 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-46815 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-46818 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-46821 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-46828 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-46830 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-46833 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-46844 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-46849 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-46853 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-46854 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-46858 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-46859 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-46865 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-46871 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-47659 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-47670 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-47691 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-47695 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-47696 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-47697 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-47698 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-47701 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-47718 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-47723 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-47730 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-47742 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-47745 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-47747 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-47748 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-47757 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-49854 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-49860 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-49861 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-49882 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-49883 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-49884 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-49889 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-49894 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-49895 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-49900 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-49903 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-49924 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-49930 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-49936 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-49950 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-49960 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-49966 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-49969 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-49981 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-49982 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-49983 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-49989 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-49991 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-49992 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-49995 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-49996 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-49997 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50007 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50033 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50035 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50036 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50047 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50051 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50055 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50059 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50061 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50063 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50067 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50073 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50074 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50083 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50112 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50115 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50121 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50125 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50127 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50131 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50143 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50150 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50151 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50154 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50180 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50193 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50209 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50217 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50230 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50234 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50262 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50264 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50267 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50268 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50269 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50278 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50279 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50282 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-50301 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-53057 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-53059 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-53061 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-53068 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-53096 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-53099 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-53103 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-53104 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-53108 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-53133 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-53141 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-53142 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-53150 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-53155 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-53156 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-53165 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-53168 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-53171 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-53173 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-53174 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-53179 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-53203 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-53216 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-53227 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-53237 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-53239 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-56538 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-56548 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-56551 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-56558 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-56581 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-56595 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-56596 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-56598 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-56600 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-56601 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-56602 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-56603 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-56604 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-56605 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-56606 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-56608 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-56614 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-56615 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-56631 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-56640 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-56642 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-56645 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-56650 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-56651 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-56658 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-56662 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-56664 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-56672 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-56704 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-56759 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-56766 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-56775 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-57798 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-57850 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-57887 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-57892 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-57896 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-57900 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-57906 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-57907 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-57908 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-57910 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-57911 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-57912 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-57947 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-57951 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-57980 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-57982 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-57984 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-58002 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-58007 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2024-8805 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2025-21647 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2025-21648 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2025-21687 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2025-21692 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2025-21702 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2025-21703 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2025-21718 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2025-21726 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2025-21735 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2025-21753 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2025-21782 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2025-21785 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | linux-libc-dev | linux-libc-dev@5.10.216-1 | CVE-2025-21812 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | logsave | logsave@1.46.2-2 | CVE-2022-1304 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | perl | perl@5.32.1-4+deb11u3 | CVE-2020-16156 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | perl | perl@5.32.1-4+deb11u3 | CVE-2023-31484 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | perl-base | perl-base@5.32.1-4+deb11u3 | CVE-2020-16156 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | perl-base | perl-base@5.32.1-4+deb11u3 | CVE-2023-31484 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | perl-modules-5.32 | perl-modules-5.32@5.32.1-4+deb11u3 | CVE-2020-16156 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | perl-modules-5.32 | perl-modules-5.32@5.32.1-4+deb11u3 | CVE-2023-31484 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | postgresql-client-13 | postgresql-client-13@13.14-0+deb11u1 | CVE-2024-10979 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | postgresql-client-13 | postgresql-client-13@13.14-0+deb11u1 | CVE-2024-7348 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | postgresql-client-13 | postgresql-client-13@13.14-0+deb11u1 | CVE-2025-1094 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | postgresql-server-dev-13 | postgresql-server-dev-13@13.14-0+deb11u1 | CVE-2024-10979 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | postgresql-server-dev-13 | postgresql-server-dev-13@13.14-0+deb11u1 | CVE-2024-7348 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | postgresql-server-dev-13 | postgresql-server-dev-13@13.14-0+deb11u1 | CVE-2025-1094 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | python3-pkg-resources | python3-pkg-resources@52.0.0-4 | CVE-2024-6345 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | python3.9 | python3.9@3.9.2-1 | CVE-2021-29921 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | python3.9 | python3.9@3.9.2-1 | CVE-2015-20107 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | python3.9 | python3.9@3.9.2-1 | CVE-2020-10735 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | python3.9 | python3.9@3.9.2-1 | CVE-2021-28861 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | python3.9 | python3.9@3.9.2-1 | CVE-2021-3737 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | python3.9 | python3.9@3.9.2-1 | CVE-2022-0391 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | python3.9 | python3.9@3.9.2-1 | CVE-2022-42919 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | python3.9 | python3.9@3.9.2-1 | CVE-2022-45061 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | python3.9 | python3.9@3.9.2-1 | CVE-2023-24329 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | python3.9 | python3.9@3.9.2-1 | CVE-2023-6597 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | python3.9 | python3.9@3.9.2-1 | CVE-2024-6232 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | python3.9 | python3.9@3.9.2-1 | CVE-2024-7592 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | python3.9 | python3.9@3.9.2-1 | CVE-2024-9287 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | python3.9-minimal | python3.9-minimal@3.9.2-1 | CVE-2021-29921 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | python3.9-minimal | python3.9-minimal@3.9.2-1 | CVE-2015-20107 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | python3.9-minimal | python3.9-minimal@3.9.2-1 | CVE-2020-10735 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | python3.9-minimal | python3.9-minimal@3.9.2-1 | CVE-2021-28861 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | python3.9-minimal | python3.9-minimal@3.9.2-1 | CVE-2021-3737 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | python3.9-minimal | python3.9-minimal@3.9.2-1 | CVE-2022-0391 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | python3.9-minimal | python3.9-minimal@3.9.2-1 | CVE-2022-42919 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | python3.9-minimal | python3.9-minimal@3.9.2-1 | CVE-2022-45061 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | python3.9-minimal | python3.9-minimal@3.9.2-1 | CVE-2023-24329 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | python3.9-minimal | python3.9-minimal@3.9.2-1 | CVE-2023-6597 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | python3.9-minimal | python3.9-minimal@3.9.2-1 | CVE-2024-6232 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | python3.9-minimal | python3.9-minimal@3.9.2-1 | CVE-2024-7592 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | python3.9-minimal | python3.9-minimal@3.9.2-1 | CVE-2024-9287 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | sysstat | sysstat@12.5.2-2 | CVE-2022-39377 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim | vim@2:8.2.2434-3+deb11u1 | CVE-2021-3872 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim | vim@2:8.2.2434-3+deb11u1 | CVE-2021-4019 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim | vim@2:8.2.2434-3+deb11u1 | CVE-2021-4173 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim | vim@2:8.2.2434-3+deb11u1 | CVE-2021-4187 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim | vim@2:8.2.2434-3+deb11u1 | CVE-2022-0261 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim | vim@2:8.2.2434-3+deb11u1 | CVE-2022-0351 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim | vim@2:8.2.2434-3+deb11u1 | CVE-2022-0359 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim | vim@2:8.2.2434-3+deb11u1 | CVE-2022-0361 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim | vim@2:8.2.2434-3+deb11u1 | CVE-2022-0392 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim | vim@2:8.2.2434-3+deb11u1 | CVE-2022-0417 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim | vim@2:8.2.2434-3+deb11u1 | CVE-2022-0572 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim | vim@2:8.2.2434-3+deb11u1 | CVE-2022-1616 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim | vim@2:8.2.2434-3+deb11u1 | CVE-2022-1785 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim | vim@2:8.2.2434-3+deb11u1 | CVE-2022-1897 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim | vim@2:8.2.2434-3+deb11u1 | CVE-2022-1942 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim | vim@2:8.2.2434-3+deb11u1 | CVE-2022-2000 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim | vim@2:8.2.2434-3+deb11u1 | CVE-2022-2129 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim | vim@2:8.2.2434-3+deb11u1 | CVE-2022-2304 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim | vim@2:8.2.2434-3+deb11u1 | CVE-2022-3099 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim | vim@2:8.2.2434-3+deb11u1 | CVE-2022-3134 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim | vim@2:8.2.2434-3+deb11u1 | CVE-2022-3324 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim | vim@2:8.2.2434-3+deb11u1 | CVE-2022-4141 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim | vim@2:8.2.2434-3+deb11u1 | CVE-2023-0054 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim | vim@2:8.2.2434-3+deb11u1 | CVE-2023-2610 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim | vim@2:8.2.2434-3+deb11u1 | CVE-2023-4738 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim | vim@2:8.2.2434-3+deb11u1 | CVE-2023-4752 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim | vim@2:8.2.2434-3+deb11u1 | CVE-2023-4781 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim | vim@2:8.2.2434-3+deb11u1 | CVE-2023-5344 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim | vim@2:8.2.2434-3+deb11u1 | CVE-2024-22667 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-common | vim-common@2:8.2.2434-3+deb11u1 | CVE-2021-3872 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-common | vim-common@2:8.2.2434-3+deb11u1 | CVE-2021-4019 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-common | vim-common@2:8.2.2434-3+deb11u1 | CVE-2021-4173 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-common | vim-common@2:8.2.2434-3+deb11u1 | CVE-2021-4187 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-common | vim-common@2:8.2.2434-3+deb11u1 | CVE-2022-0261 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-common | vim-common@2:8.2.2434-3+deb11u1 | CVE-2022-0351 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-common | vim-common@2:8.2.2434-3+deb11u1 | CVE-2022-0359 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-common | vim-common@2:8.2.2434-3+deb11u1 | CVE-2022-0361 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-common | vim-common@2:8.2.2434-3+deb11u1 | CVE-2022-0392 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-common | vim-common@2:8.2.2434-3+deb11u1 | CVE-2022-0417 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-common | vim-common@2:8.2.2434-3+deb11u1 | CVE-2022-0572 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-common | vim-common@2:8.2.2434-3+deb11u1 | CVE-2022-1616 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-common | vim-common@2:8.2.2434-3+deb11u1 | CVE-2022-1785 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-common | vim-common@2:8.2.2434-3+deb11u1 | CVE-2022-1897 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-common | vim-common@2:8.2.2434-3+deb11u1 | CVE-2022-1942 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-common | vim-common@2:8.2.2434-3+deb11u1 | CVE-2022-2000 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-common | vim-common@2:8.2.2434-3+deb11u1 | CVE-2022-2129 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-common | vim-common@2:8.2.2434-3+deb11u1 | CVE-2022-2304 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-common | vim-common@2:8.2.2434-3+deb11u1 | CVE-2022-3099 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-common | vim-common@2:8.2.2434-3+deb11u1 | CVE-2022-3134 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-common | vim-common@2:8.2.2434-3+deb11u1 | CVE-2022-3324 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-common | vim-common@2:8.2.2434-3+deb11u1 | CVE-2022-4141 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-common | vim-common@2:8.2.2434-3+deb11u1 | CVE-2023-0054 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-common | vim-common@2:8.2.2434-3+deb11u1 | CVE-2023-2610 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-common | vim-common@2:8.2.2434-3+deb11u1 | CVE-2023-4738 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-common | vim-common@2:8.2.2434-3+deb11u1 | CVE-2023-4752 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-common | vim-common@2:8.2.2434-3+deb11u1 | CVE-2023-4781 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-common | vim-common@2:8.2.2434-3+deb11u1 | CVE-2023-5344 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-common | vim-common@2:8.2.2434-3+deb11u1 | CVE-2024-22667 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-runtime | vim-runtime@2:8.2.2434-3+deb11u1 | CVE-2021-3872 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-runtime | vim-runtime@2:8.2.2434-3+deb11u1 | CVE-2021-4019 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-runtime | vim-runtime@2:8.2.2434-3+deb11u1 | CVE-2021-4173 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-runtime | vim-runtime@2:8.2.2434-3+deb11u1 | CVE-2021-4187 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-runtime | vim-runtime@2:8.2.2434-3+deb11u1 | CVE-2022-0261 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-runtime | vim-runtime@2:8.2.2434-3+deb11u1 | CVE-2022-0351 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-runtime | vim-runtime@2:8.2.2434-3+deb11u1 | CVE-2022-0359 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-runtime | vim-runtime@2:8.2.2434-3+deb11u1 | CVE-2022-0361 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-runtime | vim-runtime@2:8.2.2434-3+deb11u1 | CVE-2022-0392 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-runtime | vim-runtime@2:8.2.2434-3+deb11u1 | CVE-2022-0417 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-runtime | vim-runtime@2:8.2.2434-3+deb11u1 | CVE-2022-0572 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-runtime | vim-runtime@2:8.2.2434-3+deb11u1 | CVE-2022-1616 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-runtime | vim-runtime@2:8.2.2434-3+deb11u1 | CVE-2022-1785 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-runtime | vim-runtime@2:8.2.2434-3+deb11u1 | CVE-2022-1897 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-runtime | vim-runtime@2:8.2.2434-3+deb11u1 | CVE-2022-1942 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-runtime | vim-runtime@2:8.2.2434-3+deb11u1 | CVE-2022-2000 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-runtime | vim-runtime@2:8.2.2434-3+deb11u1 | CVE-2022-2129 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-runtime | vim-runtime@2:8.2.2434-3+deb11u1 | CVE-2022-2304 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-runtime | vim-runtime@2:8.2.2434-3+deb11u1 | CVE-2022-3099 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-runtime | vim-runtime@2:8.2.2434-3+deb11u1 | CVE-2022-3134 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-runtime | vim-runtime@2:8.2.2434-3+deb11u1 | CVE-2022-3324 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-runtime | vim-runtime@2:8.2.2434-3+deb11u1 | CVE-2022-4141 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-runtime | vim-runtime@2:8.2.2434-3+deb11u1 | CVE-2023-0054 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-runtime | vim-runtime@2:8.2.2434-3+deb11u1 | CVE-2023-2610 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-runtime | vim-runtime@2:8.2.2434-3+deb11u1 | CVE-2023-4738 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-runtime | vim-runtime@2:8.2.2434-3+deb11u1 | CVE-2023-4752 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-runtime | vim-runtime@2:8.2.2434-3+deb11u1 | CVE-2023-4781 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-runtime | vim-runtime@2:8.2.2434-3+deb11u1 | CVE-2023-5344 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | vim-runtime | vim-runtime@2:8.2.2434-3+deb11u1 | CVE-2024-22667 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | xxd | xxd@2:8.2.2434-3+deb11u1 | CVE-2021-3872 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | xxd | xxd@2:8.2.2434-3+deb11u1 | CVE-2021-4019 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | xxd | xxd@2:8.2.2434-3+deb11u1 | CVE-2021-4173 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | xxd | xxd@2:8.2.2434-3+deb11u1 | CVE-2021-4187 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | xxd | xxd@2:8.2.2434-3+deb11u1 | CVE-2022-0261 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | xxd | xxd@2:8.2.2434-3+deb11u1 | CVE-2022-0351 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | xxd | xxd@2:8.2.2434-3+deb11u1 | CVE-2022-0359 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | xxd | xxd@2:8.2.2434-3+deb11u1 | CVE-2022-0361 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | xxd | xxd@2:8.2.2434-3+deb11u1 | CVE-2022-0392 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | xxd | xxd@2:8.2.2434-3+deb11u1 | CVE-2022-0417 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | xxd | xxd@2:8.2.2434-3+deb11u1 | CVE-2022-0572 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | xxd | xxd@2:8.2.2434-3+deb11u1 | CVE-2022-1616 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | xxd | xxd@2:8.2.2434-3+deb11u1 | CVE-2022-1785 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | xxd | xxd@2:8.2.2434-3+deb11u1 | CVE-2022-1897 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | xxd | xxd@2:8.2.2434-3+deb11u1 | CVE-2022-1942 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | xxd | xxd@2:8.2.2434-3+deb11u1 | CVE-2022-2000 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | xxd | xxd@2:8.2.2434-3+deb11u1 | CVE-2022-2129 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | xxd | xxd@2:8.2.2434-3+deb11u1 | CVE-2022-2304 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | xxd | xxd@2:8.2.2434-3+deb11u1 | CVE-2022-3099 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | xxd | xxd@2:8.2.2434-3+deb11u1 | CVE-2022-3134 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | xxd | xxd@2:8.2.2434-3+deb11u1 | CVE-2022-3324 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | xxd | xxd@2:8.2.2434-3+deb11u1 | CVE-2022-4141 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | xxd | xxd@2:8.2.2434-3+deb11u1 | CVE-2023-0054 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | xxd | xxd@2:8.2.2434-3+deb11u1 | CVE-2023-2610 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | xxd | xxd@2:8.2.2434-3+deb11u1 | CVE-2023-4738 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | xxd | xxd@2:8.2.2434-3+deb11u1 | CVE-2023-4752 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | xxd | xxd@2:8.2.2434-3+deb11u1 | CVE-2023-4781 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | xxd | xxd@2:8.2.2434-3+deb11u1 | CVE-2023-5344 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | xxd | xxd@2:8.2.2434-3+deb11u1 | CVE-2024-22667 | HIGH | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | zlib1g | zlib1g@1:1.2.11.dfsg-2+deb11u2 | CVE-2023-45853 | CRITICAL | affected | debian | |
rancher/mirrored-fluent-fluent-bit:3.0.4-debug | true | Rancher v2.8 head | zlib1g-dev | zlib1g-dev@1:1.2.11.dfsg-2+deb11u2 | CVE-2023-45853 | CRITICAL | affected | debian | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher v2.8 head | aom-libs | aom-libs@3.9.0-r0 | CVE-2024-5171 | CRITICAL | affected | alpine | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher v2.8 head | cups-libs | cups-libs@2.4.8-r0 | CVE-2024-47175 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher v2.8 head | gdk-pixbuf | gdk-pixbuf@2.42.11-r1 | CVE-2022-48622 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher v2.8 head | libcrypto3 | libcrypto3@3.3.0-r2 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher v2.8 head | libexpat | libexpat@2.6.2-r0 | CVE-2024-45491 | CRITICAL | affected | alpine | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher v2.8 head | libexpat | libexpat@2.6.2-r0 | CVE-2024-45492 | CRITICAL | affected | alpine | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher v2.8 head | libexpat | libexpat@2.6.2-r0 | CVE-2024-45490 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher v2.8 head | libssl3 | libssl3@3.3.0-r2 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher v2.8 head | libvpx | libvpx@1.14.0-r0 | CVE-2024-5197 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher v2.8 head | libxml2 | libxml2@2.12.7-r0 | CVE-2024-56171 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher v2.8 head | libxml2 | libxml2@2.12.7-r0 | CVE-2025-24928 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher v2.8 head | libxml2 | libxml2@2.12.7-r0 | CVE-2025-27113 | HIGH | affected | alpine | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher v2.8 head | mbedtls | mbedtls@3.6.0-r0 | CVE-2024-45159 | CRITICAL | affected | alpine | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher v2.8 head | Node.js | axios@1.6.7 | CVE-2024-39338 | HIGH | affected | node-pkg | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher v2.8 head | Node.js | axios@1.6.7 | CVE-2025-27152 | HIGH | affected | node-pkg | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher v2.8 head | Node.js | body-parser@1.20.2 | CVE-2024-45590 | HIGH | affected | node-pkg | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher v2.8 head | Node.js | braces@3.0.2 | CVE-2024-4068 | HIGH | affected | node-pkg | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher v2.8 head | Node.js | cross-spawn@7.0.3 | CVE-2024-21538 | HIGH | affected | node-pkg | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher v2.8 head | Node.js | cross-spawn@7.0.3 | CVE-2024-21538 | HIGH | affected | node-pkg | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher v2.8 head | Node.js | dompurify@2.4.7 | CVE-2024-45801 | HIGH | affected | node-pkg | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher v2.8 head | Node.js | dompurify@2.4.7 | CVE-2024-47875 | HIGH | affected | node-pkg | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher v2.8 head | Node.js | ip@1.1.9 | CVE-2024-29415 | HIGH | affected | node-pkg | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher v2.8 head | Node.js | ip@2.0.1 | CVE-2024-29415 | HIGH | affected | node-pkg | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher v2.8 head | Node.js | path-to-regexp@0.1.7 | CVE-2024-45296 | HIGH | affected | node-pkg | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher v2.8 head | Node.js | path-to-regexp@0.1.7 | CVE-2024-52798 | HIGH | affected | node-pkg | |
rancher/mirrored-grafana-grafana-image-renderer:3.10.5 | true | Rancher v2.8 head | Node.js | ws@8.13.0 | CVE-2024-37890 | HIGH | affected | node-pkg | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.8 head | krb5-libs | krb5-libs@1.20.1-r0 | CVE-2024-37371 | CRITICAL | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.8 head | krb5-libs | krb5-libs@1.20.1-r0 | CVE-2024-37370 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.8 head | libcom_err | libcom_err@1.46.5-r4 | CVE-2022-1304 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.8 head | libcrypto3 | libcrypto3@3.0.7-r0 | CVE-2022-3996 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.8 head | libcrypto3 | libcrypto3@3.0.7-r0 | CVE-2022-4450 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.8 head | libcrypto3 | libcrypto3@3.0.7-r0 | CVE-2023-0215 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.8 head | libcrypto3 | libcrypto3@3.0.7-r0 | CVE-2023-0216 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.8 head | libcrypto3 | libcrypto3@3.0.7-r0 | CVE-2023-0217 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.8 head | libcrypto3 | libcrypto3@3.0.7-r0 | CVE-2023-0286 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.8 head | libcrypto3 | libcrypto3@3.0.7-r0 | CVE-2023-0401 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.8 head | libcrypto3 | libcrypto3@3.0.7-r0 | CVE-2023-0464 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.8 head | libcrypto3 | libcrypto3@3.0.7-r0 | CVE-2023-5363 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.8 head | libexpat | libexpat@2.5.0-r0 | CVE-2024-45491 | CRITICAL | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.8 head | libexpat | libexpat@2.5.0-r0 | CVE-2024-45492 | CRITICAL | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.8 head | libexpat | libexpat@2.5.0-r0 | CVE-2023-52425 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.8 head | libexpat | libexpat@2.5.0-r0 | CVE-2024-28757 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.8 head | libexpat | libexpat@2.5.0-r0 | CVE-2024-45490 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.8 head | libssl3 | libssl3@3.0.7-r0 | CVE-2022-3996 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.8 head | libssl3 | libssl3@3.0.7-r0 | CVE-2022-4450 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.8 head | libssl3 | libssl3@3.0.7-r0 | CVE-2023-0215 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.8 head | libssl3 | libssl3@3.0.7-r0 | CVE-2023-0216 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.8 head | libssl3 | libssl3@3.0.7-r0 | CVE-2023-0217 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.8 head | libssl3 | libssl3@3.0.7-r0 | CVE-2023-0286 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.8 head | libssl3 | libssl3@3.0.7-r0 | CVE-2023-0401 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.8 head | libssl3 | libssl3@3.0.7-r0 | CVE-2023-0464 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.8 head | libssl3 | libssl3@3.0.7-r0 | CVE-2023-5363 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.8 head | ncurses-libs | ncurses-libs@6.3_p20221119-r0 | CVE-2023-29491 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.8 head | ncurses-terminfo-base | ncurses-terminfo-base@6.3_p20221119-r0 | CVE-2023-29491 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.8 head | sqlite-libs | sqlite-libs@3.40.0-r0 | CVE-2023-7104 | HIGH | affected | alpine | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.8 head | Python | Flask@1.0.2 | CVE-2023-30861 | HIGH | affected | python-pkg | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.8 head | Python | Werkzeug@0.16.1 | CVE-2023-25577 | HIGH | affected | python-pkg | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.8 head | Python | Werkzeug@0.16.1 | CVE-2024-34069 | HIGH | affected | python-pkg | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.8 head | Python | certifi@2022.12.7 | CVE-2023-37920 | HIGH | affected | python-pkg | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.8 head | Python | setuptools@57.5.0 | CVE-2022-40897 | HIGH | affected | python-pkg | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.8 head | Python | setuptools@57.5.0 | CVE-2024-6345 | HIGH | affected | python-pkg | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.8 head | Python | uWSGI@2.0.20 | CVE-2023-27522 | HIGH | affected | python-pkg | |
rancher/mirrored-idealista-prom2teams:4.2.1 | true | Rancher v2.8 head | Python | urllib3@1.24.3 | CVE-2023-43804 | HIGH | affected | python-pkg | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v1.4.1 | true | Rancher v2.8 head | kube-webhook-certgen | golang.org/x/net@v0.22.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v1.4.1 | true | Rancher v2.8 head | kube-webhook-certgen | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v1.4.1 | true | Rancher v2.8 head | kube-webhook-certgen | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v1.4.1 | true | Rancher v2.8 head | kube-webhook-certgen | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v1.4.3 | true | Rancher v2.8 head | kube-webhook-certgen | golang.org/x/net@v0.28.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v1.4.3 | true | Rancher v2.8 head | kube-webhook-certgen | stdlib@v1.22.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v1.4.4 | true | Rancher v2.8 head | kube-webhook-certgen | golang.org/x/net@v0.28.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20230312-helm-chart-4.5.2-28-g66a760794 | true | Rancher v2.8 head | kube-webhook-certgen | golang.org/x/net@v0.7.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20230312-helm-chart-4.5.2-28-g66a760794 | true | Rancher v2.8 head | kube-webhook-certgen | golang.org/x/net@v0.7.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20230312-helm-chart-4.5.2-28-g66a760794 | true | Rancher v2.8 head | kube-webhook-certgen | stdlib@v1.20.1 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20230312-helm-chart-4.5.2-28-g66a760794 | true | Rancher v2.8 head | kube-webhook-certgen | stdlib@v1.20.1 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20230312-helm-chart-4.5.2-28-g66a760794 | true | Rancher v2.8 head | kube-webhook-certgen | stdlib@v1.20.1 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20230312-helm-chart-4.5.2-28-g66a760794 | true | Rancher v2.8 head | kube-webhook-certgen | stdlib@v1.20.1 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20230312-helm-chart-4.5.2-28-g66a760794 | true | Rancher v2.8 head | kube-webhook-certgen | stdlib@v1.20.1 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20230312-helm-chart-4.5.2-28-g66a760794 | true | Rancher v2.8 head | kube-webhook-certgen | stdlib@v1.20.1 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20230312-helm-chart-4.5.2-28-g66a760794 | true | Rancher v2.8 head | kube-webhook-certgen | stdlib@v1.20.1 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20230312-helm-chart-4.5.2-28-g66a760794 | true | Rancher v2.8 head | kube-webhook-certgen | stdlib@v1.20.1 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20230312-helm-chart-4.5.2-28-g66a760794 | true | Rancher v2.8 head | kube-webhook-certgen | stdlib@v1.20.1 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20230312-helm-chart-4.5.2-28-g66a760794 | true | Rancher v2.8 head | kube-webhook-certgen | stdlib@v1.20.1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20230312-helm-chart-4.5.2-28-g66a760794 | true | Rancher v2.8 head | kube-webhook-certgen | stdlib@v1.20.1 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20230312-helm-chart-4.5.2-28-g66a760794 | true | Rancher v2.8 head | kube-webhook-certgen | stdlib@v1.20.1 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20230312-helm-chart-4.5.2-28-g66a760794 | true | Rancher v2.8 head | kube-webhook-certgen | stdlib@v1.20.1 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20231011-8b53cabe0 | true | Rancher v2.8 head | kube-webhook-certgen | golang.org/x/net@v0.16.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20231011-8b53cabe0 | true | Rancher v2.8 head | kube-webhook-certgen | golang.org/x/net@v0.16.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20231011-8b53cabe0 | true | Rancher v2.8 head | kube-webhook-certgen | stdlib@v1.21.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20231011-8b53cabe0 | true | Rancher v2.8 head | kube-webhook-certgen | stdlib@v1.21.3 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20231011-8b53cabe0 | true | Rancher v2.8 head | kube-webhook-certgen | stdlib@v1.21.3 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20231011-8b53cabe0 | true | Rancher v2.8 head | kube-webhook-certgen | stdlib@v1.21.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20231226-1a7112e06 | true | Rancher v2.8 head | kube-webhook-certgen | golang.org/x/net@v0.17.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20231226-1a7112e06 | true | Rancher v2.8 head | kube-webhook-certgen | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20231226-1a7112e06 | true | Rancher v2.8 head | kube-webhook-certgen | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v20231226-1a7112e06 | true | Rancher v2.8 head | kube-webhook-certgen | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.18.2-distroless | true | Rancher v2.8 head | opt/cni/bin/istio-cni | golang.org/x/crypto@v0.9.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.18.2-distroless | true | Rancher v2.8 head | opt/cni/bin/istio-cni | golang.org/x/net@v0.10.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-istio-install-cni:1.18.2-distroless | true | Rancher v2.8 head | opt/cni/bin/istio-cni | golang.org/x/net@v0.10.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.18.2-distroless | true | Rancher v2.8 head | opt/cni/bin/istio-cni | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-istio-install-cni:1.18.2-distroless | true | Rancher v2.8 head | opt/cni/bin/istio-cni | stdlib@v1.20.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.18.2-distroless | true | Rancher v2.8 head | opt/cni/bin/istio-cni | stdlib@v1.20.6 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-istio-install-cni:1.18.2-distroless | true | Rancher v2.8 head | opt/cni/bin/istio-cni | stdlib@v1.20.6 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.18.2-distroless | true | Rancher v2.8 head | opt/cni/bin/istio-cni | stdlib@v1.20.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.18.2-distroless | true | Rancher v2.8 head | opt/cni/bin/istio-cni | stdlib@v1.20.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.18.2-distroless | true | Rancher v2.8 head | usr/local/bin/install-cni | golang.org/x/crypto@v0.9.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.18.2-distroless | true | Rancher v2.8 head | usr/local/bin/install-cni | golang.org/x/net@v0.10.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-istio-install-cni:1.18.2-distroless | true | Rancher v2.8 head | usr/local/bin/install-cni | golang.org/x/net@v0.10.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.18.2-distroless | true | Rancher v2.8 head | usr/local/bin/install-cni | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-istio-install-cni:1.18.2-distroless | true | Rancher v2.8 head | usr/local/bin/install-cni | stdlib@v1.20.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.18.2-distroless | true | Rancher v2.8 head | usr/local/bin/install-cni | stdlib@v1.20.6 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-istio-install-cni:1.18.2-distroless | true | Rancher v2.8 head | usr/local/bin/install-cni | stdlib@v1.20.6 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.18.2-distroless | true | Rancher v2.8 head | usr/local/bin/install-cni | stdlib@v1.20.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.18.2-distroless | true | Rancher v2.8 head | usr/local/bin/install-cni | stdlib@v1.20.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.19.6-distroless | true | Rancher v2.8 head | opt/cni/bin/istio-cni | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.19.6-distroless | true | Rancher v2.8 head | opt/cni/bin/istio-cni | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.19.6-distroless | true | Rancher v2.8 head | opt/cni/bin/istio-cni | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.19.6-distroless | true | Rancher v2.8 head | usr/local/bin/install-cni | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.19.6-distroless | true | Rancher v2.8 head | usr/local/bin/install-cni | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.19.6-distroless | true | Rancher v2.8 head | usr/local/bin/install-cni | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.20.3-distroless | true | Rancher v2.8 head | opt/cni/bin/istio-cni | stdlib@v1.21.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.20.3-distroless | true | Rancher v2.8 head | opt/cni/bin/istio-cni | stdlib@v1.21.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.20.3-distroless | true | Rancher v2.8 head | opt/cni/bin/istio-cni | stdlib@v1.21.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.20.3-distroless | true | Rancher v2.8 head | usr/local/bin/install-cni | stdlib@v1.21.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.20.3-distroless | true | Rancher v2.8 head | usr/local/bin/install-cni | stdlib@v1.21.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.20.3-distroless | true | Rancher v2.8 head | usr/local/bin/install-cni | stdlib@v1.21.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.21.1-distroless | true | Rancher v2.8 head | libc6 | libc6@2.36-9+deb12u4 | CVE-2024-2961 | HIGH | affected | debian | |
rancher/mirrored-istio-install-cni:1.21.1-distroless | true | Rancher v2.8 head | libc6 | libc6@2.36-9+deb12u4 | CVE-2024-33599 | HIGH | affected | debian | |
rancher/mirrored-istio-install-cni:1.21.1-distroless | true | Rancher v2.8 head | opt/cni/bin/istio-cni | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.21.1-distroless | true | Rancher v2.8 head | opt/cni/bin/istio-cni | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.21.1-distroless | true | Rancher v2.8 head | opt/cni/bin/istio-cni | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.21.1-distroless | true | Rancher v2.8 head | usr/local/bin/install-cni | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.21.1-distroless | true | Rancher v2.8 head | usr/local/bin/install-cni | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-install-cni:1.21.1-distroless | true | Rancher v2.8 head | usr/local/bin/install-cni | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-pilot:1.18.2-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-discovery | github.com/docker/docker@v23.0.3+incompatible | CVE-2024-41110 | CRITICAL | affected | gobinary | |
rancher/mirrored-istio-pilot:1.18.2-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-discovery | golang.org/x/crypto@v0.9.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-pilot:1.18.2-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-discovery | golang.org/x/net@v0.10.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-istio-pilot:1.18.2-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-discovery | golang.org/x/net@v0.10.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-pilot:1.18.2-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-discovery | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-istio-pilot:1.18.2-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-discovery | helm.sh/helm/v3@v3.11.2 | CVE-2024-26147 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-pilot:1.18.2-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-discovery | stdlib@v1.20.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-pilot:1.18.2-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-discovery | stdlib@v1.20.6 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-istio-pilot:1.18.2-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-discovery | stdlib@v1.20.6 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-pilot:1.18.2-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-discovery | stdlib@v1.20.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-pilot:1.18.2-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-discovery | stdlib@v1.20.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-pilot:1.19.6-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-discovery | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-pilot:1.19.6-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-discovery | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-pilot:1.19.6-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-discovery | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-pilot:1.20.3-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-discovery | stdlib@v1.21.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-pilot:1.20.3-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-discovery | stdlib@v1.21.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-pilot:1.20.3-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-discovery | stdlib@v1.21.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-pilot:1.21.1-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-discovery | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-pilot:1.21.1-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-discovery | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-pilot:1.21.1-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-discovery | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-proxyv2:1.19.6-distroless | true | Rancher v2.8 head | libc6 | libc6@2.36-9+deb12u3 | CVE-2023-6246 | HIGH | affected | debian | |
rancher/mirrored-istio-proxyv2:1.19.6-distroless | true | Rancher v2.8 head | libc6 | libc6@2.36-9+deb12u3 | CVE-2023-6779 | HIGH | affected | debian | |
rancher/mirrored-istio-proxyv2:1.19.6-distroless | true | Rancher v2.8 head | libc6 | libc6@2.36-9+deb12u3 | CVE-2024-2961 | HIGH | affected | debian | |
rancher/mirrored-istio-proxyv2:1.19.6-distroless | true | Rancher v2.8 head | libc6 | libc6@2.36-9+deb12u3 | CVE-2024-33599 | HIGH | affected | debian | |
rancher/mirrored-istio-proxyv2:1.19.6-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-agent | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-proxyv2:1.19.6-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-agent | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-proxyv2:1.19.6-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-agent | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-proxyv2:1.21.1-distroless | true | Rancher v2.8 head | libc6 | libc6@2.36-9+deb12u4 | CVE-2024-2961 | HIGH | affected | debian | |
rancher/mirrored-istio-proxyv2:1.21.1-distroless | true | Rancher v2.8 head | libc6 | libc6@2.36-9+deb12u4 | CVE-2024-33599 | HIGH | affected | debian | |
rancher/mirrored-istio-proxyv2:1.21.1-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-agent | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-proxyv2:1.21.1-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-agent | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-istio-proxyv2:1.21.1-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-agent | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.52.0 | true | Rancher v2.8 head | go/bin/all-in-one-linux | github.com/mostynb/go-grpc-compression@v1.2.2 | GHSA-87m9-rv8p-rgmg | HIGH | affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.52.0 | true | Rancher v2.8 head | go/bin/all-in-one-linux | go.opentelemetry.io/collector/config/configgrpc@v0.90.1 | CVE-2024-36129 | HIGH | affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.52.0 | true | Rancher v2.8 head | go/bin/all-in-one-linux | go.opentelemetry.io/collector/config/confighttp@v0.90.1 | CVE-2024-36129 | HIGH | affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.52.0 | true | Rancher v2.8 head | go/bin/all-in-one-linux | stdlib@v1.21.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.52.0 | true | Rancher v2.8 head | go/bin/all-in-one-linux | stdlib@v1.21.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.52.0 | true | Rancher v2.8 head | go/bin/all-in-one-linux | stdlib@v1.21.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.56.0 | true | Rancher v2.8 head | go/bin/all-in-one-linux | github.com/mostynb/go-grpc-compression@v1.2.2 | GHSA-87m9-rv8p-rgmg | HIGH | affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.56.0 | true | Rancher v2.8 head | go/bin/all-in-one-linux | go.opentelemetry.io/collector/config/configgrpc@v0.97.0 | CVE-2024-36129 | HIGH | affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.56.0 | true | Rancher v2.8 head | go/bin/all-in-one-linux | go.opentelemetry.io/collector/config/confighttp@v0.97.0 | CVE-2024-36129 | HIGH | affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.56.0 | true | Rancher v2.8 head | go/bin/all-in-one-linux | stdlib@v1.22.1 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.56.0 | true | Rancher v2.8 head | go/bin/all-in-one-linux | stdlib@v1.22.1 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.56.0 | true | Rancher v2.8 head | go/bin/all-in-one-linux | stdlib@v1.22.1 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jaegertracing-all-in-one:1.56.0 | true | Rancher v2.8 head | go/bin/all-in-one-linux | stdlib@v1.22.1 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.8.0 | true | Rancher v2.8 head | configmap-reload | stdlib@v1.19.2 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.8.0 | true | Rancher v2.8 head | configmap-reload | stdlib@v1.19.2 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.8.0 | true | Rancher v2.8 head | configmap-reload | stdlib@v1.19.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.8.0 | true | Rancher v2.8 head | configmap-reload | stdlib@v1.19.2 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.8.0 | true | Rancher v2.8 head | configmap-reload | stdlib@v1.19.2 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.8.0 | true | Rancher v2.8 head | configmap-reload | stdlib@v1.19.2 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.8.0 | true | Rancher v2.8 head | configmap-reload | stdlib@v1.19.2 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.8.0 | true | Rancher v2.8 head | configmap-reload | stdlib@v1.19.2 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.8.0 | true | Rancher v2.8 head | configmap-reload | stdlib@v1.19.2 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.8.0 | true | Rancher v2.8 head | configmap-reload | stdlib@v1.19.2 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.8.0 | true | Rancher v2.8 head | configmap-reload | stdlib@v1.19.2 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.8.0 | true | Rancher v2.8 head | configmap-reload | stdlib@v1.19.2 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.8.0 | true | Rancher v2.8 head | configmap-reload | stdlib@v1.19.2 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.8.0 | true | Rancher v2.8 head | configmap-reload | stdlib@v1.19.2 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.8.0 | true | Rancher v2.8 head | configmap-reload | stdlib@v1.19.2 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.8.0 | true | Rancher v2.8 head | configmap-reload | stdlib@v1.19.2 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.8.0 | true | Rancher v2.8 head | configmap-reload | stdlib@v1.19.2 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.8.0 | true | Rancher v2.8 head | configmap-reload | stdlib@v1.19.2 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.8.0 | true | Rancher v2.8 head | configmap-reload | stdlib@v1.19.2 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-jimmidyson-configmap-reload:v0.8.0 | true | Rancher v2.8 head | configmap-reload | stdlib@v1.19.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-dnsmasq-nanny:1.22.28 | true | Rancher v2.8 head | libc6 | libc6@2.31-13+deb11u7 | CVE-2024-2961 | HIGH | affected | debian | |
rancher/mirrored-k8s-dns-dnsmasq-nanny:1.22.28 | true | Rancher v2.8 head | libc6 | libc6@2.31-13+deb11u7 | CVE-2024-33599 | HIGH | affected | debian | |
rancher/mirrored-k8s-dns-dnsmasq-nanny:1.22.28 | true | Rancher v2.8 head | dnsmasq-nanny | stdlib@v1.21.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-dnsmasq-nanny:1.22.28 | true | Rancher v2.8 head | dnsmasq-nanny | stdlib@v1.21.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-dnsmasq-nanny:1.22.28 | true | Rancher v2.8 head | dnsmasq-nanny | stdlib@v1.21.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-kube-dns:1.22.28 | true | Rancher v2.8 head | kube-dns | stdlib@v1.21.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-kube-dns:1.22.28 | true | Rancher v2.8 head | kube-dns | stdlib@v1.21.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-kube-dns:1.22.28 | true | Rancher v2.8 head | kube-dns | stdlib@v1.21.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.22.28 | true | Rancher v2.8 head | libc6 | libc6@2.36-9+deb12u3 | CVE-2023-6246 | HIGH | affected | debian | |
rancher/mirrored-k8s-dns-node-cache:1.22.28 | true | Rancher v2.8 head | libc6 | libc6@2.36-9+deb12u3 | CVE-2023-6779 | HIGH | affected | debian | |
rancher/mirrored-k8s-dns-node-cache:1.22.28 | true | Rancher v2.8 head | libc6 | libc6@2.36-9+deb12u3 | CVE-2024-2961 | HIGH | affected | debian | |
rancher/mirrored-k8s-dns-node-cache:1.22.28 | true | Rancher v2.8 head | libc6 | libc6@2.36-9+deb12u3 | CVE-2024-33599 | HIGH | affected | debian | |
rancher/mirrored-k8s-dns-node-cache:1.22.28 | true | Rancher v2.8 head | libssl3 | libssl3@3.0.11-1~deb12u1 | CVE-2023-5363 | HIGH | affected | debian | |
rancher/mirrored-k8s-dns-node-cache:1.22.28 | true | Rancher v2.8 head | go-runner | stdlib@v1.21.1 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.22.28 | true | Rancher v2.8 head | go-runner | stdlib@v1.21.1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.22.28 | true | Rancher v2.8 head | go-runner | stdlib@v1.21.1 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.22.28 | true | Rancher v2.8 head | go-runner | stdlib@v1.21.1 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.22.28 | true | Rancher v2.8 head | go-runner | stdlib@v1.21.1 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.22.28 | true | Rancher v2.8 head | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2023-5528 | HIGH | affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.22.28 | true | Rancher v2.8 head | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2024-0793 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.22.28 | true | Rancher v2.8 head | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.22.28 | true | Rancher v2.8 head | node-cache | stdlib@v1.21.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.22.28 | true | Rancher v2.8 head | node-cache | stdlib@v1.21.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-node-cache:1.22.28 | true | Rancher v2.8 head | node-cache | stdlib@v1.21.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-sidecar:1.22.28 | true | Rancher v2.8 head | sidecar | stdlib@v1.21.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-sidecar:1.22.28 | true | Rancher v2.8 head | sidecar | stdlib@v1.21.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-k8s-dns-sidecar:1.22.28 | true | Rancher v2.8 head | sidecar | stdlib@v1.21.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.8 head | glibc | glibc@2.28-225.el8 | CVE-2023-4911 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.8 head | glibc | glibc@2.28-225.el8 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.8 head | glibc | glibc@2.28-225.el8 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.8 head | glibc-common | glibc-common@2.28-225.el8 | CVE-2023-4911 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.8 head | glibc-common | glibc-common@2.28-225.el8 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.8 head | glibc-common | glibc-common@2.28-225.el8 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.8 head | glibc-minimal-langpack | glibc-minimal-langpack@2.28-225.el8 | CVE-2023-4911 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.8 head | glibc-minimal-langpack | glibc-minimal-langpack@2.28-225.el8 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.8 head | glibc-minimal-langpack | glibc-minimal-langpack@2.28-225.el8 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.8 head | opt/kiali/kiali | golang.org/x/net@v0.8.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.8 head | opt/kiali/kiali | google.golang.org/grpc@v1.55.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.8 head | opt/kiali/kiali | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.8 head | opt/kiali/kiali | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.8 head | opt/kiali/kiali | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.8 head | opt/kiali/kiali | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.8 head | opt/kiali/kiali | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kiali-kiali:v1.79.0 | true | Rancher v2.8 head | glibc | glibc@2.28-236.el8.7 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.79.0 | true | Rancher v2.8 head | glibc | glibc@2.28-236.el8.7 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.79.0 | true | Rancher v2.8 head | glibc-common | glibc-common@2.28-236.el8.7 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.79.0 | true | Rancher v2.8 head | glibc-common | glibc-common@2.28-236.el8.7 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.79.0 | true | Rancher v2.8 head | glibc-minimal-langpack | glibc-minimal-langpack@2.28-236.el8.7 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.79.0 | true | Rancher v2.8 head | glibc-minimal-langpack | glibc-minimal-langpack@2.28-236.el8.7 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-kiali-kiali:v1.79.0 | true | Rancher v2.8 head | opt/kiali/kiali | google.golang.org/grpc@v1.55.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-kiali-kiali:v1.79.0 | true | Rancher v2.8 head | opt/kiali/kiali | stdlib@v1.20.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kiali-kiali:v1.79.0 | true | Rancher v2.8 head | opt/kiali/kiali | stdlib@v1.20.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kiali-kiali:v1.79.0 | true | Rancher v2.8 head | opt/kiali/kiali | stdlib@v1.20.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kiali-kiali:v1.79.0 | true | Rancher v2.8 head | opt/kiali/kiali | stdlib@v1.20.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.26.1 | true | Rancher v2.8 head | libexpat | libexpat@2.5.0-r2 | CVE-2024-45491 | CRITICAL | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.26.1 | true | Rancher v2.8 head | libexpat | libexpat@2.5.0-r2 | CVE-2024-45492 | CRITICAL | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.26.1 | true | Rancher v2.8 head | libexpat | libexpat@2.5.0-r2 | CVE-2023-52425 | HIGH | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.26.1 | true | Rancher v2.8 head | libexpat | libexpat@2.5.0-r2 | CVE-2024-28757 | HIGH | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.26.1 | true | Rancher v2.8 head | libexpat | libexpat@2.5.0-r2 | CVE-2024-45490 | HIGH | affected | alpine | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.26.1 | true | Rancher v2.8 head | Python | setuptools@69.0.3 | CVE-2024-6345 | HIGH | affected | python-pkg | |
rancher/mirrored-kiwigrid-k8s-sidecar:1.26.1 | true | Rancher v2.8 head | Python | setuptools@69.1.1 | CVE-2024-6345 | HIGH | affected | python-pkg | |
rancher/mirrored-kube-logging-config-reloader:v0.0.5 | true | Rancher v2.8 head | config-reloader | stdlib@v1.20.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-logging-config-reloader:v0.0.5 | true | Rancher v2.8 head | config-reloader | stdlib@v1.20.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-kube-logging-config-reloader:v0.0.5 | true | Rancher v2.8 head | config-reloader | stdlib@v1.20.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-kube-logging-config-reloader:v0.0.5 | true | Rancher v2.8 head | config-reloader | stdlib@v1.20.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-logging-config-reloader:v0.0.5 | true | Rancher v2.8 head | config-reloader | stdlib@v1.20.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-logging-config-reloader:v0.0.5 | true | Rancher v2.8 head | config-reloader | stdlib@v1.20.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-logging-fluentd:v1.16-4.8-full | true | Rancher v2.8 head | Ruby | google-protobuf@3.21.12 | CVE-2024-7254 | HIGH | affected | gemspec | |
rancher/mirrored-kube-logging-fluentd:v1.16-4.8-full | true | Rancher v2.8 head | Ruby | rack@3.0.9.1 | CVE-2025-27610 | HIGH | affected | gemspec | |
rancher/mirrored-kube-logging-fluentd:v1.16-4.8-full | true | Rancher v2.8 head | Ruby | rexml@3.2.5 | CVE-2024-49761 | HIGH | affected | gemspec | |
rancher/mirrored-kube-logging-fluentd:v1.16-4.8-full | true | Rancher v2.8 head | Ruby | rexml@3.2.6 | CVE-2024-49761 | HIGH | affected | gemspec | |
rancher/mirrored-kube-logging-fluentd:v1.16-4.8-full | true | Rancher v2.8 head | Ruby | webrick@1.8.1 | CVE-2024-47220 | HIGH | affected | gemspec | |
rancher/mirrored-kube-logging-logging-operator:4.8.0 | true | Rancher v2.8 head | manager | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-rbac-proxy:v0.14.0 | true | Rancher v2.8 head | usr/local/bin/kube-rbac-proxy | golang.org/x/net@v0.4.0 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-kube-rbac-proxy:v0.14.0 | true | Rancher v2.8 head | usr/local/bin/kube-rbac-proxy | golang.org/x/net@v0.4.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-kube-rbac-proxy:v0.14.0 | true | Rancher v2.8 head | usr/local/bin/kube-rbac-proxy | google.golang.org/grpc@v1.47.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-kube-rbac-proxy:v0.14.0 | true | Rancher v2.8 head | usr/local/bin/kube-rbac-proxy | stdlib@v1.19.4 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-rbac-proxy:v0.14.0 | true | Rancher v2.8 head | usr/local/bin/kube-rbac-proxy | stdlib@v1.19.4 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-rbac-proxy:v0.14.0 | true | Rancher v2.8 head | usr/local/bin/kube-rbac-proxy | stdlib@v1.19.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-rbac-proxy:v0.14.0 | true | Rancher v2.8 head | usr/local/bin/kube-rbac-proxy | stdlib@v1.19.4 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-kube-rbac-proxy:v0.14.0 | true | Rancher v2.8 head | usr/local/bin/kube-rbac-proxy | stdlib@v1.19.4 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-kube-rbac-proxy:v0.14.0 | true | Rancher v2.8 head | usr/local/bin/kube-rbac-proxy | stdlib@v1.19.4 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-kube-rbac-proxy:v0.14.0 | true | Rancher v2.8 head | usr/local/bin/kube-rbac-proxy | stdlib@v1.19.4 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-rbac-proxy:v0.14.0 | true | Rancher v2.8 head | usr/local/bin/kube-rbac-proxy | stdlib@v1.19.4 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-kube-rbac-proxy:v0.14.0 | true | Rancher v2.8 head | usr/local/bin/kube-rbac-proxy | stdlib@v1.19.4 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-rbac-proxy:v0.14.0 | true | Rancher v2.8 head | usr/local/bin/kube-rbac-proxy | stdlib@v1.19.4 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-kube-rbac-proxy:v0.14.0 | true | Rancher v2.8 head | usr/local/bin/kube-rbac-proxy | stdlib@v1.19.4 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-kube-rbac-proxy:v0.14.0 | true | Rancher v2.8 head | usr/local/bin/kube-rbac-proxy | stdlib@v1.19.4 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-kube-rbac-proxy:v0.14.0 | true | Rancher v2.8 head | usr/local/bin/kube-rbac-proxy | stdlib@v1.19.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-kube-rbac-proxy:v0.14.0 | true | Rancher v2.8 head | usr/local/bin/kube-rbac-proxy | stdlib@v1.19.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-kube-rbac-proxy:v0.14.0 | true | Rancher v2.8 head | usr/local/bin/kube-rbac-proxy | stdlib@v1.19.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-rbac-proxy:v0.14.0 | true | Rancher v2.8 head | usr/local/bin/kube-rbac-proxy | stdlib@v1.19.4 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-kube-rbac-proxy:v0.14.0 | true | Rancher v2.8 head | usr/local/bin/kube-rbac-proxy | stdlib@v1.19.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-rbac-proxy:v0.14.0 | true | Rancher v2.8 head | usr/local/bin/kube-rbac-proxy | stdlib@v1.19.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-rbac-proxy:v0.15.0 | true | Rancher v2.8 head | usr/local/bin/kube-rbac-proxy | google.golang.org/grpc@v1.47.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-kube-rbac-proxy:v0.15.0 | true | Rancher v2.8 head | usr/local/bin/kube-rbac-proxy | stdlib@v1.21.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-rbac-proxy:v0.15.0 | true | Rancher v2.8 head | usr/local/bin/kube-rbac-proxy | stdlib@v1.21.3 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-rbac-proxy:v0.15.0 | true | Rancher v2.8 head | usr/local/bin/kube-rbac-proxy | stdlib@v1.21.3 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-rbac-proxy:v0.15.0 | true | Rancher v2.8 head | usr/local/bin/kube-rbac-proxy | stdlib@v1.21.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.10.1 | true | Rancher v2.8 head | kube-state-metrics | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.10.1 | true | Rancher v2.8 head | kube-state-metrics | golang.org/x/net@v0.17.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.10.1 | true | Rancher v2.8 head | kube-state-metrics | stdlib@v1.20.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.10.1 | true | Rancher v2.8 head | kube-state-metrics | stdlib@v1.20.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.10.1 | true | Rancher v2.8 head | kube-state-metrics | stdlib@v1.20.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-state-metrics-kube-state-metrics:v2.10.1 | true | Rancher v2.8 head | kube-state-metrics | stdlib@v1.20.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.8 head | libcrypto1.1 | libcrypto1.1@1.1.1q-r0 | CVE-2022-4450 | HIGH | affected | alpine | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.8 head | libcrypto1.1 | libcrypto1.1@1.1.1q-r0 | CVE-2023-0215 | HIGH | affected | alpine | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.8 head | libcrypto1.1 | libcrypto1.1@1.1.1q-r0 | CVE-2023-0286 | HIGH | affected | alpine | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.8 head | libcrypto1.1 | libcrypto1.1@1.1.1q-r0 | CVE-2023-0464 | HIGH | affected | alpine | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.8 head | libssl1.1 | libssl1.1@1.1.1q-r0 | CVE-2022-4450 | HIGH | affected | alpine | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.8 head | libssl1.1 | libssl1.1@1.1.1q-r0 | CVE-2023-0215 | HIGH | affected | alpine | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.8 head | libssl1.1 | libssl1.1@1.1.1q-r0 | CVE-2023-0286 | HIGH | affected | alpine | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.8 head | libssl1.1 | libssl1.1@1.1.1q-r0 | CVE-2023-0464 | HIGH | affected | alpine | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.8 head | kube-vip | github.com/osrg/gobgp/v3@v3.12.0 | CVE-2023-46565 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.8 head | kube-vip | google.golang.org/grpc@v1.51.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.8 head | kube-vip | stdlib@v1.19.2 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.8 head | kube-vip | stdlib@v1.19.2 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.8 head | kube-vip | stdlib@v1.19.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.8 head | kube-vip | stdlib@v1.19.2 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.8 head | kube-vip | stdlib@v1.19.2 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.8 head | kube-vip | stdlib@v1.19.2 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.8 head | kube-vip | stdlib@v1.19.2 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.8 head | kube-vip | stdlib@v1.19.2 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.8 head | kube-vip | stdlib@v1.19.2 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.8 head | kube-vip | stdlib@v1.19.2 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.8 head | kube-vip | stdlib@v1.19.2 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.8 head | kube-vip | stdlib@v1.19.2 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.8 head | kube-vip | stdlib@v1.19.2 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.8 head | kube-vip | stdlib@v1.19.2 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.8 head | kube-vip | stdlib@v1.19.2 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.8 head | kube-vip | stdlib@v1.19.2 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.8 head | kube-vip | stdlib@v1.19.2 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.8 head | kube-vip | stdlib@v1.19.2 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.8 head | kube-vip | stdlib@v1.19.2 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.8 head | kube-vip | stdlib@v1.19.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.8.7 | true | Rancher v2.8 head | libcrypto3 | libcrypto3@3.3.2-r1 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.8.7 | true | Rancher v2.8 head | libssl3 | libssl3@3.3.2-r1 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | apk-tools | apk-tools@2.10.5-r1 | CVE-2021-36159 | CRITICAL | affected | alpine | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | apk-tools | apk-tools@2.10.5-r1 | CVE-2021-30139 | HIGH | affected | alpine | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | busybox | busybox@1.31.1-r16 | CVE-2021-28831 | HIGH | affected | alpine | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | busybox | busybox@1.31.1-r16 | CVE-2021-42378 | HIGH | affected | alpine | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | busybox | busybox@1.31.1-r16 | CVE-2021-42379 | HIGH | affected | alpine | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | busybox | busybox@1.31.1-r16 | CVE-2021-42380 | HIGH | affected | alpine | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | busybox | busybox@1.31.1-r16 | CVE-2021-42381 | HIGH | affected | alpine | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | busybox | busybox@1.31.1-r16 | CVE-2021-42382 | HIGH | affected | alpine | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | busybox | busybox@1.31.1-r16 | CVE-2021-42383 | HIGH | affected | alpine | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | busybox | busybox@1.31.1-r16 | CVE-2021-42384 | HIGH | affected | alpine | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | busybox | busybox@1.31.1-r16 | CVE-2021-42385 | HIGH | affected | alpine | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | busybox | busybox@1.31.1-r16 | CVE-2021-42386 | HIGH | affected | alpine | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | busybox | busybox@1.31.1-r16 | CVE-2022-28391 | HIGH | affected | alpine | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | libcrypto1.1 | libcrypto1.1@1.1.1g-r0 | CVE-2021-3711 | CRITICAL | affected | alpine | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | libcrypto1.1 | libcrypto1.1@1.1.1g-r0 | CVE-2021-23840 | HIGH | affected | alpine | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | libcrypto1.1 | libcrypto1.1@1.1.1g-r0 | CVE-2021-3450 | HIGH | affected | alpine | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | libcrypto1.1 | libcrypto1.1@1.1.1g-r0 | CVE-2021-3712 | HIGH | affected | alpine | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | libcrypto1.1 | libcrypto1.1@1.1.1g-r0 | CVE-2022-0778 | HIGH | affected | alpine | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | libssl1.1 | libssl1.1@1.1.1g-r0 | CVE-2021-3711 | CRITICAL | affected | alpine | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | libssl1.1 | libssl1.1@1.1.1g-r0 | CVE-2021-23840 | HIGH | affected | alpine | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | libssl1.1 | libssl1.1@1.1.1g-r0 | CVE-2021-3450 | HIGH | affected | alpine | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | libssl1.1 | libssl1.1@1.1.1g-r0 | CVE-2021-3712 | HIGH | affected | alpine | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | libssl1.1 | libssl1.1@1.1.1g-r0 | CVE-2022-0778 | HIGH | affected | alpine | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | ssl_client | ssl_client@1.31.1-r16 | CVE-2021-28831 | HIGH | affected | alpine | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | ssl_client | ssl_client@1.31.1-r16 | CVE-2021-42378 | HIGH | affected | alpine | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | ssl_client | ssl_client@1.31.1-r16 | CVE-2021-42379 | HIGH | affected | alpine | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | ssl_client | ssl_client@1.31.1-r16 | CVE-2021-42380 | HIGH | affected | alpine | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | ssl_client | ssl_client@1.31.1-r16 | CVE-2021-42381 | HIGH | affected | alpine | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | ssl_client | ssl_client@1.31.1-r16 | CVE-2021-42382 | HIGH | affected | alpine | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | ssl_client | ssl_client@1.31.1-r16 | CVE-2021-42383 | HIGH | affected | alpine | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | ssl_client | ssl_client@1.31.1-r16 | CVE-2021-42384 | HIGH | affected | alpine | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | ssl_client | ssl_client@1.31.1-r16 | CVE-2021-42385 | HIGH | affected | alpine | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | ssl_client | ssl_client@1.31.1-r16 | CVE-2021-42386 | HIGH | affected | alpine | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | ssl_client | ssl_client@1.31.1-r16 | CVE-2022-28391 | HIGH | affected | alpine | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | zlib | zlib@1.2.11-r3 | CVE-2022-37434 | CRITICAL | affected | alpine | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | zlib | zlib@1.2.11-r3 | CVE-2018-25032 | HIGH | affected | alpine | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | github.com/dgrijalva/jwt-go@v3.2.0+incompatible | CVE-2020-26160 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | github.com/gogo/protobuf@v1.3.1 | CVE-2021-3121 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | github.com/projectcontour/contour@v1.5.0 | CVE-2021-32783 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | github.com/prometheus/client_golang@v1.7.1 | CVE-2022-21698 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | go.etcd.io/etcd@v0.5.0-alpha.5.0.20200401174654-e694b7bb0875 | CVE-2020-15114 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | golang.org/x/crypto@v0.0.0-20200220183623-bac4c82f6975 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | golang.org/x/crypto@v0.0.0-20200220183623-bac4c82f6975 | CVE-2020-29652 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | golang.org/x/crypto@v0.0.0-20200220183623-bac4c82f6975 | CVE-2021-43565 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | golang.org/x/crypto@v0.0.0-20200220183623-bac4c82f6975 | CVE-2022-27191 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | golang.org/x/net@v0.0.0-20200324143707-d3edc9973b7e | CVE-2021-33194 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | golang.org/x/net@v0.0.0-20200324143707-d3edc9973b7e | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | golang.org/x/net@v0.0.0-20200324143707-d3edc9973b7e | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | golang.org/x/net@v0.0.0-20200324143707-d3edc9973b7e | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | golang.org/x/net@v0.0.0-20200324143707-d3edc9973b7e | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | golang.org/x/text@v0.3.2 | CVE-2021-38561 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | golang.org/x/text@v0.3.2 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | google.golang.org/grpc@v1.26.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2020-16845 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2020-28362 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2021-27918 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2021-33195 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2021-33196 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2021-33198 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2021-39293 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-kubernetes-external-dns:v0.7.3 | true | Rancher v2.8 head | bin/external-dns | stdlib@v1.14.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-library-nginx:1.23.2-alpine | true | Rancher v2.8 head | curl | curl@7.83.1-r4 | CVE-2023-23914 | CRITICAL | affected | alpine | |
rancher/mirrored-library-nginx:1.23.2-alpine | true | Rancher v2.8 head | curl | curl@7.83.1-r4 | CVE-2023-38545 | CRITICAL | affected | alpine | |
rancher/mirrored-library-nginx:1.23.2-alpine | true | Rancher v2.8 head | curl | curl@7.83.1-r4 | CVE-2022-43551 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.23.2-alpine | true | Rancher v2.8 head | curl | curl@7.83.1-r4 | CVE-2023-27533 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.23.2-alpine | true | Rancher v2.8 head | curl | curl@7.83.1-r4 | CVE-2023-27534 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.23.2-alpine | true | Rancher v2.8 head | curl | curl@7.83.1-r4 | CVE-2023-28319 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.23.2-alpine | true | Rancher v2.8 head | curl | curl@7.83.1-r4 | CVE-2023-38039 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.23.2-alpine | true | Rancher v2.8 head | libcrypto1.1 | libcrypto1.1@1.1.1s-r0 | CVE-2022-4450 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.23.2-alpine | true | Rancher v2.8 head | libcrypto1.1 | libcrypto1.1@1.1.1s-r0 | CVE-2023-0215 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.23.2-alpine | true | Rancher v2.8 head | libcrypto1.1 | libcrypto1.1@1.1.1s-r0 | CVE-2023-0286 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.23.2-alpine | true | Rancher v2.8 head | libcrypto1.1 | libcrypto1.1@1.1.1s-r0 | CVE-2023-0464 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.23.2-alpine | true | Rancher v2.8 head | libcurl | libcurl@7.83.1-r4 | CVE-2023-23914 | CRITICAL | affected | alpine | |
rancher/mirrored-library-nginx:1.23.2-alpine | true | Rancher v2.8 head | libcurl | libcurl@7.83.1-r4 | CVE-2023-38545 | CRITICAL | affected | alpine | |
rancher/mirrored-library-nginx:1.23.2-alpine | true | Rancher v2.8 head | libcurl | libcurl@7.83.1-r4 | CVE-2022-43551 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.23.2-alpine | true | Rancher v2.8 head | libcurl | libcurl@7.83.1-r4 | CVE-2023-27533 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.23.2-alpine | true | Rancher v2.8 head | libcurl | libcurl@7.83.1-r4 | CVE-2023-27534 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.23.2-alpine | true | Rancher v2.8 head | libcurl | libcurl@7.83.1-r4 | CVE-2023-28319 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.23.2-alpine | true | Rancher v2.8 head | libcurl | libcurl@7.83.1-r4 | CVE-2023-38039 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.23.2-alpine | true | Rancher v2.8 head | libssl1.1 | libssl1.1@1.1.1s-r0 | CVE-2022-4450 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.23.2-alpine | true | Rancher v2.8 head | libssl1.1 | libssl1.1@1.1.1s-r0 | CVE-2023-0215 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.23.2-alpine | true | Rancher v2.8 head | libssl1.1 | libssl1.1@1.1.1s-r0 | CVE-2023-0286 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.23.2-alpine | true | Rancher v2.8 head | libssl1.1 | libssl1.1@1.1.1s-r0 | CVE-2023-0464 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.23.2-alpine | true | Rancher v2.8 head | libwebp | libwebp@1.2.3-r0 | CVE-2023-1999 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.23.2-alpine | true | Rancher v2.8 head | libwebp | libwebp@1.2.3-r0 | CVE-2023-4863 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.23.2-alpine | true | Rancher v2.8 head | ncurses-libs | ncurses-libs@6.3_p20220521-r0 | CVE-2023-29491 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.23.2-alpine | true | Rancher v2.8 head | ncurses-terminfo-base | ncurses-terminfo-base@6.3_p20220521-r0 | CVE-2023-29491 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.23.2-alpine | true | Rancher v2.8 head | nghttp2-libs | nghttp2-libs@1.47.0-r0 | CVE-2023-35945 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.23.2-alpine | true | Rancher v2.8 head | nghttp2-libs | nghttp2-libs@1.47.0-r0 | CVE-2023-44487 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.23.2-alpine | true | Rancher v2.8 head | pcre2 | pcre2@10.40-r0 | CVE-2022-41409 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.24.0-alpine | true | Rancher v2.8 head | curl | curl@8.5.0-r0 | CVE-2024-2398 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.24.0-alpine | true | Rancher v2.8 head | curl | curl@8.5.0-r0 | CVE-2024-6197 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.24.0-alpine | true | Rancher v2.8 head | libcurl | libcurl@8.5.0-r0 | CVE-2024-2398 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.24.0-alpine | true | Rancher v2.8 head | libcurl | libcurl@8.5.0-r0 | CVE-2024-6197 | HIGH | affected | alpine | |
rancher/mirrored-library-nginx:1.24.0-alpine | true | Rancher v2.8 head | libexpat | libexpat@2.6.2-r0 | CVE-2024-45491 | CRITICAL | affected | alpine | |
rancher/mirrored-library-nginx:1.24.0-alpine | true | Rancher v2.8 head | libexpat | libexpat@2.6.2-r0 | CVE-2024-45492 | CRITICAL | affected | alpine | |
rancher/mirrored-library-nginx:1.24.0-alpine | true | Rancher v2.8 head | libexpat | libexpat@2.6.2-r0 | CVE-2024-45490 | HIGH | affected | alpine | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | busybox | busybox@1.36.0-r9 | CVE-2022-48174 | CRITICAL | affected | alpine | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | busybox-binsh | busybox-binsh@1.36.0-r9 | CVE-2022-48174 | CRITICAL | affected | alpine | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | libcrypto3 | libcrypto3@3.1.0-r4 | CVE-2023-5363 | HIGH | affected | alpine | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | libssl3 | libssl3@3.1.0-r4 | CVE-2023-5363 | HIGH | affected | alpine | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | ssl_client | ssl_client@1.36.0-r9 | CVE-2022-48174 | CRITICAL | affected | alpine | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | bin/registry | stdlib@v1.16.15 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | bin/registry | stdlib@v1.16.15 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | bin/registry | stdlib@v1.16.15 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | bin/registry | stdlib@v1.16.15 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | bin/registry | stdlib@v1.16.15 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | bin/registry | stdlib@v1.16.15 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | bin/registry | stdlib@v1.16.15 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | bin/registry | stdlib@v1.16.15 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | bin/registry | stdlib@v1.16.15 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | bin/registry | stdlib@v1.16.15 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | bin/registry | stdlib@v1.16.15 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | bin/registry | stdlib@v1.16.15 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | bin/registry | stdlib@v1.16.15 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | bin/registry | stdlib@v1.16.15 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | bin/registry | stdlib@v1.16.15 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | bin/registry | stdlib@v1.16.15 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | bin/registry | stdlib@v1.16.15 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | bin/registry | stdlib@v1.16.15 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | bin/registry | stdlib@v1.16.15 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | bin/registry | stdlib@v1.16.15 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | bin/registry | stdlib@v1.16.15 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | bin/registry | stdlib@v1.16.15 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | bin/registry | stdlib@v1.16.15 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | bin/registry | stdlib@v1.16.15 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | bin/registry | stdlib@v1.16.15 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | bin/registry | stdlib@v1.16.15 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | bin/registry | stdlib@v1.16.15 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | bin/registry | stdlib@v1.16.15 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | bin/registry | stdlib@v1.16.15 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | bin/registry | stdlib@v1.16.15 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | bin/registry | stdlib@v1.16.15 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | bin/registry | stdlib@v1.16.15 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | bin/registry | stdlib@v1.16.15 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | bin/registry | stdlib@v1.16.15 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | bin/registry | stdlib@v1.16.15 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-library-registry:2.8.1 | true | Rancher v2.8 head | bin/registry | stdlib@v1.16.15 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-library-traefik:2.10.7 | true | Rancher v2.8 head | usr/local/bin/traefik | github.com/docker/docker@v20.10.21+incompatible | CVE-2023-28840 | HIGH | affected | gobinary | |
rancher/mirrored-library-traefik:2.10.7 | true | Rancher v2.8 head | usr/local/bin/traefik | github.com/quic-go/quic-go@v0.39.1 | CVE-2024-22189 | HIGH | affected | gobinary | |
rancher/mirrored-library-traefik:2.10.7 | true | Rancher v2.8 head | usr/local/bin/traefik | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-library-traefik:2.10.7 | true | Rancher v2.8 head | usr/local/bin/traefik | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-library-traefik:2.10.7 | true | Rancher v2.8 head | usr/local/bin/traefik | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-library-traefik:2.11.10 | true | Rancher v2.8 head | libcrypto3 | libcrypto3@3.3.2-r0 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-library-traefik:2.11.10 | true | Rancher v2.8 head | libssl3 | libssl3@3.3.2-r0 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-library-traefik:2.11.8 | true | Rancher v2.8 head | libcrypto3 | libcrypto3@3.3.2-r0 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-library-traefik:2.11.8 | true | Rancher v2.8 head | libssl3 | libssl3@3.3.2-r0 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/mirrored-library-traefik:2.11.8 | true | Rancher v2.8 head | usr/local/bin/traefik | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-backing-image-manager:v1.7.3 | true | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.20.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | github.com/prometheus/client_golang@v1.9.0 | CVE-2022-21698 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | golang.org/x/net@v0.0.0-20210410081132-afb366fc7cd1 | CVE-2021-33194 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | golang.org/x/net@v0.0.0-20210410081132-afb366fc7cd1 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | golang.org/x/net@v0.0.0-20210410081132-afb366fc7cd1 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | golang.org/x/net@v0.0.0-20210410081132-afb366fc7cd1 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | golang.org/x/net@v0.0.0-20210410081132-afb366fc7cd1 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | golang.org/x/text@v0.3.6 | CVE-2021-38561 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | golang.org/x/text@v0.3.6 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | google.golang.org/grpc@v1.36.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | gopkg.in/yaml.v3@v3.0.0-20210107192922-496545a6307b | CVE-2022-28948 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2021-27918 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2021-33195 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2021-33196 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2021-33198 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2021-39293 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-attacher:v3.2.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.16 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | github.com/prometheus/client_golang@v1.11.0 | CVE-2022-21698 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | golang.org/x/net@v0.0.0-20210520170846-37e1c6afe023 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | golang.org/x/net@v0.0.0-20210520170846-37e1c6afe023 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | golang.org/x/net@v0.0.0-20210520170846-37e1c6afe023 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | golang.org/x/net@v0.0.0-20210520170846-37e1c6afe023 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | golang.org/x/text@v0.3.6 | CVE-2021-38561 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | golang.org/x/text@v0.3.6 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | google.golang.org/grpc@v1.38.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-33195 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-33196 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-33198 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-39293 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.3.0 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.16.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | github.com/gogo/protobuf@v1.3.1 | CVE-2021-3121 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | github.com/prometheus/client_golang@v1.8.0 | CVE-2022-21698 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | golang.org/x/crypto@v0.0.0-20201208171446-5f87f3452ae9 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | golang.org/x/crypto@v0.0.0-20201208171446-5f87f3452ae9 | CVE-2020-29652 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | golang.org/x/crypto@v0.0.0-20201208171446-5f87f3452ae9 | CVE-2021-43565 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | golang.org/x/crypto@v0.0.0-20201208171446-5f87f3452ae9 | CVE-2022-27191 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | golang.org/x/net@v0.0.0-20201209123823-ac852fbbde11 | CVE-2021-33194 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | golang.org/x/net@v0.0.0-20201209123823-ac852fbbde11 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | golang.org/x/net@v0.0.0-20201209123823-ac852fbbde11 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | golang.org/x/net@v0.0.0-20201209123823-ac852fbbde11 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | golang.org/x/net@v0.0.0-20201209123823-ac852fbbde11 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | golang.org/x/text@v0.3.4 | CVE-2021-38561 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | golang.org/x/text@v0.3.4 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | google.golang.org/grpc@v1.34.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | gopkg.in/yaml.v3@v3.0.0-20200615113413-eeeca48fe776 | CVE-2022-28948 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2020-28362 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2021-27918 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2021-33195 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2021-33196 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2021-33198 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2021-39293 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-provisioner:v2.1.2 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.15 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | github.com/prometheus/client_golang@v1.9.0 | CVE-2022-21698 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | golang.org/x/net@v0.0.0-20210316092652-d523dce5a7f4 | CVE-2021-33194 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | golang.org/x/net@v0.0.0-20210316092652-d523dce5a7f4 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | golang.org/x/net@v0.0.0-20210316092652-d523dce5a7f4 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | golang.org/x/net@v0.0.0-20210316092652-d523dce5a7f4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | golang.org/x/net@v0.0.0-20210316092652-d523dce5a7f4 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | golang.org/x/text@v0.3.5 | CVE-2021-38561 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | golang.org/x/text@v0.3.5 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | google.golang.org/grpc@v1.36.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | gopkg.in/yaml.v3@v3.0.0-20210107192922-496545a6307b | CVE-2022-28948 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2021-27918 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2021-33195 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2021-33196 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2021-33198 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2021-39293 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-csi-resizer:v1.2.0 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.16 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-longhornio-longhorn-engine:v1.7.3 | true | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.20.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/mirrored-longhornio-longhorn-instance-manager:v1.7.3 | true | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.20.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/mirrored-longhornio-longhorn-manager:v1.7.3 | true | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.20.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/mirrored-longhornio-longhorn-share-manager:v1.7.3 | true | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.20.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/mirrored-longhornio-longhorn-ui:v1.7.3 | true | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.20.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/mirrored-longhornio-longhorn-ui:v1.7.3 | true | Rancher v2.8 head | libxml2-tools | libxml2-tools@2.10.3-150500.5.20.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/mirrored-longhornio-support-bundle-kit:v0.0.51 | true | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.20.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | libcrypto1.1 | libcrypto1.1@1.1.1n-r0 | CVE-2022-4450 | HIGH | affected | alpine | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | libcrypto1.1 | libcrypto1.1@1.1.1n-r0 | CVE-2023-0215 | HIGH | affected | alpine | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | libcrypto1.1 | libcrypto1.1@1.1.1n-r0 | CVE-2023-0286 | HIGH | affected | alpine | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | libcrypto1.1 | libcrypto1.1@1.1.1n-r0 | CVE-2023-0464 | HIGH | affected | alpine | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | libssl1.1 | libssl1.1@1.1.1n-r0 | CVE-2022-4450 | HIGH | affected | alpine | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | libssl1.1 | libssl1.1@1.1.1n-r0 | CVE-2023-0215 | HIGH | affected | alpine | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | libssl1.1 | libssl1.1@1.1.1n-r0 | CVE-2023-0286 | HIGH | affected | alpine | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | libssl1.1 | libssl1.1@1.1.1n-r0 | CVE-2023-0464 | HIGH | affected | alpine | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | zlib | zlib@1.2.12-r0 | CVE-2022-37434 | CRITICAL | affected | alpine | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | github.com/prometheus/client_golang@v1.11.0 | CVE-2022-21698 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-27536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | stdlib@v1.18 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.2 | true | Rancher v2.8 head | metrics-server | github.com/emicklei/go-restful@v2.9.5+incompatible | CVE-2022-1996 | CRITICAL | affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.2 | true | Rancher v2.8 head | metrics-server | golang.org/x/crypto@v0.0.0-20220314234659-1baeb1ce4c0b | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.2 | true | Rancher v2.8 head | metrics-server | golang.org/x/net@v0.0.0-20220906165146-f3363e06e74c | CVE-2022-41721 | HIGH | affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.2 | true | Rancher v2.8 head | metrics-server | golang.org/x/net@v0.0.0-20220906165146-f3363e06e74c | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.2 | true | Rancher v2.8 head | metrics-server | golang.org/x/net@v0.0.0-20220906165146-f3363e06e74c | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.2 | true | Rancher v2.8 head | metrics-server | golang.org/x/net@v0.0.0-20220906165146-f3363e06e74c | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.2 | true | Rancher v2.8 head | metrics-server | google.golang.org/grpc@v1.40.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.2 | true | Rancher v2.8 head | metrics-server | gopkg.in/yaml.v3@v3.0.0-20210107192922-496545a6307b | CVE-2022-28948 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.2 | true | Rancher v2.8 head | metrics-server | stdlib@v1.17.13 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.2 | true | Rancher v2.8 head | metrics-server | stdlib@v1.17.13 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.2 | true | Rancher v2.8 head | metrics-server | stdlib@v1.17.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.2 | true | Rancher v2.8 head | metrics-server | stdlib@v1.17.13 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.2 | true | Rancher v2.8 head | metrics-server | stdlib@v1.17.13 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.2 | true | Rancher v2.8 head | metrics-server | stdlib@v1.17.13 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.2 | true | Rancher v2.8 head | metrics-server | stdlib@v1.17.13 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.2 | true | Rancher v2.8 head | metrics-server | stdlib@v1.17.13 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.2 | true | Rancher v2.8 head | metrics-server | stdlib@v1.17.13 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.2 | true | Rancher v2.8 head | metrics-server | stdlib@v1.17.13 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.2 | true | Rancher v2.8 head | metrics-server | stdlib@v1.17.13 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.2 | true | Rancher v2.8 head | metrics-server | stdlib@v1.17.13 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.2 | true | Rancher v2.8 head | metrics-server | stdlib@v1.17.13 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.2 | true | Rancher v2.8 head | metrics-server | stdlib@v1.17.13 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.2 | true | Rancher v2.8 head | metrics-server | stdlib@v1.17.13 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.2 | true | Rancher v2.8 head | metrics-server | stdlib@v1.17.13 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.2 | true | Rancher v2.8 head | metrics-server | stdlib@v1.17.13 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.2 | true | Rancher v2.8 head | metrics-server | stdlib@v1.17.13 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.2 | true | Rancher v2.8 head | metrics-server | stdlib@v1.17.13 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.2 | true | Rancher v2.8 head | metrics-server | stdlib@v1.17.13 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.2 | true | Rancher v2.8 head | metrics-server | stdlib@v1.17.13 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.2 | true | Rancher v2.8 head | metrics-server | stdlib@v1.17.13 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.2 | true | Rancher v2.8 head | metrics-server | stdlib@v1.17.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.2 | true | Rancher v2.8 head | metrics-server | stdlib@v1.17.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.3 | true | Rancher v2.8 head | metrics-server | golang.org/x/net@v0.7.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.3 | true | Rancher v2.8 head | metrics-server | google.golang.org/grpc@v1.50.1 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.3 | true | Rancher v2.8 head | metrics-server | stdlib@v1.19.7 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.3 | true | Rancher v2.8 head | metrics-server | stdlib@v1.19.7 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.3 | true | Rancher v2.8 head | metrics-server | stdlib@v1.19.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.3 | true | Rancher v2.8 head | metrics-server | stdlib@v1.19.7 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.3 | true | Rancher v2.8 head | metrics-server | stdlib@v1.19.7 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.3 | true | Rancher v2.8 head | metrics-server | stdlib@v1.19.7 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.3 | true | Rancher v2.8 head | metrics-server | stdlib@v1.19.7 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.3 | true | Rancher v2.8 head | metrics-server | stdlib@v1.19.7 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.3 | true | Rancher v2.8 head | metrics-server | stdlib@v1.19.7 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.3 | true | Rancher v2.8 head | metrics-server | stdlib@v1.19.7 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.3 | true | Rancher v2.8 head | metrics-server | stdlib@v1.19.7 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.3 | true | Rancher v2.8 head | metrics-server | stdlib@v1.19.7 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.3 | true | Rancher v2.8 head | metrics-server | stdlib@v1.19.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.6.3 | true | Rancher v2.8 head | metrics-server | stdlib@v1.19.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.7.0 | true | Rancher v2.8 head | metrics-server | stdlib@v1.21.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.7.0 | true | Rancher v2.8 head | metrics-server | stdlib@v1.21.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.7.0 | true | Rancher v2.8 head | metrics-server | stdlib@v1.21.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-metrics-server:v0.7.2 | true | Rancher v2.8 head | metrics-server | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-minio-mc:RELEASE.2023-06-28T21-54-17Z | true | Rancher v2.8 head | glibc | glibc@2.28-225.el8 | CVE-2023-4911 | HIGH | affected | redhat | |
rancher/mirrored-minio-mc:RELEASE.2023-06-28T21-54-17Z | true | Rancher v2.8 head | glibc | glibc@2.28-225.el8 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-minio-mc:RELEASE.2023-06-28T21-54-17Z | true | Rancher v2.8 head | glibc | glibc@2.28-225.el8 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-minio-mc:RELEASE.2023-06-28T21-54-17Z | true | Rancher v2.8 head | glibc-common | glibc-common@2.28-225.el8 | CVE-2023-4911 | HIGH | affected | redhat | |
rancher/mirrored-minio-mc:RELEASE.2023-06-28T21-54-17Z | true | Rancher v2.8 head | glibc-common | glibc-common@2.28-225.el8 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-minio-mc:RELEASE.2023-06-28T21-54-17Z | true | Rancher v2.8 head | glibc-common | glibc-common@2.28-225.el8 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-minio-mc:RELEASE.2023-06-28T21-54-17Z | true | Rancher v2.8 head | glibc-gconv-extra | glibc-gconv-extra@2.28-225.el8 | CVE-2023-4911 | HIGH | affected | redhat | |
rancher/mirrored-minio-mc:RELEASE.2023-06-28T21-54-17Z | true | Rancher v2.8 head | glibc-gconv-extra | glibc-gconv-extra@2.28-225.el8 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-minio-mc:RELEASE.2023-06-28T21-54-17Z | true | Rancher v2.8 head | glibc-gconv-extra | glibc-gconv-extra@2.28-225.el8 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-minio-mc:RELEASE.2023-06-28T21-54-17Z | true | Rancher v2.8 head | glibc-langpack-en | glibc-langpack-en@2.28-225.el8 | CVE-2023-4911 | HIGH | affected | redhat | |
rancher/mirrored-minio-mc:RELEASE.2023-06-28T21-54-17Z | true | Rancher v2.8 head | glibc-langpack-en | glibc-langpack-en@2.28-225.el8 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-minio-mc:RELEASE.2023-06-28T21-54-17Z | true | Rancher v2.8 head | glibc-langpack-en | glibc-langpack-en@2.28-225.el8 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-minio-mc:RELEASE.2023-06-28T21-54-17Z | true | Rancher v2.8 head | glibc-minimal-langpack | glibc-minimal-langpack@2.28-225.el8 | CVE-2023-4911 | HIGH | affected | redhat | |
rancher/mirrored-minio-mc:RELEASE.2023-06-28T21-54-17Z | true | Rancher v2.8 head | glibc-minimal-langpack | glibc-minimal-langpack@2.28-225.el8 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-minio-mc:RELEASE.2023-06-28T21-54-17Z | true | Rancher v2.8 head | glibc-minimal-langpack | glibc-minimal-langpack@2.28-225.el8 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-minio-mc:RELEASE.2023-06-28T21-54-17Z | true | Rancher v2.8 head | krb5-libs | krb5-libs@1.18.2-25.el8_8 | CVE-2024-3596 | HIGH | affected | redhat | |
rancher/mirrored-minio-mc:RELEASE.2023-06-28T21-54-17Z | true | Rancher v2.8 head | libnghttp2 | libnghttp2@1.33.0-3.el8_2.1 | CVE-2023-44487 | HIGH | affected | redhat | |
rancher/mirrored-minio-mc:RELEASE.2023-06-28T21-54-17Z | true | Rancher v2.8 head | libxml2 | libxml2@2.9.7-16.el8 | CVE-2024-56171 | HIGH | affected | redhat | |
rancher/mirrored-minio-mc:RELEASE.2023-06-28T21-54-17Z | true | Rancher v2.8 head | libxml2 | libxml2@2.9.7-16.el8 | CVE-2025-24928 | HIGH | affected | redhat | |
rancher/mirrored-minio-mc:RELEASE.2023-06-28T21-54-17Z | true | Rancher v2.8 head | pam | pam@1.3.1-25.el8 | CVE-2024-10963 | HIGH | affected | redhat | |
rancher/mirrored-minio-mc:RELEASE.2023-06-28T21-54-17Z | true | Rancher v2.8 head | platform-python | platform-python@3.6.8-51.el8_8.1 | CVE-2023-40217 | HIGH | affected | redhat | |
rancher/mirrored-minio-mc:RELEASE.2023-06-28T21-54-17Z | true | Rancher v2.8 head | platform-python | platform-python@3.6.8-51.el8_8.1 | CVE-2023-6597 | HIGH | affected | redhat | |
rancher/mirrored-minio-mc:RELEASE.2023-06-28T21-54-17Z | true | Rancher v2.8 head | platform-python-setuptools | platform-python-setuptools@39.2.0-7.el8 | CVE-2024-6345 | HIGH | affected | redhat | |
rancher/mirrored-minio-mc:RELEASE.2023-06-28T21-54-17Z | true | Rancher v2.8 head | python3-libs | python3-libs@3.6.8-51.el8_8.1 | CVE-2023-40217 | HIGH | affected | redhat | |
rancher/mirrored-minio-mc:RELEASE.2023-06-28T21-54-17Z | true | Rancher v2.8 head | python3-libs | python3-libs@3.6.8-51.el8_8.1 | CVE-2023-6597 | HIGH | affected | redhat | |
rancher/mirrored-minio-mc:RELEASE.2023-06-28T21-54-17Z | true | Rancher v2.8 head | python3-setuptools-wheel | python3-setuptools-wheel@39.2.0-7.el8 | CVE-2024-6345 | HIGH | affected | redhat | |
rancher/mirrored-minio-mc:RELEASE.2023-06-28T21-54-17Z | true | Rancher v2.8 head | usr/bin/mc | stdlib@v1.19.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-minio-mc:RELEASE.2023-06-28T21-54-17Z | true | Rancher v2.8 head | usr/bin/mc | stdlib@v1.19.10 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-minio-mc:RELEASE.2023-06-28T21-54-17Z | true | Rancher v2.8 head | usr/bin/mc | stdlib@v1.19.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-minio-mc:RELEASE.2023-06-28T21-54-17Z | true | Rancher v2.8 head | usr/bin/mc | stdlib@v1.19.10 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-minio-mc:RELEASE.2023-06-28T21-54-17Z | true | Rancher v2.8 head | usr/bin/mc | stdlib@v1.19.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-minio-mc:RELEASE.2023-06-28T21-54-17Z | true | Rancher v2.8 head | usr/bin/mc | stdlib@v1.19.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-minio-minio:RELEASE.2023-07-07T07-13-57Z | true | Rancher v2.8 head | glibc | glibc@2.28-225.el8 | CVE-2023-4911 | HIGH | affected | redhat | |
rancher/mirrored-minio-minio:RELEASE.2023-07-07T07-13-57Z | true | Rancher v2.8 head | glibc | glibc@2.28-225.el8 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-minio-minio:RELEASE.2023-07-07T07-13-57Z | true | Rancher v2.8 head | glibc | glibc@2.28-225.el8 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-minio-minio:RELEASE.2023-07-07T07-13-57Z | true | Rancher v2.8 head | glibc-common | glibc-common@2.28-225.el8 | CVE-2023-4911 | HIGH | affected | redhat | |
rancher/mirrored-minio-minio:RELEASE.2023-07-07T07-13-57Z | true | Rancher v2.8 head | glibc-common | glibc-common@2.28-225.el8 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-minio-minio:RELEASE.2023-07-07T07-13-57Z | true | Rancher v2.8 head | glibc-common | glibc-common@2.28-225.el8 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-minio-minio:RELEASE.2023-07-07T07-13-57Z | true | Rancher v2.8 head | glibc-minimal-langpack | glibc-minimal-langpack@2.28-225.el8 | CVE-2023-4911 | HIGH | affected | redhat | |
rancher/mirrored-minio-minio:RELEASE.2023-07-07T07-13-57Z | true | Rancher v2.8 head | glibc-minimal-langpack | glibc-minimal-langpack@2.28-225.el8 | CVE-2024-2961 | HIGH | affected | redhat | |
rancher/mirrored-minio-minio:RELEASE.2023-07-07T07-13-57Z | true | Rancher v2.8 head | glibc-minimal-langpack | glibc-minimal-langpack@2.28-225.el8 | CVE-2024-33599 | HIGH | affected | redhat | |
rancher/mirrored-minio-minio:RELEASE.2023-07-07T07-13-57Z | true | Rancher v2.8 head | krb5-libs | krb5-libs@1.18.2-25.el8_8 | CVE-2024-3596 | HIGH | affected | redhat | |
rancher/mirrored-minio-minio:RELEASE.2023-07-07T07-13-57Z | true | Rancher v2.8 head | libnghttp2 | libnghttp2@1.33.0-3.el8_2.1 | CVE-2023-44487 | HIGH | affected | redhat | |
rancher/mirrored-minio-minio:RELEASE.2023-07-07T07-13-57Z | true | Rancher v2.8 head | libxml2 | libxml2@2.9.7-16.el8 | CVE-2024-56171 | HIGH | affected | redhat | |
rancher/mirrored-minio-minio:RELEASE.2023-07-07T07-13-57Z | true | Rancher v2.8 head | libxml2 | libxml2@2.9.7-16.el8 | CVE-2025-24928 | HIGH | affected | redhat | |
rancher/mirrored-minio-minio:RELEASE.2023-07-07T07-13-57Z | true | Rancher v2.8 head | pam | pam@1.3.1-25.el8 | CVE-2024-10963 | HIGH | affected | redhat | |
rancher/mirrored-minio-minio:RELEASE.2023-07-07T07-13-57Z | true | Rancher v2.8 head | opt/bin/minio | github.com/coredns/coredns@v1.10.1 | CVE-2023-28452 | HIGH | affected | gobinary | |
rancher/mirrored-minio-minio:RELEASE.2023-07-07T07-13-57Z | true | Rancher v2.8 head | opt/bin/minio | stdlib@v1.19.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-minio-minio:RELEASE.2023-07-07T07-13-57Z | true | Rancher v2.8 head | opt/bin/minio | stdlib@v1.19.10 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-minio-minio:RELEASE.2023-07-07T07-13-57Z | true | Rancher v2.8 head | opt/bin/minio | stdlib@v1.19.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-minio-minio:RELEASE.2023-07-07T07-13-57Z | true | Rancher v2.8 head | opt/bin/minio | stdlib@v1.19.10 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-minio-minio:RELEASE.2023-07-07T07-13-57Z | true | Rancher v2.8 head | opt/bin/minio | stdlib@v1.19.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-minio-minio:RELEASE.2023-07-07T07-13-57Z | true | Rancher v2.8 head | opt/bin/minio | stdlib@v1.19.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-openpolicyagent-gatekeeper-crds:v3.13.0 | true | Rancher v2.8 head | kubectl | golang.org/x/net@v0.8.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-openpolicyagent-gatekeeper-crds:v3.13.0 | true | Rancher v2.8 head | kubectl | stdlib@v1.20.3 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-openpolicyagent-gatekeeper-crds:v3.13.0 | true | Rancher v2.8 head | kubectl | stdlib@v1.20.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-openpolicyagent-gatekeeper-crds:v3.13.0 | true | Rancher v2.8 head | kubectl | stdlib@v1.20.3 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-openpolicyagent-gatekeeper-crds:v3.13.0 | true | Rancher v2.8 head | kubectl | stdlib@v1.20.3 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-openpolicyagent-gatekeeper-crds:v3.13.0 | true | Rancher v2.8 head | kubectl | stdlib@v1.20.3 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-openpolicyagent-gatekeeper-crds:v3.13.0 | true | Rancher v2.8 head | kubectl | stdlib@v1.20.3 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-openpolicyagent-gatekeeper-crds:v3.13.0 | true | Rancher v2.8 head | kubectl | stdlib@v1.20.3 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-openpolicyagent-gatekeeper-crds:v3.13.0 | true | Rancher v2.8 head | kubectl | stdlib@v1.20.3 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-openpolicyagent-gatekeeper-crds:v3.13.0 | true | Rancher v2.8 head | kubectl | stdlib@v1.20.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-openpolicyagent-gatekeeper:v3.13.0 | true | Rancher v2.8 head | manager | golang.org/x/net@v0.11.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-openpolicyagent-gatekeeper:v3.13.0 | true | Rancher v2.8 head | manager | google.golang.org/grpc@v1.56.1 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-openpolicyagent-gatekeeper:v3.13.0 | true | Rancher v2.8 head | manager | stdlib@v1.20.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-openpolicyagent-gatekeeper:v3.13.0 | true | Rancher v2.8 head | manager | stdlib@v1.20.7 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-openpolicyagent-gatekeeper:v3.13.0 | true | Rancher v2.8 head | manager | stdlib@v1.20.7 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-openpolicyagent-gatekeeper:v3.13.0 | true | Rancher v2.8 head | manager | stdlib@v1.20.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-openpolicyagent-gatekeeper:v3.13.0 | true | Rancher v2.8 head | manager | stdlib@v1.20.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_apache-tomcat/7.13.7/bin/helper | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_apache-tomcat/7.13.7/bin/helper | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_apache-tomcat/7.13.7/bin/helper | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_apache-tomcat/7.13.7/bin/helper | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_apache-tomcat/7.13.7/bin/helper | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_apache-tomcat/7.13.7/bin/main | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_apache-tomcat/7.13.7/bin/main | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_apache-tomcat/7.13.7/bin/main | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_apache-tomcat/7.13.7/bin/main | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_apache-tomcat/7.13.7/bin/main | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_apache-tomee/1.7.4/bin/helper | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_apache-tomee/1.7.4/bin/helper | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_apache-tomee/1.7.4/bin/helper | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_apache-tomee/1.7.4/bin/helper | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_apache-tomee/1.7.4/bin/helper | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_apache-tomee/1.7.4/bin/main | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_apache-tomee/1.7.4/bin/main | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_apache-tomee/1.7.4/bin/main | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_apache-tomee/1.7.4/bin/main | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_apache-tomee/1.7.4/bin/main | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_azure-application-insights/5.15.1/bin/helper | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_azure-application-insights/5.15.1/bin/helper | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_azure-application-insights/5.15.1/bin/helper | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_azure-application-insights/5.15.1/bin/helper | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_azure-application-insights/5.15.1/bin/helper | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_azure-application-insights/5.15.1/bin/main | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_azure-application-insights/5.15.1/bin/main | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_azure-application-insights/5.15.1/bin/main | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_azure-application-insights/5.15.1/bin/main | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_azure-application-insights/5.15.1/bin/main | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bellsoft-liberica/10.2.6/bin/helper | golang.org/x/net@v0.11.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bellsoft-liberica/10.2.6/bin/helper | golang.org/x/net@v0.11.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bellsoft-liberica/10.2.6/bin/helper | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bellsoft-liberica/10.2.6/bin/helper | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bellsoft-liberica/10.2.6/bin/helper | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bellsoft-liberica/10.2.6/bin/helper | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bellsoft-liberica/10.2.6/bin/helper | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bellsoft-liberica/10.2.6/bin/main | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bellsoft-liberica/10.2.6/bin/main | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bellsoft-liberica/10.2.6/bin/main | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bellsoft-liberica/10.2.6/bin/main | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bellsoft-liberica/10.2.6/bin/main | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bundle-install/0.7.9/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49569 | CRITICAL | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bundle-install/0.7.9/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bundle-install/0.7.9/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49568 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bundle-install/0.7.9/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bundle-install/0.7.9/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bundle-install/0.7.9/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bundle-install/0.7.9/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bundle-install/0.7.9/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bundle-install/0.7.9/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bundler/0.7.21/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bundler/0.7.21/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bundler/0.7.21/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bundler/0.7.21/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bundler/0.7.21/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bundler/0.7.21/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bundler/0.7.21/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_ca-certificates/3.6.2/bin/helper | stdlib@v1.20.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_ca-certificates/3.6.2/bin/helper | stdlib@v1.20.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_ca-certificates/3.6.2/bin/helper | stdlib@v1.20.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_ca-certificates/3.6.2/bin/helper | stdlib@v1.20.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_ca-certificates/3.6.2/bin/helper | stdlib@v1.20.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_ca-certificates/3.6.2/bin/helper | stdlib@v1.20.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_ca-certificates/3.6.2/bin/main | stdlib@v1.20.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_ca-certificates/3.6.2/bin/main | stdlib@v1.20.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_ca-certificates/3.6.2/bin/main | stdlib@v1.20.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_ca-certificates/3.6.2/bin/main | stdlib@v1.20.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_ca-certificates/3.6.2/bin/main | stdlib@v1.20.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_ca-certificates/3.6.2/bin/main | stdlib@v1.20.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_ca-certificates/3.6.3/bin/helper | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_ca-certificates/3.6.3/bin/helper | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_ca-certificates/3.6.3/bin/helper | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_ca-certificates/3.6.3/bin/helper | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_ca-certificates/3.6.3/bin/helper | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_ca-certificates/3.6.3/bin/main | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_ca-certificates/3.6.3/bin/main | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_ca-certificates/3.6.3/bin/main | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_ca-certificates/3.6.3/bin/main | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_ca-certificates/3.6.3/bin/main | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_clojure-tools/2.8.5/bin/main | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_clojure-tools/2.8.5/bin/main | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_clojure-tools/2.8.5/bin/main | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_clojure-tools/2.8.5/bin/main | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_clojure-tools/2.8.5/bin/main | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_composer-install/0.3.15/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_composer-install/0.3.15/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_composer-install/0.3.15/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_composer-install/0.3.15/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_composer-install/0.3.15/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_composer-install/0.3.15/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_composer-install/0.3.15/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_composer/0.5.15/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_composer/0.5.15/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_composer/0.5.15/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_composer/0.5.15/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_composer/0.5.15/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_composer/0.5.15/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_composer/0.5.15/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_conda-env-update/0.7.11/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49569 | CRITICAL | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_conda-env-update/0.7.11/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_conda-env-update/0.7.11/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49568 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_conda-env-update/0.7.11/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_conda-env-update/0.7.11/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_conda-env-update/0.7.11/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_conda-env-update/0.7.11/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_conda-env-update/0.7.11/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_conda-env-update/0.7.11/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_cpython/1.8.11/bin/env | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_cpython/1.8.11/bin/env | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_cpython/1.8.11/bin/env | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_cpython/1.8.11/bin/env | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_cpython/1.8.11/bin/env | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_cpython/1.8.11/bin/run | github.com/docker/docker@v20.10.3-0.20221013203545-33ab36d6b304+incompatible | CVE-2023-28840 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_cpython/1.8.11/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_cpython/1.8.11/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_cpython/1.8.11/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_cpython/1.8.11/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_cpython/1.8.11/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_cpython/1.8.11/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_cpython/1.8.11/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_datadog/3.15.0/bin/helper | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_datadog/3.15.0/bin/helper | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_datadog/3.15.0/bin/helper | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_datadog/3.15.0/bin/helper | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_datadog/3.15.0/bin/helper | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_datadog/3.15.0/bin/main | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_datadog/3.15.0/bin/main | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_datadog/3.15.0/bin/main | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_datadog/3.15.0/bin/main | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_datadog/3.15.0/bin/main | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_datadog/3.6.0/bin/main | stdlib@v1.18.10 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_datadog/3.6.0/bin/main | stdlib@v1.18.10 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_datadog/3.6.0/bin/main | stdlib@v1.18.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_datadog/3.6.0/bin/main | stdlib@v1.18.10 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_datadog/3.6.0/bin/main | stdlib@v1.18.10 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_datadog/3.6.0/bin/main | stdlib@v1.18.10 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_datadog/3.6.0/bin/main | stdlib@v1.18.10 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_datadog/3.6.0/bin/main | stdlib@v1.18.10 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_datadog/3.6.0/bin/main | stdlib@v1.18.10 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_datadog/3.6.0/bin/main | stdlib@v1.18.10 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_datadog/3.6.0/bin/main | stdlib@v1.18.10 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_datadog/3.6.0/bin/main | stdlib@v1.18.10 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_datadog/3.6.0/bin/main | stdlib@v1.18.10 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_datadog/3.6.0/bin/main | stdlib@v1.18.10 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_datadog/3.6.0/bin/main | stdlib@v1.18.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_datadog/3.6.0/bin/main | stdlib@v1.18.10 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_datadog/3.6.0/bin/main | stdlib@v1.18.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_datadog/3.6.0/bin/main | stdlib@v1.18.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dist-zip/5.6.4/bin/main | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dist-zip/5.6.4/bin/main | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dist-zip/5.6.4/bin/main | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dist-zip/5.6.4/bin/main | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dist-zip/5.6.4/bin/main | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-core-aspnet-runtime/0.3.19/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-core-aspnet-runtime/0.3.19/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-core-aspnet-runtime/0.3.19/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-core-aspnet-runtime/0.3.19/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-core-aspnet-runtime/0.3.19/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-core-aspnet-runtime/0.3.19/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-core-aspnet-runtime/0.3.19/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-core-sdk/0.13.17/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-core-sdk/0.13.17/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-core-sdk/0.13.17/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-core-sdk/0.13.17/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-core-sdk/0.13.17/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-core-sdk/0.13.17/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-core-sdk/0.13.17/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-execute/0.14.17/bin/port-chooser | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-execute/0.14.17/bin/port-chooser | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-execute/0.14.17/bin/port-chooser | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-execute/0.14.17/bin/port-chooser | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-execute/0.14.17/bin/port-chooser | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-execute/0.14.17/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49569 | CRITICAL | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-execute/0.14.17/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-execute/0.14.17/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49568 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-execute/0.14.17/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-execute/0.14.17/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-execute/0.14.17/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-execute/0.14.17/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-execute/0.14.17/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-execute/0.14.17/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-publish/0.12.15/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49569 | CRITICAL | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-publish/0.12.15/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-publish/0.12.15/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49568 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-publish/0.12.15/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-publish/0.12.15/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-publish/0.12.15/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-publish/0.12.15/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-publish/0.12.15/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-publish/0.12.15/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_encrypt-at-rest/4.5.5/bin/helper | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_encrypt-at-rest/4.5.5/bin/helper | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_encrypt-at-rest/4.5.5/bin/helper | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_encrypt-at-rest/4.5.5/bin/helper | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_encrypt-at-rest/4.5.5/bin/helper | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_encrypt-at-rest/4.5.5/bin/main | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_encrypt-at-rest/4.5.5/bin/main | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_encrypt-at-rest/4.5.5/bin/main | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_encrypt-at-rest/4.5.5/bin/main | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_encrypt-at-rest/4.5.5/bin/main | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_environment-variables/4.5.2/bin/main | stdlib@v1.20.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_environment-variables/4.5.2/bin/main | stdlib@v1.20.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_environment-variables/4.5.2/bin/main | stdlib@v1.20.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_environment-variables/4.5.2/bin/main | stdlib@v1.20.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_environment-variables/4.5.2/bin/main | stdlib@v1.20.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_environment-variables/4.5.2/bin/main | stdlib@v1.20.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_environment-variables/4.5.3/bin/main | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_environment-variables/4.5.3/bin/main | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_environment-variables/4.5.3/bin/main | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_environment-variables/4.5.3/bin/main | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_environment-variables/4.5.3/bin/main | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_executable-jar/6.7.4/bin/main | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_executable-jar/6.7.4/bin/main | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_executable-jar/6.7.4/bin/main | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_executable-jar/6.7.4/bin/main | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_executable-jar/6.7.4/bin/main | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_git/1.0.6/bin/run | stdlib@v1.20.3 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_git/1.0.6/bin/run | stdlib@v1.20.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_git/1.0.6/bin/run | stdlib@v1.20.3 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_git/1.0.6/bin/run | stdlib@v1.20.3 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_git/1.0.6/bin/run | stdlib@v1.20.3 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_git/1.0.6/bin/run | stdlib@v1.20.3 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_git/1.0.6/bin/run | stdlib@v1.20.3 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_git/1.0.6/bin/run | stdlib@v1.20.3 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_git/1.0.6/bin/run | stdlib@v1.20.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-build/2.0.22/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49569 | CRITICAL | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-build/2.0.22/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-build/2.0.22/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49568 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-build/2.0.22/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-build/2.0.22/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-build/2.0.22/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-build/2.0.22/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-build/2.0.22/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-build/2.0.22/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-dist/2.3.10/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-dist/2.3.10/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-dist/2.3.10/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-dist/2.3.10/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-dist/2.3.10/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-dist/2.3.10/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-dist/2.3.10/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-mod-vendor/1.0.21/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49569 | CRITICAL | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-mod-vendor/1.0.21/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-mod-vendor/1.0.21/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49568 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-mod-vendor/1.0.21/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-mod-vendor/1.0.21/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-mod-vendor/1.0.21/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-mod-vendor/1.0.21/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-mod-vendor/1.0.21/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-mod-vendor/1.0.21/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_google-stackdriver/7.6.1/bin/helper | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_google-stackdriver/7.6.1/bin/helper | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_google-stackdriver/7.6.1/bin/helper | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_google-stackdriver/7.6.1/bin/helper | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_google-stackdriver/7.6.1/bin/helper | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_google-stackdriver/7.6.1/bin/main | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_google-stackdriver/7.6.1/bin/main | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_google-stackdriver/7.6.1/bin/main | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_google-stackdriver/7.6.1/bin/main | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_google-stackdriver/7.6.1/bin/main | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_gradle/7.3.0/bin/main | stdlib@v1.20.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_gradle/7.3.0/bin/main | stdlib@v1.20.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_gradle/7.3.0/bin/main | stdlib@v1.20.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_gradle/7.3.0/bin/main | stdlib@v1.20.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_gradle/7.3.0/bin/main | stdlib@v1.20.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_gradle/7.3.0/bin/main | stdlib@v1.20.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_httpd/0.7.11/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_httpd/0.7.11/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_httpd/0.7.11/bin/run | stdlib@v1.20.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_httpd/0.7.11/bin/run | stdlib@v1.20.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_httpd/0.7.11/bin/run | stdlib@v1.20.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_httpd/0.7.11/bin/run | stdlib@v1.20.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_httpd/0.7.11/bin/run | stdlib@v1.20.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_httpd/0.7.11/bin/run | stdlib@v1.20.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_icu/0.6.14/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_icu/0.6.14/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_icu/0.6.14/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_icu/0.6.14/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_icu/0.6.14/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_icu/0.6.14/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_icu/0.6.14/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_image-labels/4.5.1/bin/main | stdlib@v1.20.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_image-labels/4.5.1/bin/main | stdlib@v1.20.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_image-labels/4.5.1/bin/main | stdlib@v1.20.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_image-labels/4.5.1/bin/main | stdlib@v1.20.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_image-labels/4.5.1/bin/main | stdlib@v1.20.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_image-labels/4.5.1/bin/main | stdlib@v1.20.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_image-labels/4.5.2/bin/main | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_image-labels/4.5.2/bin/main | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_image-labels/4.5.2/bin/main | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_image-labels/4.5.2/bin/main | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_image-labels/4.5.2/bin/main | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_jattach/1.4.4/bin/main | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_jattach/1.4.4/bin/main | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_jattach/1.4.4/bin/main | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_jattach/1.4.4/bin/main | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_jattach/1.4.4/bin/main | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_java-memory-assistant/1.4.4/bin/helper | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_java-memory-assistant/1.4.4/bin/helper | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_java-memory-assistant/1.4.4/bin/helper | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_java-memory-assistant/1.4.4/bin/helper | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_java-memory-assistant/1.4.4/bin/helper | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_java-memory-assistant/1.4.4/bin/main | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_java-memory-assistant/1.4.4/bin/main | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_java-memory-assistant/1.4.4/bin/main | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_java-memory-assistant/1.4.4/bin/main | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_java-memory-assistant/1.4.4/bin/main | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_leiningen/4.6.4/bin/main | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_leiningen/4.6.4/bin/main | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_leiningen/4.6.4/bin/main | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_leiningen/4.6.4/bin/main | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_leiningen/4.6.4/bin/main | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_liberty/3.8.2/bin/helper | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_liberty/3.8.2/bin/helper | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_liberty/3.8.2/bin/helper | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_liberty/3.8.2/bin/helper | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_liberty/3.8.2/bin/helper | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_liberty/3.8.2/bin/main | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_liberty/3.8.2/bin/main | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_liberty/3.8.2/bin/main | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_liberty/3.8.2/bin/main | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_liberty/3.8.2/bin/main | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_maven/6.15.5/bin/main | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_maven/6.15.5/bin/main | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_maven/6.15.5/bin/main | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_maven/6.15.5/bin/main | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_maven/6.15.5/bin/main | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_miniconda/0.8.4/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_miniconda/0.8.4/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_miniconda/0.8.4/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_miniconda/0.8.4/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_miniconda/0.8.4/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_miniconda/0.8.4/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_miniconda/0.8.4/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_mri/0.14.5/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_mri/0.14.5/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_mri/0.14.5/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_mri/0.14.5/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_mri/0.14.5/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_mri/0.14.5/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_mri/0.14.5/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_native-image/5.12.1/bin/main | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_native-image/5.12.1/bin/main | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_native-image/5.12.1/bin/main | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_native-image/5.12.1/bin/main | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_native-image/5.12.1/bin/main | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_nginx/0.15.3/bin/configure | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_nginx/0.15.3/bin/configure | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_nginx/0.15.3/bin/configure | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_nginx/0.15.3/bin/configure | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_nginx/0.15.3/bin/configure | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_nginx/0.15.3/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_nginx/0.15.3/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_nginx/0.15.3/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_nginx/0.15.3/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_nginx/0.15.3/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_nginx/0.15.3/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_nginx/0.15.3/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_node-engine/1.6.0/bin/optimize-memory | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_node-engine/1.6.0/bin/optimize-memory | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_node-engine/1.6.0/bin/optimize-memory | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_node-engine/1.6.0/bin/optimize-memory | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_node-engine/1.6.0/bin/optimize-memory | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_node-engine/1.6.0/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_node-engine/1.6.0/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_node-engine/1.6.0/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_node-engine/1.6.0/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_node-engine/1.6.0/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_node-engine/1.6.0/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_node-engine/1.6.0/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_node-run-script/1.0.10/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_node-run-script/1.0.10/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_node-run-script/1.0.10/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_node-run-script/1.0.10/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_node-run-script/1.0.10/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_node-start/1.0.11/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_node-start/1.0.11/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_node-start/1.0.11/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_node-start/1.0.11/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_node-start/1.0.11/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_npm-install/1.1.4/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49569 | CRITICAL | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_npm-install/1.1.4/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_npm-install/1.1.4/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49568 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_npm-install/1.1.4/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_npm-install/1.1.4/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_npm-install/1.1.4/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_npm-install/1.1.4/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_npm-install/1.1.4/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_npm-install/1.1.4/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_npm-install/1.1.4/bin/setup-symlinks | github.com/cloudflare/circl@v1.3.3 | GHSA-9763-4f94-gfch | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_npm-install/1.1.4/bin/setup-symlinks | github.com/docker/docker@v23.0.5+incompatible | CVE-2024-41110 | CRITICAL | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_npm-install/1.1.4/bin/setup-symlinks | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49569 | CRITICAL | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_npm-install/1.1.4/bin/setup-symlinks | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_npm-install/1.1.4/bin/setup-symlinks | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49568 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_npm-install/1.1.4/bin/setup-symlinks | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_npm-install/1.1.4/bin/setup-symlinks | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_npm-install/1.1.4/bin/setup-symlinks | golang.org/x/net@v0.10.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_npm-install/1.1.4/bin/setup-symlinks | golang.org/x/net@v0.10.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_npm-install/1.1.4/bin/setup-symlinks | google.golang.org/grpc@v1.55.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_npm-install/1.1.4/bin/setup-symlinks | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_npm-install/1.1.4/bin/setup-symlinks | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_npm-install/1.1.4/bin/setup-symlinks | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_npm-install/1.1.4/bin/setup-symlinks | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_npm-install/1.1.4/bin/setup-symlinks | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_npm-start/1.0.11/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_npm-start/1.0.11/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_npm-start/1.0.11/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_npm-start/1.0.11/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_npm-start/1.0.11/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_passenger/0.10.3/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_passenger/0.10.3/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_passenger/0.10.3/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_passenger/0.10.3/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_passenger/0.10.3/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_passenger/0.10.3/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_passenger/0.10.3/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-builtin-server/0.4.14/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-builtin-server/0.4.14/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-builtin-server/0.4.14/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-builtin-server/0.4.14/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-builtin-server/0.4.14/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-dist/2.1.8/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-dist/2.1.8/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-dist/2.1.8/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-dist/2.1.8/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-dist/2.1.8/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-dist/2.1.8/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-dist/2.1.8/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-fpm/0.2.15/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-fpm/0.2.15/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-fpm/0.2.15/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-fpm/0.2.15/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-fpm/0.2.15/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-httpd/0.3.15/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-httpd/0.3.15/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-httpd/0.3.15/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-httpd/0.3.15/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-httpd/0.3.15/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-memcached-session-handler/0.2.14/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-memcached-session-handler/0.2.14/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-memcached-session-handler/0.2.14/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-memcached-session-handler/0.2.14/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-memcached-session-handler/0.2.14/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-nginx/0.3.1/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-nginx/0.3.1/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-nginx/0.3.1/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-nginx/0.3.1/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-nginx/0.3.1/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-redis-session-handler/0.2.15/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-redis-session-handler/0.2.15/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-redis-session-handler/0.2.15/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-redis-session-handler/0.2.15/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-redis-session-handler/0.2.15/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-start/0.4.15/bin/procmgr-binary | golang.org/x/net@v0.11.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-start/0.4.15/bin/procmgr-binary | golang.org/x/net@v0.11.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-start/0.4.15/bin/procmgr-binary | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-start/0.4.15/bin/procmgr-binary | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-start/0.4.15/bin/procmgr-binary | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-start/0.4.15/bin/procmgr-binary | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-start/0.4.15/bin/procmgr-binary | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-start/0.4.15/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-start/0.4.15/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-start/0.4.15/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-start/0.4.15/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-start/0.4.15/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pip-install/0.5.16/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49569 | CRITICAL | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pip-install/0.5.16/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pip-install/0.5.16/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49568 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pip-install/0.5.16/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pip-install/0.5.16/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pip-install/0.5.16/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pip-install/0.5.16/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pip-install/0.5.16/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pip-install/0.5.16/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pip/0.17.4/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pip/0.17.4/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pip/0.17.4/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pip/0.17.4/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pip/0.17.4/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pip/0.17.4/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pip/0.17.4/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pipenv-install/0.6.17/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49569 | CRITICAL | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pipenv-install/0.6.17/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pipenv-install/0.6.17/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49568 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pipenv-install/0.6.17/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pipenv-install/0.6.17/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pipenv-install/0.6.17/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pipenv-install/0.6.17/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pipenv-install/0.6.17/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pipenv-install/0.6.17/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pipenv/1.18.0/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pipenv/1.18.0/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pipenv/1.18.0/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pipenv/1.18.0/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pipenv/1.18.0/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pipenv/1.18.0/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pipenv/1.18.0/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_poetry-install/0.3.16/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49569 | CRITICAL | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_poetry-install/0.3.16/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_poetry-install/0.3.16/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49568 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_poetry-install/0.3.16/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_poetry-install/0.3.16/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_poetry-install/0.3.16/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_poetry-install/0.3.16/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_poetry-install/0.3.16/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_poetry-install/0.3.16/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_poetry-run/0.4.18/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_poetry-run/0.4.18/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_poetry-run/0.4.18/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_poetry-run/0.4.18/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_poetry-run/0.4.18/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_poetry/0.6.4/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_poetry/0.6.4/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_poetry/0.6.4/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_poetry/0.6.4/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_poetry/0.6.4/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_poetry/0.6.4/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_poetry/0.6.4/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_procfile/5.6.3/bin/main | stdlib@v1.20.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_procfile/5.6.3/bin/main | stdlib@v1.20.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_procfile/5.6.3/bin/main | stdlib@v1.20.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_procfile/5.6.3/bin/main | stdlib@v1.20.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_procfile/5.6.3/bin/main | stdlib@v1.20.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_procfile/5.6.3/bin/main | stdlib@v1.20.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_procfile/5.6.3/bin/main.exe | stdlib@v1.20.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_procfile/5.6.3/bin/main.exe | stdlib@v1.20.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_procfile/5.6.3/bin/main.exe | stdlib@v1.20.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_procfile/5.6.3/bin/main.exe | stdlib@v1.20.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_procfile/5.6.3/bin/main.exe | stdlib@v1.20.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_procfile/5.6.3/bin/main.exe | stdlib@v1.20.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_procfile/5.6.4/bin/main | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_procfile/5.6.4/bin/main | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_procfile/5.6.4/bin/main | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_procfile/5.6.4/bin/main | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_procfile/5.6.4/bin/main | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_procfile/5.6.4/bin/main.exe | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_procfile/5.6.4/bin/main.exe | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_procfile/5.6.4/bin/main.exe | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_procfile/5.6.4/bin/main.exe | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_procfile/5.6.4/bin/main.exe | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_puma/0.4.31/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_puma/0.4.31/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_puma/0.4.31/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_puma/0.4.31/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_puma/0.4.31/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_python-start/0.14.11/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_python-start/0.14.11/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_python-start/0.14.11/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_python-start/0.14.11/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_python-start/0.14.11/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_rackup/0.4.30/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_rackup/0.4.30/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_rackup/0.4.30/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_rackup/0.4.30/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_rackup/0.4.30/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_rails-assets/0.9.1/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_rails-assets/0.9.1/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_rails-assets/0.9.1/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_rails-assets/0.9.1/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_rails-assets/0.9.1/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_rake/0.4.30/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_rake/0.4.30/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_rake/0.4.30/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_rake/0.4.30/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_rake/0.4.30/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_sbt/6.12.2/bin/main | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_sbt/6.12.2/bin/main | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_sbt/6.12.2/bin/main | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_sbt/6.12.2/bin/main | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_sbt/6.12.2/bin/main | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_source-removal/0.2.0/bin/run | stdlib@v1.18.3 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_source-removal/0.2.0/bin/run | stdlib@v1.18.3 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_source-removal/0.2.0/bin/run | stdlib@v1.18.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_source-removal/0.2.0/bin/run | stdlib@v1.18.3 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_source-removal/0.2.0/bin/run | stdlib@v1.18.3 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_source-removal/0.2.0/bin/run | stdlib@v1.18.3 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_source-removal/0.2.0/bin/run | stdlib@v1.18.3 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_source-removal/0.2.0/bin/run | stdlib@v1.18.3 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_source-removal/0.2.0/bin/run | stdlib@v1.18.3 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_source-removal/0.2.0/bin/run | stdlib@v1.18.3 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_source-removal/0.2.0/bin/run | stdlib@v1.18.3 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_source-removal/0.2.0/bin/run | stdlib@v1.18.3 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_source-removal/0.2.0/bin/run | stdlib@v1.18.3 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_source-removal/0.2.0/bin/run | stdlib@v1.18.3 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_source-removal/0.2.0/bin/run | stdlib@v1.18.3 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_source-removal/0.2.0/bin/run | stdlib@v1.18.3 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_source-removal/0.2.0/bin/run | stdlib@v1.18.3 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_source-removal/0.2.0/bin/run | stdlib@v1.18.3 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_source-removal/0.2.0/bin/run | stdlib@v1.18.3 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_source-removal/0.2.0/bin/run | stdlib@v1.18.3 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_source-removal/0.2.0/bin/run | stdlib@v1.18.3 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_source-removal/0.2.0/bin/run | stdlib@v1.18.3 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_source-removal/0.2.0/bin/run | stdlib@v1.18.3 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_source-removal/0.2.0/bin/run | stdlib@v1.18.3 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_source-removal/0.2.0/bin/run | stdlib@v1.18.3 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_source-removal/0.2.0/bin/run | stdlib@v1.18.3 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_source-removal/0.2.0/bin/run | stdlib@v1.18.3 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_source-removal/0.2.0/bin/run | stdlib@v1.18.3 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_source-removal/0.2.0/bin/run | stdlib@v1.18.3 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_source-removal/0.2.0/bin/run | stdlib@v1.18.3 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_source-removal/0.2.0/bin/run | stdlib@v1.18.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_spring-boot/5.26.1/bin/helper | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_spring-boot/5.26.1/bin/helper | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_spring-boot/5.26.1/bin/helper | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_spring-boot/5.26.1/bin/helper | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_spring-boot/5.26.1/bin/helper | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_spring-boot/5.26.1/bin/main | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_spring-boot/5.26.1/bin/main | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_spring-boot/5.26.1/bin/main | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_spring-boot/5.26.1/bin/main | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_spring-boot/5.26.1/bin/main | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_syft/1.32.1/bin/main | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_syft/1.32.1/bin/main | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_syft/1.32.1/bin/main | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_syft/1.32.1/bin/main | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_syft/1.32.1/bin/main | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_thin/0.5.30/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_thin/0.5.30/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_thin/0.5.30/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_thin/0.5.30/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_thin/0.5.30/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_unicorn/0.4.30/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_unicorn/0.4.30/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_unicorn/0.4.30/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_unicorn/0.4.30/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_unicorn/0.4.30/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_upx/3.4.3/bin/main | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_upx/3.4.3/bin/main | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_upx/3.4.3/bin/main | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_upx/3.4.3/bin/main | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_upx/3.4.3/bin/main | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_vsdbg/0.2.10/bin/run | github.com/docker/distribution@v2.8.1+incompatible | CVE-2023-2253 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_vsdbg/0.2.10/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49569 | CRITICAL | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_vsdbg/0.2.10/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_vsdbg/0.2.10/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49568 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_vsdbg/0.2.10/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_vsdbg/0.2.10/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_vsdbg/0.2.10/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_vsdbg/0.2.10/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_vsdbg/0.2.10/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_vsdbg/0.2.10/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_watchexec/2.8.2/bin/main | stdlib@v1.20.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_watchexec/2.8.2/bin/main | stdlib@v1.20.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_watchexec/2.8.2/bin/main | stdlib@v1.20.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_watchexec/2.8.2/bin/main | stdlib@v1.20.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_watchexec/2.8.2/bin/main | stdlib@v1.20.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_watchexec/2.8.2/bin/main | stdlib@v1.20.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_watchexec/2.8.3/bin/main | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_watchexec/2.8.3/bin/main | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_watchexec/2.8.3/bin/main | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_watchexec/2.8.3/bin/main | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_watchexec/2.8.3/bin/main | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn-install/1.1.3/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49569 | CRITICAL | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn-install/1.1.3/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn-install/1.1.3/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49568 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn-install/1.1.3/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn-install/1.1.3/bin/run | stdlib@v1.20.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn-install/1.1.3/bin/run | stdlib@v1.20.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn-install/1.1.3/bin/run | stdlib@v1.20.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn-install/1.1.3/bin/run | stdlib@v1.20.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn-install/1.1.3/bin/run | stdlib@v1.20.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn-install/1.1.3/bin/run | stdlib@v1.20.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn-install/1.1.3/bin/setup-symlinks | stdlib@v1.20.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn-install/1.1.3/bin/setup-symlinks | stdlib@v1.20.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn-install/1.1.3/bin/setup-symlinks | stdlib@v1.20.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn-install/1.1.3/bin/setup-symlinks | stdlib@v1.20.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn-install/1.1.3/bin/setup-symlinks | stdlib@v1.20.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn-install/1.1.3/bin/setup-symlinks | stdlib@v1.20.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn-start/1.0.11/bin/run | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn-start/1.0.11/bin/run | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn-start/1.0.11/bin/run | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn-start/1.0.11/bin/run | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn-start/1.0.11/bin/run | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn/1.1.9/bin/run | github.com/docker/distribution@v2.8.1+incompatible | CVE-2023-2253 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn/1.1.9/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn/1.1.9/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn/1.1.9/bin/run | stdlib@v1.20.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn/1.1.9/bin/run | stdlib@v1.20.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn/1.1.9/bin/run | stdlib@v1.20.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn/1.1.9/bin/run | stdlib@v1.20.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn/1.1.9/bin/run | stdlib@v1.20.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn/1.1.9/bin/run | stdlib@v1.20.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/lifecycle/launcher | stdlib@v1.19.11 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/lifecycle/launcher | stdlib@v1.19.11 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/lifecycle/launcher | stdlib@v1.19.11 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/lifecycle/launcher | stdlib@v1.19.11 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/lifecycle/launcher | stdlib@v1.19.11 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/lifecycle/launcher | stdlib@v1.19.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/lifecycle/lifecycle | github.com/docker/distribution@v2.8.1+incompatible | CVE-2023-2253 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/lifecycle/lifecycle | stdlib@v1.19.11 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/lifecycle/lifecycle | stdlib@v1.19.11 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/lifecycle/lifecycle | stdlib@v1.19.11 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/lifecycle/lifecycle | stdlib@v1.19.11 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/lifecycle/lifecycle | stdlib@v1.19.11 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/lifecycle/lifecycle | stdlib@v1.19.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/lifecycle/lifecycle.sbom.spdx.json | github.com/docker/distribution@v2.8.1+incompatible | CVE-2023-2253 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/lifecycle/lifecycle.sbom.spdx.json | github.com/docker/docker@v23.0.4+incompatible | CVE-2024-41110 | CRITICAL | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/lifecycle/lifecycle.sbom.spdx.json | github.com/moby/buildkit@v0.11.5 | CVE-2024-23652 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/lifecycle/lifecycle.sbom.spdx.json | github.com/moby/buildkit@v0.11.5 | CVE-2024-23653 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/lifecycle/lifecycle.sbom.spdx.json | github.com/moby/buildkit@v0.11.5 | CVE-2024-23651 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/lifecycle/lifecycle.sbom.spdx.json | github.com/opencontainers/runc@v1.1.7 | CVE-2024-21626 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/lifecycle/lifecycle.sbom.spdx.json | golang.org/x/crypto@v0.5.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/lifecycle/lifecycle.sbom.spdx.json | golang.org/x/net@v0.8.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/lifecycle/lifecycle.sbom.spdx.json | golang.org/x/net@v0.8.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/lifecycle/lifecycle.sbom.spdx.json | google.golang.org/grpc@v1.53.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | usr/local/bin/yj | stdlib@v1.18 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | usr/local/bin/yj | stdlib@v1.18 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | usr/local/bin/yj | stdlib@v1.18 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | usr/local/bin/yj | stdlib@v1.18 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | usr/local/bin/yj | stdlib@v1.18 | CVE-2022-27536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | usr/local/bin/yj | stdlib@v1.18 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | usr/local/bin/yj | stdlib@v1.18 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | usr/local/bin/yj | stdlib@v1.18 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | usr/local/bin/yj | stdlib@v1.18 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | usr/local/bin/yj | stdlib@v1.18 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | usr/local/bin/yj | stdlib@v1.18 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | usr/local/bin/yj | stdlib@v1.18 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | usr/local/bin/yj | stdlib@v1.18 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | usr/local/bin/yj | stdlib@v1.18 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | usr/local/bin/yj | stdlib@v1.18 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | usr/local/bin/yj | stdlib@v1.18 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | usr/local/bin/yj | stdlib@v1.18 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | usr/local/bin/yj | stdlib@v1.18 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | usr/local/bin/yj | stdlib@v1.18 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | usr/local/bin/yj | stdlib@v1.18 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | usr/local/bin/yj | stdlib@v1.18 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | usr/local/bin/yj | stdlib@v1.18 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | usr/local/bin/yj | stdlib@v1.18 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | usr/local/bin/yj | stdlib@v1.18 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | usr/local/bin/yj | stdlib@v1.18 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | usr/local/bin/yj | stdlib@v1.18 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | usr/local/bin/yj | stdlib@v1.18 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | usr/local/bin/yj | stdlib@v1.18 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | usr/local/bin/yj | stdlib@v1.18 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | usr/local/bin/yj | stdlib@v1.18 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | usr/local/bin/yj | stdlib@v1.18 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | usr/local/bin/yj | stdlib@v1.18 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | usr/local/bin/yj | stdlib@v1.18 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | usr/local/bin/yj | stdlib@v1.18 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | usr/local/bin/yj | stdlib@v1.18 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | usr/local/bin/yj | stdlib@v1.18 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | usr/local/bin/yj | stdlib@v1.18 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.12.0 | true | Rancher v2.8 head | adapter | stdlib@v1.22.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.12.0 | true | Rancher v2.8 head | adapter | stdlib@v1.22.2 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.12.0 | true | Rancher v2.8 head | adapter | stdlib@v1.22.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.27.0 | true | Rancher v2.8 head | bin/alertmanager | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.27.0 | true | Rancher v2.8 head | bin/alertmanager | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.27.0 | true | Rancher v2.8 head | bin/alertmanager | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.27.0 | true | Rancher v2.8 head | bin/amtool | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.27.0 | true | Rancher v2.8 head | bin/amtool | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-alertmanager:v0.27.0 | true | Rancher v2.8 head | bin/amtool | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.7.0 | true | Rancher v2.8 head | bin/node_exporter | stdlib@v1.21.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.7.0 | true | Rancher v2.8 head | bin/node_exporter | stdlib@v1.21.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-node-exporter:v1.7.0 | true | Rancher v2.8 head | bin/node_exporter | stdlib@v1.21.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-admission-webhook:v0.72.0 | true | Rancher v2.8 head | bin/admission-webhook | golang.org/x/crypto@v0.19.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-admission-webhook:v0.72.0 | true | Rancher v2.8 head | bin/admission-webhook | golang.org/x/net@v0.21.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-admission-webhook:v0.72.0 | true | Rancher v2.8 head | bin/admission-webhook | stdlib@v1.22.0 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-admission-webhook:v0.72.0 | true | Rancher v2.8 head | bin/admission-webhook | stdlib@v1.22.0 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-admission-webhook:v0.72.0 | true | Rancher v2.8 head | bin/admission-webhook | stdlib@v1.22.0 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-admission-webhook:v0.72.0 | true | Rancher v2.8 head | bin/admission-webhook | stdlib@v1.22.0 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-config-reloader:v0.72.0 | true | Rancher v2.8 head | bin/prometheus-config-reloader | golang.org/x/crypto@v0.19.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-config-reloader:v0.72.0 | true | Rancher v2.8 head | bin/prometheus-config-reloader | golang.org/x/net@v0.21.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-config-reloader:v0.72.0 | true | Rancher v2.8 head | bin/prometheus-config-reloader | stdlib@v1.22.0 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-config-reloader:v0.72.0 | true | Rancher v2.8 head | bin/prometheus-config-reloader | stdlib@v1.22.0 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-config-reloader:v0.72.0 | true | Rancher v2.8 head | bin/prometheus-config-reloader | stdlib@v1.22.0 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-config-reloader:v0.72.0 | true | Rancher v2.8 head | bin/prometheus-config-reloader | stdlib@v1.22.0 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-operator:v0.72.0 | true | Rancher v2.8 head | bin/operator | golang.org/x/crypto@v0.19.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-operator:v0.72.0 | true | Rancher v2.8 head | bin/operator | golang.org/x/net@v0.21.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-operator:v0.72.0 | true | Rancher v2.8 head | bin/operator | stdlib@v1.22.0 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-operator:v0.72.0 | true | Rancher v2.8 head | bin/operator | stdlib@v1.22.0 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-operator:v0.72.0 | true | Rancher v2.8 head | bin/operator | stdlib@v1.22.0 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-operator-prometheus-operator:v0.72.0 | true | Rancher v2.8 head | bin/operator | stdlib@v1.22.0 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.50.1 | true | Rancher v2.8 head | bin/prometheus | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.50.1 | true | Rancher v2.8 head | bin/prometheus | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.50.1 | true | Rancher v2.8 head | bin/prometheus | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.50.1 | true | Rancher v2.8 head | bin/promtool | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.50.1 | true | Rancher v2.8 head | bin/promtool | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-prometheus-prometheus:v2.50.1 | true | Rancher v2.8 head | bin/promtool | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-s3gw-s3gw:v0.14.0 | true | Rancher v2.8 head | curl | curl@7.79.1-150400.5.15.1 | SUSE-SU-2023:2224-1 | HIGH | affected | opensuse-leap | |
rancher/mirrored-s3gw-s3gw:v0.14.0 | true | Rancher v2.8 head | curl | curl@7.79.1-150400.5.15.1 | SUSE-SU-2023:3823-1 | HIGH | affected | opensuse-leap | |
rancher/mirrored-s3gw-s3gw:v0.14.0 | true | Rancher v2.8 head | curl | curl@7.79.1-150400.5.15.1 | SUSE-SU-2023:4044-1 | HIGH | affected | opensuse-leap | |
rancher/mirrored-s3gw-s3gw:v0.14.0 | true | Rancher v2.8 head | krb5 | krb5@1.19.2-150400.3.3.1 | SUSE-SU-2023:3363-1 | HIGH | affected | opensuse-leap | |
rancher/mirrored-s3gw-s3gw:v0.14.0 | true | Rancher v2.8 head | libcurl4 | libcurl4@7.79.1-150400.5.15.1 | SUSE-SU-2023:2224-1 | HIGH | affected | opensuse-leap | |
rancher/mirrored-s3gw-s3gw:v0.14.0 | true | Rancher v2.8 head | libcurl4 | libcurl4@7.79.1-150400.5.15.1 | SUSE-SU-2023:3823-1 | HIGH | affected | opensuse-leap | |
rancher/mirrored-s3gw-s3gw:v0.14.0 | true | Rancher v2.8 head | libcurl4 | libcurl4@7.79.1-150400.5.15.1 | SUSE-SU-2023:4044-1 | HIGH | affected | opensuse-leap | |
rancher/mirrored-s3gw-s3gw:v0.14.0 | true | Rancher v2.8 head | libeconf0 | libeconf0@0.4.6+git20220427.3016f4e-150400.3.3.1 | SUSE-SU-2023:3954-1 | HIGH | affected | opensuse-leap | |
rancher/mirrored-s3gw-s3gw:v0.14.0 | true | Rancher v2.8 head | libgcc_s1 | libgcc_s1@12.2.1+git416-150000.1.7.1 | SUSE-SU-2023:3661-1 | HIGH | affected | opensuse-leap | |
rancher/mirrored-s3gw-s3gw:v0.14.0 | true | Rancher v2.8 head | libgcc_s1 | libgcc_s1@12.2.1+git416-150000.1.7.1 | SUSE-SU-2023:4162-1 | HIGH | affected | opensuse-leap | |
rancher/mirrored-s3gw-s3gw:v0.14.0 | true | Rancher v2.8 head | libgcc_s1 | libgcc_s1@12.2.1+git416-150000.1.7.1 | SUSE-SU-2023:4458-1 | HIGH | affected | opensuse-leap | |
rancher/mirrored-s3gw-s3gw:v0.14.0 | true | Rancher v2.8 head | libnghttp2-14 | libnghttp2-14@1.40.0-6.1 | SUSE-SU-2023:3997-1 | HIGH | affected | opensuse-leap | |
rancher/mirrored-s3gw-s3gw:v0.14.0 | true | Rancher v2.8 head | libnghttp2-14 | libnghttp2-14@1.40.0-6.1 | SUSE-SU-2023:4200-1 | HIGH | affected | opensuse-leap | |
rancher/mirrored-s3gw-s3gw:v0.14.0 | true | Rancher v2.8 head | libsqlite3-0 | libsqlite3-0@3.39.3-150000.3.20.1 | SUSE-SU-2023:4619-1 | HIGH | affected | opensuse-leap | |
rancher/mirrored-s3gw-s3gw:v0.14.0 | true | Rancher v2.8 head | libstdc++6 | libstdc++6@12.2.1+git416-150000.1.7.1 | SUSE-SU-2023:3661-1 | HIGH | affected | opensuse-leap | |
rancher/mirrored-s3gw-s3gw:v0.14.0 | true | Rancher v2.8 head | libstdc++6 | libstdc++6@12.2.1+git416-150000.1.7.1 | SUSE-SU-2023:4162-1 | HIGH | affected | opensuse-leap | |
rancher/mirrored-s3gw-s3gw:v0.14.0 | true | Rancher v2.8 head | libstdc++6 | libstdc++6@12.2.1+git416-150000.1.7.1 | SUSE-SU-2023:4458-1 | HIGH | affected | opensuse-leap | |
rancher/mirrored-s3gw-s3gw:v0.14.0 | true | Rancher v2.8 head | libzck1 | libzck1@1.1.16-150400.3.2.1 | SUSE-SU-2023:4225-1 | HIGH | affected | opensuse-leap | |
rancher/mirrored-s3gw-s3gw:v0.14.0 | true | Rancher v2.8 head | perl-base | perl-base@5.26.1-150300.17.11.1 | SUSE-SU-2023:2882-1 | HIGH | affected | opensuse-leap | |
rancher/mirrored-sig-storage-csi-attacher:v4.5.1 | true | Rancher v2.8 head | csi-attacher | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.44.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-attacher:v4.5.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-attacher:v4.5.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-attacher:v4.5.1 | true | Rancher v2.8 head | csi-attacher | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.10.1 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.10.1 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.10.1 | true | Rancher v2.8 head | csi-node-driver-registrar | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.1 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.1 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.1 | true | Rancher v2.8 head | csi-provisioner | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.1 | true | Rancher v2.8 head | csi-resizer | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.44.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.1 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.1 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-resizer:v1.10.1 | true | Rancher v2.8 head | csi-resizer | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.1 | true | Rancher v2.8 head | csi-snapshotter | golang.org/x/net@v0.4.0 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.1 | true | Rancher v2.8 head | csi-snapshotter | golang.org/x/net@v0.4.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.1 | true | Rancher v2.8 head | csi-snapshotter | google.golang.org/grpc@v1.50.1 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.1 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.1 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.1 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.1 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.1 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.1 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.1 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2022-32190 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.1 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.1 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.1 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.1 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.1 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.1 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.1 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.1 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.1 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.1 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.1 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.1 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.1 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.1 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.1 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.1 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.1 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.1 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.2 | true | Rancher v2.8 head | csi-snapshotter | golang.org/x/net@v0.8.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.2 | true | Rancher v2.8 head | csi-snapshotter | google.golang.org/grpc@v1.50.1 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.2 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.2 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.2 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.2 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.2 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.2 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.2 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2022-32190 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.2 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.2 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.2 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.2 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.2 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.2 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.2 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.2 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.2 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.2 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.2 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.2 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.2 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.2 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.2 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.2 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.2 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.2 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.19 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.2 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.2 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.2 | true | Rancher v2.8 head | csi-snapshotter | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.12.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.21.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.12.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.21.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.12.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.21.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | github.com/prometheus/client_golang@v1.11.0 | CVE-2022-21698 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | golang.org/x/net@v0.0.0-20210520170846-37e1c6afe023 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | golang.org/x/net@v0.0.0-20210520170846-37e1c6afe023 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | golang.org/x/net@v0.0.0-20210520170846-37e1c6afe023 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | golang.org/x/net@v0.0.0-20210520170846-37e1c6afe023 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | golang.org/x/text@v0.3.6 | CVE-2021-38561 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | golang.org/x/text@v0.3.6 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | google.golang.org/grpc@v1.38.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2021-33195 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2021-33196 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2021-33198 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2021-39293 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-livenessprobe:v2.4.0 | true | Rancher v2.8 head | livenessprobe | stdlib@v1.16.2 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.8 head | snapshot-controller | golang.org/x/net@v0.4.0 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.8 head | snapshot-controller | golang.org/x/net@v0.4.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.8 head | snapshot-controller | stdlib@v1.19 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.8 head | snapshot-controller | stdlib@v1.19 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.8 head | snapshot-controller | stdlib@v1.19 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.8 head | snapshot-controller | stdlib@v1.19 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.8 head | snapshot-controller | stdlib@v1.19 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.8 head | snapshot-controller | stdlib@v1.19 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.8 head | snapshot-controller | stdlib@v1.19 | CVE-2022-32190 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.8 head | snapshot-controller | stdlib@v1.19 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.8 head | snapshot-controller | stdlib@v1.19 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.8 head | snapshot-controller | stdlib@v1.19 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.8 head | snapshot-controller | stdlib@v1.19 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.8 head | snapshot-controller | stdlib@v1.19 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.8 head | snapshot-controller | stdlib@v1.19 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.8 head | snapshot-controller | stdlib@v1.19 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.8 head | snapshot-controller | stdlib@v1.19 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.8 head | snapshot-controller | stdlib@v1.19 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.8 head | snapshot-controller | stdlib@v1.19 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.8 head | snapshot-controller | stdlib@v1.19 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.8 head | snapshot-controller | stdlib@v1.19 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.8 head | snapshot-controller | stdlib@v1.19 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.8 head | snapshot-controller | stdlib@v1.19 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.8 head | snapshot-controller | stdlib@v1.19 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.8 head | snapshot-controller | stdlib@v1.19 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.8 head | snapshot-controller | stdlib@v1.19 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.8 head | snapshot-controller | stdlib@v1.19 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-controller:v8.1.0 | true | Rancher v2.8 head | snapshot-controller | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.8 head | snapshot-validation-webhook | golang.org/x/net@v0.8.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.8 head | snapshot-validation-webhook | stdlib@v1.19 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.8 head | snapshot-validation-webhook | stdlib@v1.19 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.8 head | snapshot-validation-webhook | stdlib@v1.19 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.8 head | snapshot-validation-webhook | stdlib@v1.19 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.8 head | snapshot-validation-webhook | stdlib@v1.19 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.8 head | snapshot-validation-webhook | stdlib@v1.19 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.8 head | snapshot-validation-webhook | stdlib@v1.19 | CVE-2022-32190 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.8 head | snapshot-validation-webhook | stdlib@v1.19 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.8 head | snapshot-validation-webhook | stdlib@v1.19 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.8 head | snapshot-validation-webhook | stdlib@v1.19 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.8 head | snapshot-validation-webhook | stdlib@v1.19 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.8 head | snapshot-validation-webhook | stdlib@v1.19 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.8 head | snapshot-validation-webhook | stdlib@v1.19 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.8 head | snapshot-validation-webhook | stdlib@v1.19 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.8 head | snapshot-validation-webhook | stdlib@v1.19 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.8 head | snapshot-validation-webhook | stdlib@v1.19 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.8 head | snapshot-validation-webhook | stdlib@v1.19 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.8 head | snapshot-validation-webhook | stdlib@v1.19 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.8 head | snapshot-validation-webhook | stdlib@v1.19 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.8 head | snapshot-validation-webhook | stdlib@v1.19 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.8 head | snapshot-validation-webhook | stdlib@v1.19 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.8 head | snapshot-validation-webhook | stdlib@v1.19 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.8 head | snapshot-validation-webhook | stdlib@v1.19 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.8 head | snapshot-validation-webhook | stdlib@v1.19 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.8 head | snapshot-validation-webhook | stdlib@v1.19 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v8.1.0 | true | Rancher v2.8 head | snapshot-validation-webhook | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | golang.org/x/net@v0.0.0-20210224082022-3d97a244fca7 | CVE-2021-33194 | HIGH | affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | golang.org/x/net@v0.0.0-20210224082022-3d97a244fca7 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | golang.org/x/net@v0.0.0-20210224082022-3d97a244fca7 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | golang.org/x/net@v0.0.0-20210224082022-3d97a244fca7 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | golang.org/x/net@v0.0.0-20210224082022-3d97a244fca7 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | golang.org/x/text@v0.3.4 | CVE-2021-38561 | HIGH | affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | golang.org/x/text@v0.3.4 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2021-41771 | HIGH | affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2021-41772 | HIGH | affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2021-44716 | HIGH | affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 | true | Rancher v2.8 head | admission-webhook/admission-webhook | stdlib@v1.16.9 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-sonobuoy-sonobuoy:v0.57.2 | true | Rancher v2.8 head | sonobuoy | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-thanos-thanos:v0.34.1 | true | Rancher v2.8 head | bin/thanos | stdlib@v1.21.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-thanos-thanos:v0.34.1 | true | Rancher v2.8 head | bin/thanos | stdlib@v1.21.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/mirrored-thanos-thanos:v0.34.1 | true | Rancher v2.8 head | bin/thanos | stdlib@v1.21.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/neuvector-controller:5.4.2 | false | Rancher v2.8 head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/neuvector-controller:5.4.2 | false | Rancher v2.8 head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/neuvector-enforcer:5.4.2 | false | Rancher v2.8 head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/neuvector-enforcer:5.4.2 | false | Rancher v2.8 head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/neuvector-enforcer:5.4.2 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/neuvector-enforcer:5.4.2 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/neuvector-manager:5.4.2 | false | Rancher v2.8 head | libpython3_12-1_0 | libpython3_12-1_0@3.12.8-150600.3.15.1 | SUSE-SU-2025:0521-1 | HIGH | affected | sles | |
rancher/neuvector-manager:5.4.2 | false | Rancher v2.8 head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/neuvector-manager:5.4.2 | false | Rancher v2.8 head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/neuvector-manager:5.4.2 | false | Rancher v2.8 head | python312 | python312@3.12.8-150600.3.15.1 | SUSE-SU-2025:0521-1 | HIGH | affected | sles | |
rancher/neuvector-manager:5.4.2 | false | Rancher v2.8 head | python312-base | python312-base@3.12.8-150600.3.15.1 | SUSE-SU-2025:0521-1 | HIGH | affected | sles | |
rancher/neuvector-prometheus-exporter:1.0.1 | false | Rancher v2.8 head | libpython3_12-1_0 | libpython3_12-1_0@3.12.8-150600.3.15.1 | SUSE-SU-2025:0521-1 | HIGH | affected | sles | |
rancher/neuvector-prometheus-exporter:1.0.1 | false | Rancher v2.8 head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/neuvector-prometheus-exporter:1.0.1 | false | Rancher v2.8 head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/neuvector-prometheus-exporter:1.0.1 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/neuvector-prometheus-exporter:1.0.1 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/neuvector-prometheus-exporter:1.0.1 | false | Rancher v2.8 head | python312 | python312@3.12.8-150600.3.15.1 | SUSE-SU-2025:0521-1 | HIGH | affected | sles | |
rancher/neuvector-prometheus-exporter:1.0.1 | false | Rancher v2.8 head | python312-base | python312-base@3.12.8-150600.3.15.1 | SUSE-SU-2025:0521-1 | HIGH | affected | sles | |
rancher/neuvector-prometheus-exporter:1.0.1 | false | Rancher v2.8 head | python312-devel | python312-devel@3.12.8-150600.3.15.1 | SUSE-SU-2025:0521-1 | HIGH | affected | sles | |
rancher/neuvector-registry-adapter:0.1.5 | false | Rancher v2.8 head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/neuvector-registry-adapter:0.1.5 | false | Rancher v2.8 head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/neuvector-updater:0.0.1 | false | Rancher v2.8 head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/neuvector-updater:0.0.1 | false | Rancher v2.8 head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:nginx-1.11.3-rancher1 | false | Rancher v2.8 head | libcrypto3 | libcrypto3@3.3.2-r1 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.11.3-rancher1 | false | Rancher v2.8 head | libssl3 | libssl3@3.3.2-r1 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.11.3-rancher1 | false | Rancher v2.8 head | libxml2 | libxml2@2.12.7-r0 | CVE-2024-56171 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.11.3-rancher1 | false | Rancher v2.8 head | libxml2 | libxml2@2.12.7-r0 | CVE-2025-24928 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.11.3-rancher1 | false | Rancher v2.8 head | libxml2 | libxml2@2.12.7-r0 | CVE-2025-27113 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.11.3-rancher1 | false | Rancher v2.8 head | openssl | openssl@3.3.2-r1 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.9.4-rancher1 | false | Rancher v2.8 head | curl | curl@8.4.0-r0 | CVE-2024-2398 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.9.4-rancher1 | false | Rancher v2.8 head | curl | curl@8.4.0-r0 | CVE-2024-6197 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.9.4-rancher1 | false | Rancher v2.8 head | libcurl | libcurl@8.4.0-r0 | CVE-2024-2398 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.9.4-rancher1 | false | Rancher v2.8 head | libcurl | libcurl@8.4.0-r0 | CVE-2024-6197 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.9.4-rancher1 | false | Rancher v2.8 head | libxml2 | libxml2@2.11.4-r0 | CVE-2024-25062 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.9.4-rancher1 | false | Rancher v2.8 head | libxml2 | libxml2@2.11.4-r0 | CVE-2024-56171 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.9.4-rancher1 | false | Rancher v2.8 head | libxml2 | libxml2@2.11.4-r0 | CVE-2025-24928 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.9.4-rancher1 | false | Rancher v2.8 head | libxml2 | libxml2@2.11.4-r0 | CVE-2025-27113 | HIGH | affected | alpine | |
rancher/nginx-ingress-controller:nginx-1.9.4-rancher1 | false | Rancher v2.8 head | dbg | stdlib@v1.21.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/nginx-ingress-controller:nginx-1.9.4-rancher1 | false | Rancher v2.8 head | dbg | stdlib@v1.21.3 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/nginx-ingress-controller:nginx-1.9.4-rancher1 | false | Rancher v2.8 head | dbg | stdlib@v1.21.3 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/nginx-ingress-controller:nginx-1.9.4-rancher1 | false | Rancher v2.8 head | dbg | stdlib@v1.21.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/nginx-ingress-controller:nginx-1.9.4-rancher1 | false | Rancher v2.8 head | nginx-ingress-controller | github.com/opencontainers/runc@v1.1.9 | CVE-2024-21626 | HIGH | affected | gobinary | |
rancher/nginx-ingress-controller:nginx-1.9.4-rancher1 | false | Rancher v2.8 head | nginx-ingress-controller | golang.org/x/net@v0.17.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/nginx-ingress-controller:nginx-1.9.4-rancher1 | false | Rancher v2.8 head | nginx-ingress-controller | stdlib@v1.21.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/nginx-ingress-controller:nginx-1.9.4-rancher1 | false | Rancher v2.8 head | nginx-ingress-controller | stdlib@v1.21.3 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/nginx-ingress-controller:nginx-1.9.4-rancher1 | false | Rancher v2.8 head | nginx-ingress-controller | stdlib@v1.21.3 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/nginx-ingress-controller:nginx-1.9.4-rancher1 | false | Rancher v2.8 head | nginx-ingress-controller | stdlib@v1.21.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/nginx-ingress-controller:nginx-1.9.4-rancher1 | false | Rancher v2.8 head | wait-shutdown | stdlib@v1.21.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/nginx-ingress-controller:nginx-1.9.4-rancher1 | false | Rancher v2.8 head | wait-shutdown | stdlib@v1.21.3 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/nginx-ingress-controller:nginx-1.9.4-rancher1 | false | Rancher v2.8 head | wait-shutdown | stdlib@v1.21.3 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/nginx-ingress-controller:nginx-1.9.4-rancher1 | false | Rancher v2.8 head | wait-shutdown | stdlib@v1.21.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/nginx-ingress-controller:v1.10.4-hardened2 | false | Rancher v2.8 head | git | git@2.43.0-150600.3.6.1 | SUSE-SU-2025:0116-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened2 | false | Rancher v2.8 head | git-core | git-core@2.43.0-150600.3.6.1 | SUSE-SU-2025:0116-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened2 | false | Rancher v2.8 head | glib2-tools | glib2-tools@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened2 | false | Rancher v2.8 head | libgio-2_0-0 | libgio-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened2 | false | Rancher v2.8 head | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened2 | false | Rancher v2.8 head | libgmodule-2_0-0 | libgmodule-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened2 | false | Rancher v2.8 head | libgobject-2_0-0 | libgobject-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened2 | false | Rancher v2.8 head | libopenssl-3-devel | libopenssl-3-devel@3.1.4-150600.5.10.1 | SUSE-SU-2024:3106-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened2 | false | Rancher v2.8 head | libopenssl-3-devel | libopenssl-3-devel@3.1.4-150600.5.10.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened2 | false | Rancher v2.8 head | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.1.4-150600.5.10.1 | SUSE-SU-2024:3106-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened2 | false | Rancher v2.8 head | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.1.4-150600.5.10.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened2 | false | Rancher v2.8 head | libopenssl3 | libopenssl3@3.1.4-150600.5.10.1 | SUSE-SU-2024:3106-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened2 | false | Rancher v2.8 head | libopenssl3 | libopenssl3@3.1.4-150600.5.10.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened2 | false | Rancher v2.8 head | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150600.16.4.2 | SUSE-SU-2024:3745-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened2 | false | Rancher v2.8 head | libprotobuf25_1_0 | libprotobuf25_1_0@25.1-150600.16.4.2 | SUSE-SU-2024:3745-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened2 | false | Rancher v2.8 head | libprotoc25_1_0 | libprotoc25_1_0@25.1-150600.16.4.2 | SUSE-SU-2024:3745-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened2 | false | Rancher v2.8 head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened2 | false | Rancher v2.8 head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened2 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened2 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened2 | false | Rancher v2.8 head | libxml2-tools | libxml2-tools@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened2 | false | Rancher v2.8 head | libxml2-tools | libxml2-tools@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened2 | false | Rancher v2.8 head | openssl-3 | openssl-3@3.1.4-150600.5.10.1 | SUSE-SU-2024:3106-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened2 | false | Rancher v2.8 head | openssl-3 | openssl-3@3.1.4-150600.5.10.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened2 | false | Rancher v2.8 head | perl-Git | perl-Git@2.43.0-150600.3.6.1 | SUSE-SU-2025:0116-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened2 | false | Rancher v2.8 head | dbg | stdlib@v1.22.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/nginx-ingress-controller:v1.10.4-hardened2 | false | Rancher v2.8 head | nginx-ingress-controller | golang.org/x/net@v0.28.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/nginx-ingress-controller:v1.10.4-hardened2 | false | Rancher v2.8 head | nginx-ingress-controller | stdlib@v1.22.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/nginx-ingress-controller:v1.10.4-hardened2 | false | Rancher v2.8 head | wait-shutdown | stdlib@v1.22.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.8 head | git | git@2.43.0-150600.3.6.1 | SUSE-SU-2025:0116-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.8 head | git-core | git-core@2.43.0-150600.3.6.1 | SUSE-SU-2025:0116-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.8 head | glib2-tools | glib2-tools@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.8 head | libgio-2_0-0 | libgio-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.8 head | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.8 head | libgmodule-2_0-0 | libgmodule-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.8 head | libgobject-2_0-0 | libgobject-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.8 head | libopenssl-3-devel | libopenssl-3-devel@3.1.4-150600.5.15.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.8 head | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.1.4-150600.5.15.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.8 head | libopenssl3 | libopenssl3@3.1.4-150600.5.15.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.8 head | libprotobuf25_1_0 | libprotobuf25_1_0@25.1-150600.16.4.2 | SUSE-SU-2024:3745-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.8 head | libprotoc25_1_0 | libprotoc25_1_0@25.1-150600.16.4.2 | SUSE-SU-2024:3745-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.8 head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.8 head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.8 head | libxml2-tools | libxml2-tools@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.8 head | libxml2-tools | libxml2-tools@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.8 head | openssl-3 | openssl-3@3.1.4-150600.5.15.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.8 head | perl-Git | perl-Git@2.43.0-150600.3.6.1 | SUSE-SU-2025:0116-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.4-hardened3 | false | Rancher v2.8 head | nginx-ingress-controller | golang.org/x/net@v0.28.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/nginx-ingress-controller:v1.10.5-hardened3 | false | Rancher v2.8 head | git | git@2.43.0-150600.3.6.1 | SUSE-SU-2025:0116-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened3 | false | Rancher v2.8 head | git-core | git-core@2.43.0-150600.3.6.1 | SUSE-SU-2025:0116-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened3 | false | Rancher v2.8 head | glib2-tools | glib2-tools@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened3 | false | Rancher v2.8 head | libgio-2_0-0 | libgio-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened3 | false | Rancher v2.8 head | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened3 | false | Rancher v2.8 head | libgmodule-2_0-0 | libgmodule-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened3 | false | Rancher v2.8 head | libgobject-2_0-0 | libgobject-2_0-0@2.78.6-150600.4.3.1 | SUSE-SU-2024:4254-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened3 | false | Rancher v2.8 head | libprotobuf25_1_0 | libprotobuf25_1_0@25.1-150600.16.4.2 | SUSE-SU-2024:3745-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened3 | false | Rancher v2.8 head | libprotoc25_1_0 | libprotoc25_1_0@25.1-150600.16.4.2 | SUSE-SU-2024:3745-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened3 | false | Rancher v2.8 head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened3 | false | Rancher v2.8 head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened3 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened3 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened3 | false | Rancher v2.8 head | libxml2-tools | libxml2-tools@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened3 | false | Rancher v2.8 head | libxml2-tools | libxml2-tools@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/nginx-ingress-controller:v1.10.5-hardened3 | false | Rancher v2.8 head | perl-Git | perl-Git@2.43.0-150600.3.6.1 | SUSE-SU-2025:0116-1 | HIGH | affected | sles | |
rancher/prometheus-federator:v0.3.4 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.46.1 | SUSE-SU-2024:1375-1 | HIGH | affected | sles | |
rancher/prometheus-federator:v0.3.4 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.46.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
rancher/prometheus-federator:v0.3.4 | false | Rancher v2.8 head | libgcc_s1 | libgcc_s1@12.3.0+git1204-150000.1.10.1 | SUSE-SU-2023:3661-1 | HIGH | affected | sles | |
rancher/prometheus-federator:v0.3.4 | false | Rancher v2.8 head | libgcc_s1 | libgcc_s1@12.3.0+git1204-150000.1.10.1 | SUSE-SU-2023:4162-1 | HIGH | affected | sles | |
rancher/prometheus-federator:v0.3.4 | false | Rancher v2.8 head | libgcc_s1 | libgcc_s1@12.3.0+git1204-150000.1.10.1 | SUSE-SU-2023:4458-1 | HIGH | affected | sles | |
rancher/prometheus-federator:v0.3.4 | false | Rancher v2.8 head | libstdc++6 | libstdc++6@12.3.0+git1204-150000.1.10.1 | SUSE-SU-2023:3661-1 | HIGH | affected | sles | |
rancher/prometheus-federator:v0.3.4 | false | Rancher v2.8 head | libstdc++6 | libstdc++6@12.3.0+git1204-150000.1.10.1 | SUSE-SU-2023:4162-1 | HIGH | affected | sles | |
rancher/prometheus-federator:v0.3.4 | false | Rancher v2.8 head | libstdc++6 | libstdc++6@12.3.0+git1204-150000.1.10.1 | SUSE-SU-2023:4458-1 | HIGH | affected | sles | |
rancher/prometheus-federator:v0.3.4 | false | Rancher v2.8 head | usr/bin/prometheus-federator | stdlib@v1.19.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/prometheus-federator:v0.3.4 | false | Rancher v2.8 head | usr/bin/prometheus-federator | stdlib@v1.19.10 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/prometheus-federator:v0.3.4 | false | Rancher v2.8 head | usr/bin/prometheus-federator | stdlib@v1.19.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/prometheus-federator:v0.3.4 | false | Rancher v2.8 head | usr/bin/prometheus-federator | stdlib@v1.19.10 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/prometheus-federator:v0.3.4 | false | Rancher v2.8 head | usr/bin/prometheus-federator | stdlib@v1.19.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/prometheus-federator:v0.3.4 | false | Rancher v2.8 head | usr/bin/prometheus-federator | stdlib@v1.19.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/pushprox-client:v0.1.4-rancher2-client | false | Rancher v2.8 head | libcrypto3 | libcrypto3@3.3.2-r0 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/pushprox-client:v0.1.4-rancher2-client | false | Rancher v2.8 head | libssl3 | libssl3@3.3.2-r0 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/pushprox-proxy:v0.1.4-rancher2-proxy | false | Rancher v2.8 head | libcrypto3 | libcrypto3@3.3.2-r0 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/pushprox-proxy:v0.1.4-rancher2-proxy | false | Rancher v2.8 head | libssl3 | libssl3@3.3.2-r0 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/rancher-agent:v2.8-head | false | Rancher v2.8 head | bind-utils | bind-utils@9.16.48-150500.8.16.1 | SUSE-SU-2024:2862-1 | HIGH | affected | sles | |
rancher/rancher-agent:v2.8-head | false | Rancher v2.8 head | bind-utils | bind-utils@9.16.48-150500.8.16.1 | SUSE-SU-2025:0359-1 | HIGH | affected | sles | |
rancher/rancher-agent:v2.8-head | false | Rancher v2.8 head | git-core | git-core@2.35.3-150300.10.39.1 | SUSE-SU-2024:2656-1 | HIGH | affected | sles | |
rancher/rancher-agent:v2.8-head | false | Rancher v2.8 head | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.11.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
rancher/rancher-agent:v2.8-head | false | Rancher v2.8 head | libprotobuf-lite25_1_0 | libprotobuf-lite25_1_0@25.1-150500.12.2.2 | SUSE-SU-2024:3747-1 | HIGH | affected | sles | |
rancher/rancher-agent:v2.8-head | false | Rancher v2.8 head | libpython3_6m1_0 | libpython3_6m1_0@3.6.15-150300.10.65.1 | SUSE-SU-2024:3470-1 | HIGH | affected | sles | |
rancher/rancher-agent:v2.8-head | false | Rancher v2.8 head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/rancher-agent:v2.8-head | false | Rancher v2.8 head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/rancher-agent:v2.8-head | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/rancher-agent:v2.8-head | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/rancher-agent:v2.8-head | false | Rancher v2.8 head | python3 | python3@3.6.15-150300.10.65.2 | SUSE-SU-2024:3470-1 | HIGH | affected | sles | |
rancher/rancher-agent:v2.8-head | false | Rancher v2.8 head | python3-base | python3-base@3.6.15-150300.10.65.1 | SUSE-SU-2024:3470-1 | HIGH | affected | sles | |
rancher/rancher-agent:v2.8-head | false | Rancher v2.8 head | python3-bind | python3-bind@9.16.48-150500.8.16.1 | SUSE-SU-2024:2862-1 | HIGH | affected | sles | |
rancher/rancher-agent:v2.8-head | false | Rancher v2.8 head | python3-bind | python3-bind@9.16.48-150500.8.16.1 | SUSE-SU-2025:0359-1 | HIGH | affected | sles | |
rancher/rancher-agent:v2.8-head | false | Rancher v2.8 head | usr/bin/agent | github.com/crewjam/saml@v0.4.13 | CVE-2023-45683 | HIGH | affected | gobinary | |
rancher/rancher-agent:v2.8-head | false | Rancher v2.8 head | usr/bin/agent | github.com/rancher/apiserver@v0.0.0-20240207153744-69b3c2b56f3f | CVE-2023-32192 | HIGH | affected | gobinary | |
rancher/rancher-agent:v2.8-head | false | Rancher v2.8 head | usr/bin/agent | github.com/rancher/norman@v0.0.0-20240206180703-6eda4bc94b4c | CVE-2023-32193 | HIGH | affected | gobinary | |
rancher/rancher-agent:v2.8-head | false | Rancher v2.8 head | usr/bin/agent | github.com/rancher/steve@v0.0.0-20240529152548-9fb3e50aa806 | CVE-2024-52280 | HIGH | affected | gobinary | |
rancher/rancher-agent:v2.8-head | false | Rancher v2.8 head | usr/bin/agent | k8s.io/kubernetes@v1.28.6 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/rancher-agent:v2.8-head | false | Rancher v2.8 head | usr/bin/agent | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher-agent:v2.8-head | false | Rancher v2.8 head | usr/bin/kubectl | golang.org/x/crypto@v0.0.0-20220315160706-3147a52a75dd | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher-agent:v2.8-head | false | Rancher v2.8 head | usr/bin/kubectl | golang.org/x/net@v0.8.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rancher-agent:v2.8-head | false | Rancher v2.8 head | usr/bin/kubectl | stdlib@v1.20.6 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher-agent:v2.8-head | false | Rancher v2.8 head | usr/bin/kubectl | stdlib@v1.20.6 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rancher-agent:v2.8-head | false | Rancher v2.8 head | usr/bin/kubectl | stdlib@v1.20.6 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher-agent:v2.8-head | false | Rancher v2.8 head | usr/bin/kubectl | stdlib@v1.20.6 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher-agent:v2.8-head | false | Rancher v2.8 head | usr/bin/kubectl | stdlib@v1.20.6 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher-agent:v2.8-head | false | Rancher v2.8 head | usr/bin/loglevel | stdlib@v1.22.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher-agent:v2.8-head | false | Rancher v2.8 head | usr/bin/loglevel | stdlib@v1.22.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher-csp-adapter:v3.0.1 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.63.1 | SUSE-SU-2024:1375-1 | HIGH | affected | sles | |
rancher/rancher-csp-adapter:v3.0.1 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.63.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
rancher/rancher-csp-adapter:v3.0.1 | false | Rancher v2.8 head | usr/bin/csp-adapter | stdlib@v1.20.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher-csp-adapter:v3.0.1 | false | Rancher v2.8 head | usr/bin/csp-adapter | stdlib@v1.20.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher-csp-adapter:v3.0.1 | false | Rancher v2.8 head | usr/bin/csp-adapter | stdlib@v1.20.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher-webhook:v0.4.17-rc.1 | false | Rancher v2.8 head | usr/bin/webhook | k8s.io/kubernetes@v1.28.6 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | curl | curl@8.6.0-150600.2.2 | SUSE-SU-2024:2784-1 | HIGH | affected | sles | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | git-core | git-core@2.43.0-150600.3.6.1 | SUSE-SU-2025:0116-1 | HIGH | affected | sles | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | libcurl4 | libcurl4@8.6.0-150600.2.2 | SUSE-SU-2024:2784-1 | HIGH | affected | sles | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | libopenssl3 | libopenssl3@3.1.4-150600.5.7.1 | SUSE-SU-2024:2635-1 | HIGH | affected | sles | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | libopenssl3 | libopenssl3@3.1.4-150600.5.7.1 | SUSE-SU-2024:3106-1 | HIGH | affected | sles | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | libopenssl3 | libopenssl3@3.1.4-150600.5.7.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | openssl-3 | openssl-3@3.1.4-150600.5.7.1 | SUSE-SU-2024:2635-1 | HIGH | affected | sles | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | openssl-3 | openssl-3@3.1.4-150600.5.7.1 | SUSE-SU-2024:3106-1 | HIGH | affected | sles | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | openssl-3 | openssl-3@3.1.4-150600.5.7.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | opt/drivers/management-state/bin/docker-machine-driver-harvester | github.com/docker/docker@v20.10.9+incompatible | CVE-2023-28840 | HIGH | affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | opt/drivers/management-state/bin/docker-machine-driver-harvester | kubevirt.io/kubevirt@v0.54.0 | CVE-2023-26484 | HIGH | affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | opt/drivers/management-state/bin/docker-machine-driver-harvester | kubevirt.io/kubevirt@v0.54.0 | GHSA-qv98-3369-g364 | HIGH | affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | opt/drivers/management-state/bin/docker-machine-driver-harvester | stdlib@v1.20.12 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | opt/drivers/management-state/bin/docker-machine-driver-harvester | stdlib@v1.20.12 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | opt/drivers/management-state/bin/docker-machine-driver-harvester | stdlib@v1.20.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | opt/drivers/management-state/bin/docker-machine-driver-linode | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | opt/drivers/management-state/bin/docker-machine-driver-linode | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | opt/drivers/management-state/bin/docker-machine-driver-linode | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | opt/drivers/management-state/bin/docker-machine-driver-linode | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | opt/drivers/management-state/bin/docker-machine-driver-linode | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/bandwidth | stdlib@v1.20.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/bandwidth | stdlib@v1.20.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/bandwidth | stdlib@v1.20.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/cni | stdlib@v1.20.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/cni | stdlib@v1.20.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/cni | stdlib@v1.20.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/containerd | github.com/jackc/pgx/v5@v5.4.2 | CVE-2024-27304 | HIGH | affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/containerd | github.com/quic-go/quic-go@v0.38.2 | CVE-2024-22189 | HIGH | affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/containerd | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/containerd | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/containerd | stdlib@v1.20.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/containerd | stdlib@v1.20.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/containerd | stdlib@v1.20.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/containerd-shim-runc-v2 | stdlib@v1.20.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/containerd-shim-runc-v2 | stdlib@v1.20.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/containerd-shim-runc-v2 | stdlib@v1.20.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/etcdctl | stdlib@v1.19.9 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/etcdctl | stdlib@v1.19.9 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/etcdctl | stdlib@v1.19.9 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/etcdctl | stdlib@v1.19.9 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/etcdctl | stdlib@v1.19.9 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/etcdctl | stdlib@v1.19.9 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/etcdctl | stdlib@v1.19.9 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/firewall | stdlib@v1.20.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/firewall | stdlib@v1.20.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/firewall | stdlib@v1.20.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/helm_v3 | stdlib@v1.20.11 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/helm_v3 | stdlib@v1.20.11 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/helm_v3 | stdlib@v1.20.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/k3s | github.com/jackc/pgx/v5@v5.4.2 | CVE-2024-27304 | HIGH | affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/k3s | github.com/quic-go/quic-go@v0.38.2 | CVE-2024-22189 | HIGH | affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/k3s | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | HIGH | affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/k3s | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/k3s | stdlib@v1.20.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/k3s | stdlib@v1.20.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/k3s | stdlib@v1.20.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/kustomize | stdlib@v1.19.7 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/kustomize | stdlib@v1.19.7 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/kustomize | stdlib@v1.19.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/kustomize | stdlib@v1.19.7 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/kustomize | stdlib@v1.19.7 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/kustomize | stdlib@v1.19.7 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/kustomize | stdlib@v1.19.7 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/kustomize | stdlib@v1.19.7 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/kustomize | stdlib@v1.19.7 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/kustomize | stdlib@v1.19.7 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/kustomize | stdlib@v1.19.7 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/kustomize | stdlib@v1.19.7 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/kustomize | stdlib@v1.19.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/kustomize | stdlib@v1.19.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/loglevel | stdlib@v1.22.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/loglevel | stdlib@v1.22.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/rancher | github.com/crewjam/saml@v0.4.13 | CVE-2023-45683 | HIGH | affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/rancher | github.com/rancher/apiserver@v0.0.0-20240207153744-69b3c2b56f3f | CVE-2023-32192 | HIGH | affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/rancher | github.com/rancher/norman@v0.0.0-20240206180703-6eda4bc94b4c | CVE-2023-32193 | HIGH | affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/rancher | github.com/rancher/steve@v0.0.0-20240529152548-9fb3e50aa806 | CVE-2024-52280 | HIGH | affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/rancher | k8s.io/kubernetes@v1.28.6 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/rancher | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/rancher-machine | stdlib@v1.20.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/rancher-machine | stdlib@v1.20.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/rancher-machine | stdlib@v1.20.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/runc | golang.org/x/net@v0.8.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/runc | stdlib@v1.20.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/runc | stdlib@v1.20.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/runc | stdlib@v1.20.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/telemetry | stdlib@v1.21.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/telemetry | stdlib@v1.21.3 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/telemetry | stdlib@v1.21.3 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/telemetry | stdlib@v1.21.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/share/rancher/ui/assets/docker-machine-driver-harvester | github.com/docker/docker@v20.10.9+incompatible | CVE-2023-28840 | HIGH | affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/share/rancher/ui/assets/docker-machine-driver-harvester | kubevirt.io/kubevirt@v0.54.0 | CVE-2023-26484 | HIGH | affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/share/rancher/ui/assets/docker-machine-driver-harvester | kubevirt.io/kubevirt@v0.54.0 | GHSA-qv98-3369-g364 | HIGH | affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/share/rancher/ui/assets/docker-machine-driver-harvester | stdlib@v1.20.12 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/share/rancher/ui/assets/docker-machine-driver-harvester | stdlib@v1.20.12 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/share/rancher/ui/assets/docker-machine-driver-harvester | stdlib@v1.20.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/share/rancher/ui/assets/docker-machine-driver-linode | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/share/rancher/ui/assets/docker-machine-driver-linode | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/share/rancher/ui/assets/docker-machine-driver-linode | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/share/rancher/ui/assets/docker-machine-driver-linode | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/share/rancher/ui/assets/docker-machine-driver-linode | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/share/rancher/ui/assets/wins.exe | github.com/docker/docker@v20.10.24+incompatible | CVE-2024-41110 | CRITICAL | affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/share/rancher/ui/assets/wins.exe | golang.org/x/net@v0.12.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/share/rancher/ui/assets/wins.exe | golang.org/x/net@v0.12.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/share/rancher/ui/assets/wins.exe | google.golang.org/grpc@v1.45.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/share/rancher/ui/assets/wins.exe | k8s.io/kubernetes@v1.24.16 | CVE-2023-3676 | HIGH | affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/share/rancher/ui/assets/wins.exe | k8s.io/kubernetes@v1.24.16 | CVE-2023-3955 | HIGH | affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/share/rancher/ui/assets/wins.exe | k8s.io/kubernetes@v1.24.16 | CVE-2023-5528 | HIGH | affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/share/rancher/ui/assets/wins.exe | k8s.io/kubernetes@v1.24.16 | CVE-2024-0793 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/share/rancher/ui/assets/wins.exe | k8s.io/kubernetes@v1.24.16 | CVE-2024-10220 | HIGH | affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/share/rancher/ui/assets/wins.exe | k8s.io/kubernetes@v1.24.16 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/share/rancher/ui/assets/wins.exe | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | libexpat | libexpat@2.6.2-r0 | CVE-2024-45491 | CRITICAL | affected | alpine | |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | libexpat | libexpat@2.6.2-r0 | CVE-2024-45492 | CRITICAL | affected | alpine | |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | libexpat | libexpat@2.6.2-r0 | CVE-2024-45490 | HIGH | affected | alpine | |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | libxml2 | libxml2@2.11.8-r0 | CVE-2024-56171 | HIGH | affected | alpine | |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | libxml2 | libxml2@2.11.8-r0 | CVE-2025-24928 | HIGH | affected | alpine | |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | libxml2 | libxml2@2.11.8-r0 | CVE-2025-27113 | HIGH | affected | alpine | |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | opt/rke-tools/bin/cri-dockerd | k8s.io/kubernetes@v1.27.13 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | opt/rke-tools/bin/cri-dockerd | stdlib@v1.21.9 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | opt/rke-tools/bin/cri-dockerd | stdlib@v1.21.9 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | opt/rke-tools/bin/docker | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | opt/rke-tools/rke-etcd-backup | golang.org/x/crypto@v0.23.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | opt/rke-tools/rke-etcd-backup | golang.org/x/net@v0.25.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | opt/rke-tools/rke-etcd-backup | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | tmp/bandwidth | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | tmp/bridge | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | tmp/dhcp | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | tmp/dummy | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | tmp/firewall | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | tmp/flannel | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | tmp/host-device | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | tmp/host-local | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | tmp/ipvlan | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | tmp/loopback | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | tmp/macvlan | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | tmp/portmap | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | tmp/ptp | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | tmp/sbr | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | tmp/static | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | tmp/tap | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | tmp/tuning | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | tmp/vlan | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | tmp/vrf | stdlib@v1.22.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | usr/bin/confd | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.21.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.21.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.105 | false | Rancher v2.8 head | libcrypto3 | libcrypto3@3.3.2-r1 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/rke-tools:v0.1.105 | false | Rancher v2.8 head | libssl3 | libssl3@3.3.2-r1 | CVE-2024-12797 | HIGH | affected | alpine | |
rancher/rke-tools:v0.1.105 | false | Rancher v2.8 head | libxml2 | libxml2@2.12.7-r0 | CVE-2024-56171 | HIGH | affected | alpine | |
rancher/rke-tools:v0.1.105 | false | Rancher v2.8 head | libxml2 | libxml2@2.12.7-r0 | CVE-2025-24928 | HIGH | affected | alpine | |
rancher/rke-tools:v0.1.105 | false | Rancher v2.8 head | libxml2 | libxml2@2.12.7-r0 | CVE-2025-27113 | HIGH | affected | alpine | |
rancher/rke-tools:v0.1.105 | false | Rancher v2.8 head | opt/rke-tools/bin/cri-dockerd | k8s.io/kubernetes@v1.27.13 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.105 | false | Rancher v2.8 head | opt/rke-tools/bin/cri-dockerd | stdlib@v1.21.9 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.105 | false | Rancher v2.8 head | opt/rke-tools/bin/cri-dockerd | stdlib@v1.21.9 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.105 | false | Rancher v2.8 head | opt/rke-tools/bin/docker | stdlib@v1.21.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.105 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | libexpat | libexpat@2.5.0-r0 | CVE-2024-45491 | CRITICAL | affected | alpine | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | libexpat | libexpat@2.5.0-r0 | CVE-2024-45492 | CRITICAL | affected | alpine | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | libexpat | libexpat@2.5.0-r0 | CVE-2023-52425 | HIGH | affected | alpine | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | libexpat | libexpat@2.5.0-r0 | CVE-2024-28757 | HIGH | affected | alpine | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | libexpat | libexpat@2.5.0-r0 | CVE-2024-45490 | HIGH | affected | alpine | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | libx11 | libx11@1.8.4-r1 | CVE-2023-43787 | HIGH | affected | alpine | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/bin/cri-dockerd | github.com/opencontainers/runc@v1.1.5 | CVE-2024-21626 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/bin/cri-dockerd | google.golang.org/grpc@v1.51.0 | GHSA-m425-mq94-257g | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/bin/cri-dockerd | k8s.io/kubernetes@v1.22.8 | CVE-2023-5528 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/bin/cri-dockerd | k8s.io/kubernetes@v1.22.8 | CVE-2024-0793 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/bin/cri-dockerd | k8s.io/kubernetes@v1.22.8 | CVE-2024-5321 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/bin/cri-dockerd | stdlib@v1.20.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/bin/cri-dockerd | stdlib@v1.20.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/bin/cri-dockerd | stdlib@v1.20.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/bin/cri-dockerd | stdlib@v1.20.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/bin/cri-dockerd | stdlib@v1.20.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/bin/cri-dockerd | stdlib@v1.20.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/bin/docker | stdlib@v1.19.7 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/bin/docker | stdlib@v1.19.7 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/bin/docker | stdlib@v1.19.7 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/bin/docker | stdlib@v1.19.7 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/bin/docker | stdlib@v1.19.7 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/bin/docker | stdlib@v1.19.7 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/bin/docker | stdlib@v1.19.7 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/bin/docker | stdlib@v1.19.7 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/bin/docker | stdlib@v1.19.7 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/bin/docker | stdlib@v1.19.7 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/bin/docker | stdlib@v1.19.7 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/bin/docker | stdlib@v1.19.7 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/bin/docker | stdlib@v1.19.7 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/bin/docker | stdlib@v1.19.7 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/rke-etcd-backup | golang.org/x/crypto@v0.6.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/rke-etcd-backup | golang.org/x/net@v0.7.0 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/rke-etcd-backup | golang.org/x/net@v0.7.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/rke-etcd-backup | stdlib@v1.21.3 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/rke-etcd-backup | stdlib@v1.21.3 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/rke-etcd-backup | stdlib@v1.21.3 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/rke-etcd-backup | stdlib@v1.21.3 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/bandwidth | stdlib@v1.18.10 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/bandwidth | stdlib@v1.18.10 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/bandwidth | stdlib@v1.18.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/bandwidth | stdlib@v1.18.10 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/bandwidth | stdlib@v1.18.10 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/bandwidth | stdlib@v1.18.10 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/bandwidth | stdlib@v1.18.10 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/bandwidth | stdlib@v1.18.10 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/bandwidth | stdlib@v1.18.10 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/bandwidth | stdlib@v1.18.10 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/bandwidth | stdlib@v1.18.10 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/bandwidth | stdlib@v1.18.10 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/bandwidth | stdlib@v1.18.10 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/bandwidth | stdlib@v1.18.10 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/bandwidth | stdlib@v1.18.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/bandwidth | stdlib@v1.18.10 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/bandwidth | stdlib@v1.18.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/bandwidth | stdlib@v1.18.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/bridge | stdlib@v1.18.10 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/bridge | stdlib@v1.18.10 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/bridge | stdlib@v1.18.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/bridge | stdlib@v1.18.10 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/bridge | stdlib@v1.18.10 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/bridge | stdlib@v1.18.10 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/bridge | stdlib@v1.18.10 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/bridge | stdlib@v1.18.10 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/bridge | stdlib@v1.18.10 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/bridge | stdlib@v1.18.10 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/bridge | stdlib@v1.18.10 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/bridge | stdlib@v1.18.10 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/bridge | stdlib@v1.18.10 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/bridge | stdlib@v1.18.10 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/bridge | stdlib@v1.18.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/bridge | stdlib@v1.18.10 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/bridge | stdlib@v1.18.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/bridge | stdlib@v1.18.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/dhcp | stdlib@v1.18.10 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/dhcp | stdlib@v1.18.10 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/dhcp | stdlib@v1.18.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/dhcp | stdlib@v1.18.10 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/dhcp | stdlib@v1.18.10 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/dhcp | stdlib@v1.18.10 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/dhcp | stdlib@v1.18.10 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/dhcp | stdlib@v1.18.10 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/dhcp | stdlib@v1.18.10 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/dhcp | stdlib@v1.18.10 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/dhcp | stdlib@v1.18.10 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/dhcp | stdlib@v1.18.10 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/dhcp | stdlib@v1.18.10 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/dhcp | stdlib@v1.18.10 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/dhcp | stdlib@v1.18.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/dhcp | stdlib@v1.18.10 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/dhcp | stdlib@v1.18.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/dhcp | stdlib@v1.18.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/dummy | stdlib@v1.18.10 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/dummy | stdlib@v1.18.10 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/dummy | stdlib@v1.18.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/dummy | stdlib@v1.18.10 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/dummy | stdlib@v1.18.10 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/dummy | stdlib@v1.18.10 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/dummy | stdlib@v1.18.10 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/dummy | stdlib@v1.18.10 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/dummy | stdlib@v1.18.10 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/dummy | stdlib@v1.18.10 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/dummy | stdlib@v1.18.10 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/dummy | stdlib@v1.18.10 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/dummy | stdlib@v1.18.10 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/dummy | stdlib@v1.18.10 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/dummy | stdlib@v1.18.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/dummy | stdlib@v1.18.10 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/dummy | stdlib@v1.18.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/dummy | stdlib@v1.18.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/firewall | stdlib@v1.18.10 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/firewall | stdlib@v1.18.10 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/firewall | stdlib@v1.18.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/firewall | stdlib@v1.18.10 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/firewall | stdlib@v1.18.10 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/firewall | stdlib@v1.18.10 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/firewall | stdlib@v1.18.10 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/firewall | stdlib@v1.18.10 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/firewall | stdlib@v1.18.10 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/firewall | stdlib@v1.18.10 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/firewall | stdlib@v1.18.10 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/firewall | stdlib@v1.18.10 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/firewall | stdlib@v1.18.10 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/firewall | stdlib@v1.18.10 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/firewall | stdlib@v1.18.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/firewall | stdlib@v1.18.10 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/firewall | stdlib@v1.18.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/firewall | stdlib@v1.18.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/flannel | stdlib@v1.20.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/flannel | stdlib@v1.20.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/flannel | stdlib@v1.20.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/flannel | stdlib@v1.20.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/flannel | stdlib@v1.20.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/host-device | stdlib@v1.18.10 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/host-device | stdlib@v1.18.10 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/host-device | stdlib@v1.18.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/host-device | stdlib@v1.18.10 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/host-device | stdlib@v1.18.10 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/host-device | stdlib@v1.18.10 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/host-device | stdlib@v1.18.10 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/host-device | stdlib@v1.18.10 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/host-device | stdlib@v1.18.10 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/host-device | stdlib@v1.18.10 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/host-device | stdlib@v1.18.10 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/host-device | stdlib@v1.18.10 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/host-device | stdlib@v1.18.10 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/host-device | stdlib@v1.18.10 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/host-device | stdlib@v1.18.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/host-device | stdlib@v1.18.10 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/host-device | stdlib@v1.18.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/host-device | stdlib@v1.18.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/host-local | stdlib@v1.18.10 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/host-local | stdlib@v1.18.10 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/host-local | stdlib@v1.18.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/host-local | stdlib@v1.18.10 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/host-local | stdlib@v1.18.10 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/host-local | stdlib@v1.18.10 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/host-local | stdlib@v1.18.10 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/host-local | stdlib@v1.18.10 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/host-local | stdlib@v1.18.10 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/host-local | stdlib@v1.18.10 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/host-local | stdlib@v1.18.10 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/host-local | stdlib@v1.18.10 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/host-local | stdlib@v1.18.10 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/host-local | stdlib@v1.18.10 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/host-local | stdlib@v1.18.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/host-local | stdlib@v1.18.10 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/host-local | stdlib@v1.18.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/host-local | stdlib@v1.18.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/ipvlan | stdlib@v1.18.10 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/ipvlan | stdlib@v1.18.10 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/ipvlan | stdlib@v1.18.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/ipvlan | stdlib@v1.18.10 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/ipvlan | stdlib@v1.18.10 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/ipvlan | stdlib@v1.18.10 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/ipvlan | stdlib@v1.18.10 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/ipvlan | stdlib@v1.18.10 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/ipvlan | stdlib@v1.18.10 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/ipvlan | stdlib@v1.18.10 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/ipvlan | stdlib@v1.18.10 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/ipvlan | stdlib@v1.18.10 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/ipvlan | stdlib@v1.18.10 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/ipvlan | stdlib@v1.18.10 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/ipvlan | stdlib@v1.18.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/ipvlan | stdlib@v1.18.10 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/ipvlan | stdlib@v1.18.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/ipvlan | stdlib@v1.18.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/loopback | stdlib@v1.18.10 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/loopback | stdlib@v1.18.10 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/loopback | stdlib@v1.18.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/loopback | stdlib@v1.18.10 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/loopback | stdlib@v1.18.10 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/loopback | stdlib@v1.18.10 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/loopback | stdlib@v1.18.10 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/loopback | stdlib@v1.18.10 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/loopback | stdlib@v1.18.10 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/loopback | stdlib@v1.18.10 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/loopback | stdlib@v1.18.10 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/loopback | stdlib@v1.18.10 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/loopback | stdlib@v1.18.10 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/loopback | stdlib@v1.18.10 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/loopback | stdlib@v1.18.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/loopback | stdlib@v1.18.10 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/loopback | stdlib@v1.18.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/loopback | stdlib@v1.18.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/macvlan | stdlib@v1.18.10 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/macvlan | stdlib@v1.18.10 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/macvlan | stdlib@v1.18.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/macvlan | stdlib@v1.18.10 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/macvlan | stdlib@v1.18.10 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/macvlan | stdlib@v1.18.10 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/macvlan | stdlib@v1.18.10 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/macvlan | stdlib@v1.18.10 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/macvlan | stdlib@v1.18.10 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/macvlan | stdlib@v1.18.10 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/macvlan | stdlib@v1.18.10 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/macvlan | stdlib@v1.18.10 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/macvlan | stdlib@v1.18.10 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/macvlan | stdlib@v1.18.10 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/macvlan | stdlib@v1.18.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/macvlan | stdlib@v1.18.10 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/macvlan | stdlib@v1.18.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/macvlan | stdlib@v1.18.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/portmap | stdlib@v1.18.10 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/portmap | stdlib@v1.18.10 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/portmap | stdlib@v1.18.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/portmap | stdlib@v1.18.10 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/portmap | stdlib@v1.18.10 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/portmap | stdlib@v1.18.10 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/portmap | stdlib@v1.18.10 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/portmap | stdlib@v1.18.10 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/portmap | stdlib@v1.18.10 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/portmap | stdlib@v1.18.10 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/portmap | stdlib@v1.18.10 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/portmap | stdlib@v1.18.10 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/portmap | stdlib@v1.18.10 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/portmap | stdlib@v1.18.10 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/portmap | stdlib@v1.18.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/portmap | stdlib@v1.18.10 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/portmap | stdlib@v1.18.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/portmap | stdlib@v1.18.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/ptp | stdlib@v1.18.10 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/ptp | stdlib@v1.18.10 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/ptp | stdlib@v1.18.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/ptp | stdlib@v1.18.10 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/ptp | stdlib@v1.18.10 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/ptp | stdlib@v1.18.10 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/ptp | stdlib@v1.18.10 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/ptp | stdlib@v1.18.10 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/ptp | stdlib@v1.18.10 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/ptp | stdlib@v1.18.10 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/ptp | stdlib@v1.18.10 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/ptp | stdlib@v1.18.10 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/ptp | stdlib@v1.18.10 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/ptp | stdlib@v1.18.10 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/ptp | stdlib@v1.18.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/ptp | stdlib@v1.18.10 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/ptp | stdlib@v1.18.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/ptp | stdlib@v1.18.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/sbr | stdlib@v1.18.10 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/sbr | stdlib@v1.18.10 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/sbr | stdlib@v1.18.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/sbr | stdlib@v1.18.10 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/sbr | stdlib@v1.18.10 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/sbr | stdlib@v1.18.10 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/sbr | stdlib@v1.18.10 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/sbr | stdlib@v1.18.10 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/sbr | stdlib@v1.18.10 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/sbr | stdlib@v1.18.10 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/sbr | stdlib@v1.18.10 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/sbr | stdlib@v1.18.10 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/sbr | stdlib@v1.18.10 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/sbr | stdlib@v1.18.10 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/sbr | stdlib@v1.18.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/sbr | stdlib@v1.18.10 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/sbr | stdlib@v1.18.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/sbr | stdlib@v1.18.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/static | stdlib@v1.18.10 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/static | stdlib@v1.18.10 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/static | stdlib@v1.18.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/static | stdlib@v1.18.10 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/static | stdlib@v1.18.10 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/static | stdlib@v1.18.10 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/static | stdlib@v1.18.10 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/static | stdlib@v1.18.10 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/static | stdlib@v1.18.10 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/static | stdlib@v1.18.10 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/static | stdlib@v1.18.10 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/static | stdlib@v1.18.10 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/static | stdlib@v1.18.10 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/static | stdlib@v1.18.10 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/static | stdlib@v1.18.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/static | stdlib@v1.18.10 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/static | stdlib@v1.18.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/static | stdlib@v1.18.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/tuning | stdlib@v1.18.10 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/tuning | stdlib@v1.18.10 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/tuning | stdlib@v1.18.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/tuning | stdlib@v1.18.10 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/tuning | stdlib@v1.18.10 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/tuning | stdlib@v1.18.10 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/tuning | stdlib@v1.18.10 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/tuning | stdlib@v1.18.10 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/tuning | stdlib@v1.18.10 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/tuning | stdlib@v1.18.10 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/tuning | stdlib@v1.18.10 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/tuning | stdlib@v1.18.10 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/tuning | stdlib@v1.18.10 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/tuning | stdlib@v1.18.10 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/tuning | stdlib@v1.18.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/tuning | stdlib@v1.18.10 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/tuning | stdlib@v1.18.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/tuning | stdlib@v1.18.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/vlan | stdlib@v1.18.10 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/vlan | stdlib@v1.18.10 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/vlan | stdlib@v1.18.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/vlan | stdlib@v1.18.10 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/vlan | stdlib@v1.18.10 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/vlan | stdlib@v1.18.10 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/vlan | stdlib@v1.18.10 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/vlan | stdlib@v1.18.10 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/vlan | stdlib@v1.18.10 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/vlan | stdlib@v1.18.10 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/vlan | stdlib@v1.18.10 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/vlan | stdlib@v1.18.10 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/vlan | stdlib@v1.18.10 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/vlan | stdlib@v1.18.10 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/vlan | stdlib@v1.18.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/vlan | stdlib@v1.18.10 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/vlan | stdlib@v1.18.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/vlan | stdlib@v1.18.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/vrf | stdlib@v1.18.10 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/vrf | stdlib@v1.18.10 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/vrf | stdlib@v1.18.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/vrf | stdlib@v1.18.10 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/vrf | stdlib@v1.18.10 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/vrf | stdlib@v1.18.10 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/vrf | stdlib@v1.18.10 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/vrf | stdlib@v1.18.10 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/vrf | stdlib@v1.18.10 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/vrf | stdlib@v1.18.10 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/vrf | stdlib@v1.18.10 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/vrf | stdlib@v1.18.10 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/vrf | stdlib@v1.18.10 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/vrf | stdlib@v1.18.10 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/vrf | stdlib@v1.18.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/vrf | stdlib@v1.18.10 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/vrf | stdlib@v1.18.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | tmp/vrf | stdlib@v1.18.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/bin/confd | stdlib@v1.20.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/bin/confd | stdlib@v1.20.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/bin/confd | stdlib@v1.20.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/bin/confd | stdlib@v1.20.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | golang.org/x/net@v0.0.0-20211112202133-69e39bad7dc2 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | golang.org/x/net@v0.0.0-20211112202133-69e39bad7dc2 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | golang.org/x/net@v0.0.0-20211112202133-69e39bad7dc2 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | golang.org/x/net@v0.0.0-20211112202133-69e39bad7dc2 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | golang.org/x/text@v0.3.6 | CVE-2021-38561 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | golang.org/x/text@v0.3.6 | CVE-2022-32149 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.16.15 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.16.15 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.16.15 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.16.15 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.16.15 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.16.15 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.16.15 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.16.15 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.16.15 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.16.15 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.16.15 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.16.15 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.16.15 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.16.15 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.16.15 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.16.15 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.16.15 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.16.15 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.16.15 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.16.15 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.16.15 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.16.15 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.16.15 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.16.15 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.16.15 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.16.15 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.16.15 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.16.15 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.16.15 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.16.15 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.16.15 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.16.15 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.16.15 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.16.15 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.16.15 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | stdlib@v1.16.15 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.19.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.19.10 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.19.10 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.19.10 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.19.10 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.19.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-cloud-provider:v1.28.13-build20240910 | false | Rancher v2.8 head | usr/local/bin/rke2-cloud-provider | golang.org/x/crypto@v0.23.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-cloud-provider:v1.28.13-build20240910 | false | Rancher v2.8 head | usr/local/bin/rke2-cloud-provider | golang.org/x/net@v0.25.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-cloud-provider:v1.29.3-build20240515 | false | Rancher v2.8 head | usr/local/bin/rke2-cloud-provider | stdlib@v1.21.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-cloud-provider:v1.29.3-build20240515 | false | Rancher v2.8 head | usr/local/bin/rke2-cloud-provider | stdlib@v1.21.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-upgrade:v1.27.16-rke2r2 | false | Rancher v2.8 head | opt/rke2 | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/rke2-upgrade:v1.27.16-rke2r2 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/security-scan:v0.3.1 | false | Rancher v2.8 head | usr/bin/kube-bench | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/security-scan:v0.3.1 | false | Rancher v2.8 head | usr/bin/kube-bench | golang.org/x/net@v0.26.0 | CVE-2024-45338 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | container-suseconnect | container-suseconnect@2.4.0-150000.4.22.1 | SUSE-SU-2023:0871-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | curl | curl@7.79.1-150400.5.15.1 | SUSE-SU-2023:2224-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | curl | curl@7.79.1-150400.5.15.1 | SUSE-SU-2023:3823-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | curl | curl@7.79.1-150400.5.15.1 | SUSE-SU-2023:4044-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.41.1 | SUSE-SU-2024:1375-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | glibc | glibc@2.31-150300.41.1 | SUSE-SU-2024:1895-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | krb5 | krb5@1.19.2-150400.3.3.1 | SUSE-SU-2023:3363-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | krb5 | krb5@1.19.2-150400.3.3.1 | SUSE-SU-2024:1006-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | krb5 | krb5@1.19.2-150400.3.3.1 | SUSE-SU-2024:2322-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | libblkid1 | libblkid1@2.37.2-150400.8.14.1 | SUSE-SU-2024:1169-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | libcares2 | libcares2@1.19.0-150000.3.20.1 | SUSE-SU-2023:2313-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | libcurl4 | libcurl4@7.79.1-150400.5.15.1 | SUSE-SU-2023:2224-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | libcurl4 | libcurl4@7.79.1-150400.5.15.1 | SUSE-SU-2023:3823-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | libcurl4 | libcurl4@7.79.1-150400.5.15.1 | SUSE-SU-2023:4044-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | libeconf0 | libeconf0@0.4.6+git20220427.3016f4e-150400.3.3.1 | SUSE-SU-2023:3954-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | libexpat1 | libexpat1@2.4.4-150400.3.12.1 | SUSE-SU-2024:1129-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | libfdisk1 | libfdisk1@2.37.2-150400.8.14.1 | SUSE-SU-2024:1169-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | libgcc_s1 | libgcc_s1@12.2.1+git416-150000.1.5.1 | SUSE-SU-2023:3661-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | libgcc_s1 | libgcc_s1@12.2.1+git416-150000.1.5.1 | SUSE-SU-2023:4162-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | libgcc_s1 | libgcc_s1@12.2.1+git416-150000.1.5.1 | SUSE-SU-2023:4458-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | libglib-2_0-0 | libglib-2_0-0@2.70.5-150400.3.3.1 | SUSE-SU-2024:4078-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | libmount1 | libmount1@2.37.2-150400.8.14.1 | SUSE-SU-2024:1169-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | libnghttp2-14 | libnghttp2-14@1.40.0-6.1 | SUSE-SU-2023:3997-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | libnghttp2-14 | libnghttp2-14@1.40.0-6.1 | SUSE-SU-2023:4200-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | libnghttp2-14 | libnghttp2-14@1.40.0-6.1 | SUSE-SU-2024:1167-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | libopenssl1_1 | libopenssl1_1@1.1.1l-150400.7.22.1 | SUSE-SU-2024:2089-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | libopenssl1_1-hmac | libopenssl1_1-hmac@1.1.1l-150400.7.22.1 | SUSE-SU-2024:2089-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | libsmartcols1 | libsmartcols1@2.37.2-150400.8.14.1 | SUSE-SU-2024:1169-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | libsqlite3-0 | libsqlite3-0@3.39.3-150000.3.20.1 | SUSE-SU-2023:4619-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | libssh-config | libssh-config@0.9.6-150400.1.5 | SUSE-SU-2024:0140-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | libssh4 | libssh4@0.9.6-150400.1.5 | SUSE-SU-2024:0140-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | libstdc++6 | libstdc++6@12.2.1+git416-150000.1.5.1 | SUSE-SU-2023:3661-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | libstdc++6 | libstdc++6@12.2.1+git416-150000.1.5.1 | SUSE-SU-2023:4162-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | libstdc++6 | libstdc++6@12.2.1+git416-150000.1.5.1 | SUSE-SU-2023:4458-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | libuuid1 | libuuid1@2.37.2-150400.8.14.1 | SUSE-SU-2024:1169-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.9.14-150400.5.13.1 | SUSE-SU-2024:0613-2 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.9.14-150400.5.13.1 | SUSE-SU-2025:0341-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.9.14-150400.5.13.1 | SUSE-SU-2025:0748-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | libzck1 | libzck1@1.1.16-150400.3.2.1 | SUSE-SU-2023:4225-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | openssl-1_1 | openssl-1_1@1.1.1l-150400.7.22.1 | SUSE-SU-2024:2089-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | perl | perl@5.26.1-150300.17.11.1 | SUSE-SU-2023:2882-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | perl | perl@5.26.1-150300.17.11.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | perl-base | perl-base@5.26.1-150300.17.11.1 | SUSE-SU-2023:2882-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | perl-base | perl-base@5.26.1-150300.17.11.1 | SUSE-SU-2024:1762-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | util-linux | util-linux@2.37.2-150400.8.14.1 | SUSE-SU-2024:1169-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | vim | vim@9.0.1234-150000.5.34.1 | SUSE-SU-2023:0781-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | vim | vim@9.0.1234-150000.5.34.1 | SUSE-SU-2023:2640-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | vim | vim@9.0.1234-150000.5.34.1 | SUSE-SU-2023:3955-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | vim | vim@9.0.1234-150000.5.34.1 | SUSE-SU-2023:4587-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | vim | vim@9.0.1234-150000.5.34.1 | SUSE-SU-2024:0871-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | vim-data-common | vim-data-common@9.0.1234-150000.5.34.1 | SUSE-SU-2023:0781-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | vim-data-common | vim-data-common@9.0.1234-150000.5.34.1 | SUSE-SU-2023:2640-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | vim-data-common | vim-data-common@9.0.1234-150000.5.34.1 | SUSE-SU-2023:3955-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | vim-data-common | vim-data-common@9.0.1234-150000.5.34.1 | SUSE-SU-2023:4587-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | vim-data-common | vim-data-common@9.0.1234-150000.5.34.1 | SUSE-SU-2024:0871-1 | HIGH | affected | sles | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/helm | github.com/docker/distribution@v2.8.1+incompatible | CVE-2023-2253 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/helm | github.com/docker/docker@v20.10.21+incompatible | CVE-2023-28840 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/helm | golang.org/x/net@v0.5.0 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/helm | stdlib@v1.19.4 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/helm | stdlib@v1.19.4 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/helm | stdlib@v1.19.4 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/helm | stdlib@v1.19.4 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/helm | stdlib@v1.19.4 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/helm | stdlib@v1.19.4 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/helm | stdlib@v1.19.4 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/helm | stdlib@v1.19.4 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/helm | stdlib@v1.19.4 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/helm | stdlib@v1.19.4 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/helm | stdlib@v1.19.4 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/helm | stdlib@v1.19.4 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/helm | stdlib@v1.19.4 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/helm | stdlib@v1.19.4 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/helm | stdlib@v1.19.4 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/helm | stdlib@v1.19.4 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/helm | stdlib@v1.19.4 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/helm | stdlib@v1.19.4 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/k9s | github.com/docker/distribution@v2.8.1+incompatible | CVE-2023-2253 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/k9s | github.com/docker/docker@v20.10.21+incompatible | CVE-2023-28840 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/k9s | golang.org/x/net@v0.5.0 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/k9s | stdlib@v1.19.5 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/k9s | stdlib@v1.19.5 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/k9s | stdlib@v1.19.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/k9s | stdlib@v1.19.5 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/k9s | stdlib@v1.19.5 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/k9s | stdlib@v1.19.5 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/k9s | stdlib@v1.19.5 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/k9s | stdlib@v1.19.5 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/k9s | stdlib@v1.19.5 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/k9s | stdlib@v1.19.5 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/k9s | stdlib@v1.19.5 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/k9s | stdlib@v1.19.5 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/k9s | stdlib@v1.19.5 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/k9s | stdlib@v1.19.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/k9s | stdlib@v1.19.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/k9s | stdlib@v1.19.5 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/k9s | stdlib@v1.19.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/k9s | stdlib@v1.19.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2022-23806 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2022-23772 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2022-24675 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2022-24921 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2022-27664 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2022-28131 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2022-28327 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2022-2879 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2022-2880 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2022-29804 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2022-30580 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2022-30630 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2022-30631 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2022-30632 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2022-30633 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2022-30634 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2022-30635 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2022-32189 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2022-41715 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2022-41716 | UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2022-41720 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.16.12 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kustomize | stdlib@v1.19.5 | CVE-2023-24538 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kustomize | stdlib@v1.19.5 | CVE-2023-24540 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kustomize | stdlib@v1.19.5 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kustomize | stdlib@v1.19.5 | CVE-2022-41722 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kustomize | stdlib@v1.19.5 | CVE-2022-41723 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kustomize | stdlib@v1.19.5 | CVE-2022-41724 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kustomize | stdlib@v1.19.5 | CVE-2022-41725 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kustomize | stdlib@v1.19.5 | CVE-2023-24534 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kustomize | stdlib@v1.19.5 | CVE-2023-24536 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kustomize | stdlib@v1.19.5 | CVE-2023-24537 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kustomize | stdlib@v1.19.5 | CVE-2023-24539 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kustomize | stdlib@v1.19.5 | CVE-2023-29400 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kustomize | stdlib@v1.19.5 | CVE-2023-29403 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kustomize | stdlib@v1.19.5 | CVE-2023-39325 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kustomize | stdlib@v1.19.5 | CVE-2023-45283 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kustomize | stdlib@v1.19.5 | CVE-2023-45287 | HIGH | affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kustomize | stdlib@v1.19.5 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/kustomize | stdlib@v1.19.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.1.28 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.2.1 | false | Rancher v2.8 head | curl | curl@8.6.0-150600.2.2 | SUSE-SU-2024:2784-1 | HIGH | affected | sles | |
rancher/shell:v0.2.1 | false | Rancher v2.8 head | libcurl4 | libcurl4@8.6.0-150600.2.2 | SUSE-SU-2024:2784-1 | HIGH | affected | sles | |
rancher/shell:v0.2.1 | false | Rancher v2.8 head | libopenssl3 | libopenssl3@3.1.4-150600.5.7.1 | SUSE-SU-2024:2635-1 | HIGH | affected | sles | |
rancher/shell:v0.2.1 | false | Rancher v2.8 head | libopenssl3 | libopenssl3@3.1.4-150600.5.7.1 | SUSE-SU-2024:3106-1 | HIGH | affected | sles | |
rancher/shell:v0.2.1 | false | Rancher v2.8 head | libopenssl3 | libopenssl3@3.1.4-150600.5.7.1 | SUSE-SU-2024:3501-1 | HIGH | affected | sles | |
rancher/shell:v0.2.1 | false | Rancher v2.8 head | usr/local/bin/helm | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.2.1 | false | Rancher v2.8 head | usr/local/bin/k9s | github.com/go-git/go-git/v5@v5.12.0 | CVE-2025-21613 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.2.1 | false | Rancher v2.8 head | usr/local/bin/k9s | github.com/go-git/go-git/v5@v5.12.0 | CVE-2025-21614 | HIGH | affected | gobinary | |
rancher/shell:v0.2.1 | false | Rancher v2.8 head | usr/local/bin/k9s | github.com/hashicorp/go-getter@v1.7.4 | CVE-2024-6257 | HIGH | affected | gobinary | |
rancher/shell:v0.2.1 | false | Rancher v2.8 head | usr/local/bin/k9s | stdlib@v1.22.0 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.2.1 | false | Rancher v2.8 head | usr/local/bin/k9s | stdlib@v1.22.0 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.2.1 | false | Rancher v2.8 head | usr/local/bin/k9s | stdlib@v1.22.0 | CVE-2024-24788 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.2.1 | false | Rancher v2.8 head | usr/local/bin/k9s | stdlib@v1.22.0 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.2.1 | false | Rancher v2.8 head | usr/local/bin/kubectl | stdlib@v1.21.11 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.2.1 | false | Rancher v2.8 head | usr/local/bin/kustomize | stdlib@v1.21.10 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/shell:v0.2.1 | false | Rancher v2.8 head | usr/local/bin/kustomize | stdlib@v1.21.10 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-agent:v0.3.10-suc | false | Rancher v2.8 head | usr/bin/kubectl | stdlib@v1.22.5 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-upgrade-controller:v0.13.4 | false | Rancher v2.8 head | bin/system-upgrade-controller | stdlib@v1.20.13 | CVE-2024-24790 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-upgrade-controller:v0.13.4 | false | Rancher v2.8 head | bin/system-upgrade-controller | stdlib@v1.20.13 | CVE-2023-45288 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/system-upgrade-controller:v0.13.4 | false | Rancher v2.8 head | bin/system-upgrade-controller | stdlib@v1.20.13 | CVE-2024-34156 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
rancher/ui-plugin-catalog:3.4.2 | false | Rancher v2.8 head | libtasn1 | libtasn1@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/ui-plugin-catalog:3.4.2 | false | Rancher v2.8 head | libtasn1-6 | libtasn1-6@4.13-150000.4.8.1 | SUSE-SU-2025:0548-1 | HIGH | affected | sles | |
rancher/ui-plugin-catalog:3.4.2 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0348-1 | HIGH | affected | sles | |
rancher/ui-plugin-catalog:3.4.2 | false | Rancher v2.8 head | libxml2-2 | libxml2-2@2.10.3-150500.5.17.1 | SUSE-SU-2025:0746-1 | HIGH | affected | sles | |
rancher/backup-restore-operator:v4.0.4 | false | Rancher v2.8 head | usr/bin/backup-restore-operator | golang.org/x/crypto@v0.27.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/backup-restore-operator:v4.0.4 | false | Rancher v2.8 head | usr/bin/backup-restore-operator | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/calico | golang.org/x/crypto@v0.13.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/calico | golang.org/x/net@v0.15.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/calico | golang.org/x/net@v0.15.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.13.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/calico-ipam | golang.org/x/net@v0.15.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/calico-ipam | golang.org/x/net@v0.15.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/install | golang.org/x/crypto@v0.13.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/install | golang.org/x/net@v0.15.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/calico-cni:v3.26.3-rancher1 | false | Rancher v2.8 head | opt/cni/bin/install | golang.org/x/net@v0.15.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/calico | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/calico | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/calico-ipam | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/calico-cni:v3.27.4-rancher1 | false | Rancher v2.8 head | opt/cni/bin/install | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/cis-operator:v1.1.2 | false | Rancher v2.8 head | usr/bin/cis-operator | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/calico | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/calico | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/calico-ipam | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | opt/cni/bin/install | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | usr/bin/calico-node | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | usr/bin/calico-node | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | usr/bin/kube-controllers | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.1-build20240806 | false | Rancher v2.8 head | usr/bin/kube-controllers | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.1-build20240911 | false | Rancher v2.8 head | opt/cni/bin/calico | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.1-build20240911 | false | Rancher v2.8 head | opt/cni/bin/calico | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.1-build20240911 | false | Rancher v2.8 head | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.1-build20240911 | false | Rancher v2.8 head | opt/cni/bin/calico-ipam | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.1-build20240911 | false | Rancher v2.8 head | opt/cni/bin/install | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.1-build20240911 | false | Rancher v2.8 head | usr/bin/calico-node | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.1-build20240911 | false | Rancher v2.8 head | usr/bin/calico-node | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.1-build20240911 | false | Rancher v2.8 head | usr/bin/kube-controllers | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.1-build20240911 | false | Rancher v2.8 head | usr/bin/kube-controllers | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.2-build20241016 | false | Rancher v2.8 head | opt/cni/bin/calico | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.2-build20241016 | false | Rancher v2.8 head | opt/cni/bin/calico | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.2-build20241016 | false | Rancher v2.8 head | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.2-build20241016 | false | Rancher v2.8 head | opt/cni/bin/calico-ipam | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.2-build20241016 | false | Rancher v2.8 head | opt/cni/bin/install | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.2-build20241016 | false | Rancher v2.8 head | usr/bin/calico-node | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.2-build20241016 | false | Rancher v2.8 head | usr/bin/calico-node | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.2-build20241016 | false | Rancher v2.8 head | usr/bin/kube-controllers | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-calico:v3.28.2-build20241016 | false | Rancher v2.8 head | usr/bin/kube-controllers | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-cluster-autoscaler:v1.8.10-build20240124 | false | Rancher v2.8 head | cluster-proportional-autoscaler | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-cluster-autoscaler:v1.8.11-build20240910 | false | Rancher v2.8 head | cluster-proportional-autoscaler | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-cluster-autoscaler:v1.8.11-build20241014 | false | Rancher v2.8 head | cluster-proportional-autoscaler | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-coredns:v1.11.1-build20240305 | false | Rancher v2.8 head | coredns | golang.org/x/crypto@v0.12.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-coredns:v1.11.1-build20240305 | false | Rancher v2.8 head | coredns | golang.org/x/net@v0.14.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-coredns:v1.11.1-build20240305 | false | Rancher v2.8 head | coredns | golang.org/x/net@v0.14.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-coredns:v1.11.1-build20240910 | false | Rancher v2.8 head | coredns | golang.org/x/crypto@v0.12.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-coredns:v1.11.1-build20240910 | false | Rancher v2.8 head | coredns | golang.org/x/net@v0.14.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-coredns:v1.11.1-build20240910 | false | Rancher v2.8 head | coredns | golang.org/x/net@v0.14.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-coredns:v1.11.3-build20241018 | false | Rancher v2.8 head | coredns | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-coredns:v1.11.3-build20241018 | false | Rancher v2.8 head | coredns | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-dns-node-cache:1.22.28-build20240125 | false | Rancher v2.8 head | node-cache | github.com/coredns/coredns@v1.10.0 | CVE-2023-28452 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-dns-node-cache:1.22.28-build20240125 | false | Rancher v2.8 head | node-cache | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-dns-node-cache:1.22.28-build20240125 | false | Rancher v2.8 head | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-dns-node-cache:1.23.1-build20240910 | false | Rancher v2.8 head | node-cache | github.com/coredns/coredns@v1.10.0 | CVE-2023-28452 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-dns-node-cache:1.23.1-build20240910 | false | Rancher v2.8 head | node-cache | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-dns-node-cache:1.23.1-build20240910 | false | Rancher v2.8 head | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-dns-node-cache:1.23.1-build20241008 | false | Rancher v2.8 head | node-cache | github.com/coredns/coredns@v1.10.0 | CVE-2023-28452 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-dns-node-cache:1.23.1-build20241008 | false | Rancher v2.8 head | node-cache | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-dns-node-cache:1.23.1-build20241008 | false | Rancher v2.8 head | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.13-k3s1-build20240531 | false | Rancher v2.8 head | usr/local/bin/etcd | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.13-k3s1-build20240531 | false | Rancher v2.8 head | usr/local/bin/etcd | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.13-k3s1-build20240531 | false | Rancher v2.8 head | usr/local/bin/etcdctl | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.13-k3s1-build20240531 | false | Rancher v2.8 head | usr/local/bin/etcdctl | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.13-k3s1-build20240910 | false | Rancher v2.8 head | usr/local/bin/etcd | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.13-k3s1-build20240910 | false | Rancher v2.8 head | usr/local/bin/etcd | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.13-k3s1-build20240910 | false | Rancher v2.8 head | usr/local/bin/etcdctl | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-etcd:v3.5.13-k3s1-build20240910 | false | Rancher v2.8 head | usr/local/bin/etcdctl | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-flannel:v0.25.5-build20240801 | false | Rancher v2.8 head | opt/bin/flanneld | golang.org/x/crypto@v0.25.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-flannel:v0.25.5-build20240801 | false | Rancher v2.8 head | opt/bin/flanneld | golang.org/x/net@v0.27.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-flannel:v0.25.6-build20240910 | false | Rancher v2.8 head | opt/bin/flanneld | golang.org/x/crypto@v0.25.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-flannel:v0.25.6-build20240910 | false | Rancher v2.8 head | opt/bin/flanneld | golang.org/x/net@v0.27.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-flannel:v0.25.7-build20241008 | false | Rancher v2.8 head | opt/bin/flanneld | golang.org/x/crypto@v0.27.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-flannel:v0.25.7-build20241008 | false | Rancher v2.8 head | opt/bin/flanneld | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-k8s-metrics-server:v0.7.1-build20240401 | false | Rancher v2.8 head | metrics-server | golang.org/x/crypto@v0.18.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-k8s-metrics-server:v0.7.1-build20240401 | false | Rancher v2.8 head | metrics-server | golang.org/x/net@v0.20.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-k8s-metrics-server:v0.7.1-build20240910 | false | Rancher v2.8 head | metrics-server | golang.org/x/crypto@v0.18.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-k8s-metrics-server:v0.7.1-build20240910 | false | Rancher v2.8 head | metrics-server | golang.org/x/net@v0.20.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-k8s-metrics-server:v0.7.1-build20241008 | false | Rancher v2.8 head | metrics-server | golang.org/x/crypto@v0.18.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-k8s-metrics-server:v0.7.1-build20241008 | false | Rancher v2.8 head | metrics-server | golang.org/x/net@v0.20.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kube-apiserver | github.com/docker/distribution@v2.8.1+incompatible | CVE-2023-2253 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kube-apiserver | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kube-apiserver | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kube-apiserver | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kube-apiserver | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kube-controller-manager | github.com/docker/distribution@v2.8.1+incompatible | CVE-2023-2253 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kube-controller-manager | github.com/opencontainers/runc@v1.1.6 | CVE-2024-21626 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kube-controller-manager | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kube-controller-manager | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kube-controller-manager | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kube-controller-manager | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kube-proxy | github.com/docker/distribution@v2.8.1+incompatible | CVE-2023-2253 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kube-proxy | github.com/opencontainers/runc@v1.1.6 | CVE-2024-21626 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kube-proxy | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kube-proxy | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kube-proxy | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kube-proxy | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kube-scheduler | github.com/docker/distribution@v2.8.1+incompatible | CVE-2023-2253 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kube-scheduler | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kube-scheduler | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kube-scheduler | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kube-scheduler | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kubeadm | github.com/docker/distribution@v2.8.1+incompatible | CVE-2023-2253 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kubeadm | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kubeadm | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kubectl | github.com/docker/distribution@v2.8.1+incompatible | CVE-2023-2253 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kubelet | github.com/docker/distribution@v2.8.1+incompatible | CVE-2023-2253 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kubelet | github.com/opencontainers/runc@v1.1.6 | CVE-2024-21626 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.35.0 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kubelet | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.27.16-rke2r2-build20240819 | false | Rancher v2.8 head | usr/local/bin/kubelet | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.8 head | usr/local/bin/kube-apiserver | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.8 head | usr/local/bin/kube-apiserver | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.8 head | usr/local/bin/kube-apiserver | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.8 head | usr/local/bin/kube-apiserver | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.8 head | usr/local/bin/kube-controller-manager | github.com/opencontainers/runc@v1.1.7 | CVE-2024-21626 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.8 head | usr/local/bin/kube-controller-manager | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.8 head | usr/local/bin/kube-controller-manager | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.8 head | usr/local/bin/kube-controller-manager | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.8 head | usr/local/bin/kube-controller-manager | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.8 head | usr/local/bin/kube-proxy | github.com/opencontainers/runc@v1.1.7 | CVE-2024-21626 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.8 head | usr/local/bin/kube-proxy | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.8 head | usr/local/bin/kube-proxy | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.8 head | usr/local/bin/kube-proxy | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.8 head | usr/local/bin/kube-proxy | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.8 head | usr/local/bin/kube-scheduler | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.8 head | usr/local/bin/kube-scheduler | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.8 head | usr/local/bin/kube-scheduler | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.8 head | usr/local/bin/kube-scheduler | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.8 head | usr/local/bin/kubeadm | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.8 head | usr/local/bin/kubeadm | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.8 head | usr/local/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.8 head | usr/local/bin/kubelet | github.com/opencontainers/runc@v1.1.7 | CVE-2024-21626 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.8 head | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.35.0 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.8 head | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.8 head | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.8 head | usr/local/bin/kubelet | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-kubernetes:v1.28.15-rke2r1-build20241023 | false | Rancher v2.8 head | usr/local/bin/kubelet | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-multus-cni:v4.0.2-build20240612 | false | Rancher v2.8 head | usr/src/multus-cni/bin/multus | golang.org/x/net@v0.7.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-multus-cni:v4.0.2-build20240612 | false | Rancher v2.8 head | usr/src/multus-cni/bin/multus | golang.org/x/net@v0.7.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-multus-cni:v4.0.2-build20240612 | false | Rancher v2.8 head | usr/src/multus-cni/bin/multus | google.golang.org/grpc@v1.40.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-multus-cni:v4.1.0-build20240910 | false | Rancher v2.8 head | cert-approver | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-multus-cni:v4.1.0-build20240910 | false | Rancher v2.8 head | kubeconfig_generator | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-multus-cni:v4.1.0-build20240910 | false | Rancher v2.8 head | usr/src/multus-cni/bin/multus | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-multus-cni:v4.1.2-build20241011 | false | Rancher v2.8 head | cert-approver | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-multus-cni:v4.1.2-build20241011 | false | Rancher v2.8 head | kubeconfig_generator | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-multus-cni:v4.1.2-build20241011 | false | Rancher v2.8 head | usr/src/multus-cni/bin/multus | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/grpc_health_probe | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/grpc_health_probe | golang.org/x/net@v0.9.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/grpc_health_probe | golang.org/x/net@v0.9.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-gc | golang.org/x/net@v0.13.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-gc | golang.org/x/net@v0.13.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-gc | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-gc | k8s.io/kubernetes@v1.28.1 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-master | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-master | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-master | golang.org/x/crypto@v0.11.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-master | golang.org/x/net@v0.13.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-master | golang.org/x/net@v0.13.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-master | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-master | k8s.io/kubernetes@v1.28.1 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-topology-updater | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-topology-updater | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-topology-updater | golang.org/x/crypto@v0.11.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-topology-updater | golang.org/x/net@v0.13.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-topology-updater | golang.org/x/net@v0.13.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-topology-updater | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-topology-updater | k8s.io/kubernetes@v1.28.1 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-worker | github.com/opencontainers/runc@v1.1.7 | CVE-2024-21626 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-worker | golang.org/x/net@v0.13.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-worker | golang.org/x/net@v0.13.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-worker | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-node-feature-discovery:v0.14.1-build20230926 | false | Rancher v2.8 head | usr/bin/nfd-worker | k8s.io/kubernetes@v1.28.1 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/grpc_health_probe | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/grpc_health_probe | golang.org/x/net@v0.9.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/grpc_health_probe | golang.org/x/net@v0.9.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/kubectl-nfd | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/kubectl-nfd | k8s.io/kubernetes@v1.29.0 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/nfd-gc | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/nfd-gc | k8s.io/kubernetes@v1.29.0 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/nfd-master | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/nfd-master | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/nfd-master | k8s.io/kubernetes@v1.29.0 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/nfd-topology-updater | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/nfd-topology-updater | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/nfd-topology-updater | k8s.io/kubernetes@v1.29.0 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/nfd-worker | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-node-feature-discovery:v0.15.4-build20240513 | false | Rancher v2.8 head | usr/bin/nfd-worker | k8s.io/kubernetes@v1.29.0 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-sriov-cni:v2.7.0-build20240327 | false | Rancher v2.8 head | usr/bin/sriov | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-sriov-network-config-daemon:v1.2.0-build20240327 | false | Rancher v2.8 head | usr/bin/sriov-network-config-daemon | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-sriov-network-config-daemon:v1.2.0-build20240327 | false | Rancher v2.8 head | usr/bin/sriov-network-config-daemon | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hardened-sriov-network-device-plugin:v3.6.2-build20240327 | false | Rancher v2.8 head | usr/bin/sriovdp | github.com/opencontainers/runc@v1.1.5 | CVE-2024-21626 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-sriov-network-device-plugin:v3.6.2-build20240327 | false | Rancher v2.8 head | usr/bin/sriovdp | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-sriov-network-resources-injector:v1.5-build20240327 | false | Rancher v2.8 head | usr/bin/installer | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-sriov-network-resources-injector:v1.5-build20240327 | false | Rancher v2.8 head | usr/bin/installer | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-sriov-network-resources-injector:v1.5-build20240327 | false | Rancher v2.8 head | usr/bin/webhook | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-sriov-network-webhook:v1.2.0-build20240327 | false | Rancher v2.8 head | usr/bin/webhook | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/hardened-sriov-network-webhook:v1.2.0-build20240327 | false | Rancher v2.8 head | usr/bin/webhook | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-cloud-provider:v0.2.0 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | github.com/rancher/apiserver@v0.0.0-20230120214941-e88c32739dc7 | CVE-2023-32192 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-cloud-provider:v0.2.0 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | github.com/rancher/norman@v0.0.0-20221205184727-32ef2e185b99 | CVE-2023-32193 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-cloud-provider:v0.2.0 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.20.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-cloud-provider:v0.2.0 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.20.0 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-cloud-provider:v0.2.0 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | golang.org/x/crypto@v0.1.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-cloud-provider:v0.2.0 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | golang.org/x/net@v0.7.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-cloud-provider:v0.2.0 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | google.golang.org/grpc@v1.53.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-cloud-provider:v0.2.1 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | github.com/rancher/apiserver@v0.0.0-20230120214941-e88c32739dc7 | CVE-2023-32192 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-cloud-provider:v0.2.1 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | github.com/rancher/norman@v0.0.0-20221205184727-32ef2e185b99 | CVE-2023-32193 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-cloud-provider:v0.2.1 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | golang.org/x/crypto@v0.16.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-cloud-provider:v0.2.1 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-cloud-provider:v0.2.2 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | github.com/rancher/apiserver@v0.0.0-20230120214941-e88c32739dc7 | CVE-2023-32192 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-cloud-provider:v0.2.2 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | github.com/rancher/norman@v0.0.0-20221205184727-32ef2e185b99 | CVE-2023-32193 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-cloud-provider:v0.2.2 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | golang.org/x/crypto@v0.16.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-cloud-provider:v0.2.2 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | github.com/rancher/apiserver@v0.0.0-20230120214941-e88c32739dc7 | CVE-2023-32192 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | github.com/rancher/norman@v0.0.0-20221205184727-32ef2e185b99 | CVE-2023-32193 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | golang.org/x/crypto@v0.16.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-cloud-provider:v0.2.4 | false | Rancher v2.8 head | usr/bin/harvester-cloud-provider | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | golang.org/x/net@v0.7.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | golang.org/x/net@v0.7.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | k8s.io/kubernetes@v1.24.9 | CVE-2023-3676 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-csi-driver:v0.1.5 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | k8s.io/kubernetes@v1.24.9 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | golang.org/x/net@v0.7.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | golang.org/x/net@v0.7.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | k8s.io/kubernetes@v1.24.9 | CVE-2023-3676 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-csi-driver:v0.1.6 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | k8s.io/kubernetes@v1.24.9 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-csi-driver:v0.1.7 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | golang.org/x/net@v0.20.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-csi-driver:v0.1.7 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | k8s.io/kubernetes@v1.24.9 | CVE-2023-3676 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-csi-driver:v0.1.7 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | k8s.io/kubernetes@v1.24.9 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-csi-driver:v0.2.1 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/harvester-csi-driver:v0.2.2 | false | Rancher v2.8 head | usr/bin/harvester-csi-driver | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/helm-project-operator:v0.2.1 | false | Rancher v2.8 head | usr/bin/helm-project-operator | github.com/rancher/wrangler@v0.8.11-0.20220217210408-3ecd23dfea3b | CVE-2022-31249 | none | not affected | vulnerable code not present | gobinary |
rancher/helm-project-operator:v0.2.1 | false | Rancher v2.8 head | usr/bin/helm-project-operator | golang.org/x/net@v0.7.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/helm-project-operator:v0.2.1 | false | Rancher v2.8 head | usr/bin/helm-project-operator | golang.org/x/net@v0.7.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/helm-project-operator:v0.2.1 | false | Rancher v2.8 head | usr/bin/helm-project-operator | gopkg.in/yaml.v3@v3.0.0-20210107192922-496545a6307b | CVE-2022-28948 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/helm-project-operator:v0.2.1 | false | Rancher v2.8 head | usr/bin/helm-project-operator | helm.sh/helm/v3@v3.8.0 | CVE-2024-26147 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.27.16-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-apiserver | github.com/docker/distribution@v2.8.1+incompatible | CVE-2023-2253 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.27.16-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-apiserver | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.27.16-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-apiserver | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.27.16-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-apiserver | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.27.16-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-apiserver | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.27.16-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-controller-manager | github.com/docker/distribution@v2.8.1+incompatible | CVE-2023-2253 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.27.16-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-controller-manager | github.com/opencontainers/runc@v1.1.6 | CVE-2024-21626 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.27.16-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-controller-manager | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.27.16-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-controller-manager | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.27.16-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-controller-manager | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.27.16-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-controller-manager | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.27.16-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-proxy | github.com/docker/distribution@v2.8.1+incompatible | CVE-2023-2253 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.27.16-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-proxy | github.com/opencontainers/runc@v1.1.6 | CVE-2024-21626 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.27.16-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-proxy | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.27.16-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-proxy | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.27.16-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-proxy | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.27.16-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-proxy | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.27.16-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-scheduler | github.com/docker/distribution@v2.8.1+incompatible | CVE-2023-2253 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.27.16-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-scheduler | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.27.16-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-scheduler | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.27.16-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-scheduler | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.27.16-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-scheduler | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.27.16-rancher1 | false | Rancher v2.8 head | usr/local/bin/kubectl | github.com/docker/distribution@v2.8.1+incompatible | CVE-2023-2253 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.27.16-rancher1 | false | Rancher v2.8 head | usr/local/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.27.16-rancher1 | false | Rancher v2.8 head | usr/local/bin/kubelet | github.com/docker/distribution@v2.8.1+incompatible | CVE-2023-2253 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.27.16-rancher1 | false | Rancher v2.8 head | usr/local/bin/kubelet | github.com/docker/docker@v20.10.24+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.27.16-rancher1 | false | Rancher v2.8 head | usr/local/bin/kubelet | github.com/opencontainers/runc@v1.1.6 | CVE-2024-21626 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.27.16-rancher1 | false | Rancher v2.8 head | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.35.0 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.27.16-rancher1 | false | Rancher v2.8 head | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.27.16-rancher1 | false | Rancher v2.8 head | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.27.16-rancher1 | false | Rancher v2.8 head | usr/local/bin/kubelet | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.27.16-rancher1 | false | Rancher v2.8 head | usr/local/bin/kubelet | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-apiserver | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-apiserver | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-apiserver | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-apiserver | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-controller-manager | github.com/opencontainers/runc@v1.1.7 | CVE-2024-21626 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-controller-manager | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-controller-manager | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-controller-manager | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-controller-manager | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-proxy | github.com/opencontainers/runc@v1.1.7 | CVE-2024-21626 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-proxy | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-proxy | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-proxy | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-proxy | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-scheduler | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-scheduler | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-scheduler | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.8 head | usr/local/bin/kube-scheduler | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.8 head | usr/local/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.8 head | usr/local/bin/kubelet | github.com/docker/docker@v20.10.24+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.8 head | usr/local/bin/kubelet | github.com/opencontainers/runc@v1.1.7 | CVE-2024-21626 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.8 head | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.35.0 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.8 head | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.8 head | usr/local/bin/kubelet | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.8 head | usr/local/bin/kubelet | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/hyperkube:v1.28.15-rancher1 | false | Rancher v2.8 head | usr/local/bin/kubelet | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.8 head | usr/bin/istioctl | github.com/docker/docker@v24.0.7+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.8 head | usr/bin/istioctl | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.8 head | usr/bin/istioctl | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.8 head | usr/bin/istioctl | helm.sh/helm/v3@v3.12.2 | CVE-2024-26147 | none | not affected | vulnerable code not present | gobinary |
rancher/istio-installer:1.19.6-rancher1 | false | Rancher v2.8 head | usr/local/bin/kubectl | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.8 head | usr/bin/istioctl | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.8 head | usr/bin/istioctl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/istio-installer:1.21.1-rancher1 | false | Rancher v2.8 head | usr/local/bin/kubectl | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/k3s-upgrade:v1.27.16-k3s1 | false | Rancher v2.8 head | opt/k3s | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/k3s-upgrade:v1.28.15-k3s1 | false | Rancher v2.8 head | libcrypto3 | libcrypto3@3.3.2-r1 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/k3s-upgrade:v1.28.15-k3s1 | false | Rancher v2.8 head | libssl3 | libssl3@3.3.2-r1 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/k3s-upgrade:v1.28.15-k3s1 | false | Rancher v2.8 head | opt/k3s | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | github.com/docker/docker@v23.0.1+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | golang.org/x/crypto@v0.11.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | google.golang.org/grpc@v1.53.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | helm.sh/helm/v3@v3.12.3 | CVE-2024-26147 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | github.com/docker/docker@v23.0.1+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | golang.org/x/crypto@v0.11.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | google.golang.org/grpc@v1.53.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | helm.sh/helm/v3@v3.12.3 | CVE-2024-26147 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v3 | github.com/docker/docker@v24.0.9+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v3 | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.8.4-build20240523 | false | Rancher v2.8 head | usr/bin/helm_v3 | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.2-build20240828 | false | Rancher v2.8 head | libcrypto3 | libcrypto3@3.3.1-r3 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/klipper-helm:v0.9.2-build20240828 | false | Rancher v2.8 head | libssl3 | libssl3@3.3.1-r3 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/klipper-helm:v0.9.2-build20240828 | false | Rancher v2.8 head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.2-build20240828 | false | Rancher v2.8 head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.2-build20240828 | false | Rancher v2.8 head | usr/bin/helm | github.com/docker/docker@v25.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.2-build20240828 | false | Rancher v2.8 head | usr/bin/helm | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.2-build20240828 | false | Rancher v2.8 head | usr/bin/helm | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher v2.8 head | libcrypto3 | libcrypto3@3.3.2-r0 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher v2.8 head | libssl3 | libssl3@3.3.2-r0 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher v2.8 head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher v2.8 head | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher v2.8 head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | golang.org/x/crypto@v0.25.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher v2.8 head | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher v2.8 head | usr/bin/helm | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/klipper-helm:v0.9.3-build20241008 | false | Rancher v2.8 head | usr/bin/helm | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/klipper-lb:v0.4.9 | false | Rancher v2.8 head | libcrypto3 | libcrypto3@3.3.1-r3 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/klipper-lb:v0.4.9 | false | Rancher v2.8 head | libssl3 | libssl3@3.3.1-r3 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/kube-api-auth:v0.2.1 | false | Rancher v2.8 head | usr/bin/kube-api-auth | github.com/docker/docker@v20.10.27+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/kube-api-auth:v0.2.1 | false | Rancher v2.8 head | usr/bin/kube-api-auth | github.com/rancher/apiserver@v0.0.0-20240205154815-a3b9e3721c1b | CVE-2023-32192 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/kube-api-auth:v0.2.1 | false | Rancher v2.8 head | usr/bin/kube-api-auth | github.com/rancher/norman@v0.0.0-20240205154641-a6a6cf569608 | CVE-2023-32193 | none | not affected | vulnerable code not present | gobinary |
rancher/kube-api-auth:v0.2.1 | false | Rancher v2.8 head | usr/bin/kube-api-auth | github.com/rancher/rancher@v0.0.0-20240205190724-2f7113dc32d4 | CVE-2019-12274 | none | not affected | inline mitigations already exist | gobinary |
rancher/kube-api-auth:v0.2.1 | false | Rancher v2.8 head | usr/bin/kube-api-auth | github.com/rancher/rancher@v0.0.0-20240205190724-2f7113dc32d4 | CVE-2021-36775 | none | not affected | inline mitigations already exist | gobinary |
rancher/kube-api-auth:v0.2.1 | false | Rancher v2.8 head | usr/bin/kube-api-auth | github.com/rancher/steve@v0.0.0-20231016202603-993540401906 | CVE-2024-52280 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/kube-api-auth:v0.2.1 | false | Rancher v2.8 head | usr/bin/kube-api-auth | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/kube-api-auth:v0.2.1 | false | Rancher v2.8 head | usr/bin/kube-api-auth | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/kube-api-auth:v0.2.1 | false | Rancher v2.8 head | usr/bin/kube-api-auth | k8s.io/kubernetes@v1.27.10 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/kubectl:v1.27.16 | false | Rancher v2.8 head | bin/kubectl | github.com/docker/distribution@v2.8.1+incompatible | CVE-2023-2253 | none | not affected | vulnerable code not present | gobinary |
rancher/kubectl:v1.27.16 | false | Rancher v2.8 head | bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/kubectl:v1.28.15 | false | Rancher v2.8 head | bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/local-path-provisioner:v0.0.28 | false | Rancher v2.8 head | libcrypto3 | libcrypto3@3.3.0-r2 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/local-path-provisioner:v0.0.28 | false | Rancher v2.8 head | libssl3 | libssl3@3.3.0-r2 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/local-path-provisioner:v0.0.28 | false | Rancher v2.8 head | usr/bin/local-path-provisioner | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/local-path-provisioner:v0.0.28 | false | Rancher v2.8 head | usr/bin/local-path-provisioner | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/local-path-provisioner:v0.0.30 | false | Rancher v2.8 head | libcrypto3 | libcrypto3@3.3.2-r0 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/local-path-provisioner:v0.0.30 | false | Rancher v2.8 head | libssl3 | libssl3@3.3.2-r0 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/local-path-provisioner:v0.0.30 | false | Rancher v2.8 head | usr/bin/local-path-provisioner | golang.org/x/crypto@v0.25.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/local-path-provisioner:v0.0.30 | false | Rancher v2.8 head | usr/bin/local-path-provisioner | golang.org/x/net@v0.27.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/machine:v0.15.0-rancher118 | false | Rancher v2.8 head | usr/local/bin/rancher-machine | github.com/moby/moby@v1.4.2-0.20170731201646-1009e6a40b29 | CVE-2024-36621 | none | not affected | vulnerable code not present | gobinary |
rancher/machine:v0.15.0-rancher118 | false | Rancher v2.8 head | usr/local/bin/rancher-machine | github.com/moby/moby@v1.4.2-0.20170731201646-1009e6a40b29 | CVE-2024-36623 | none | not affected | vulnerable code not present | gobinary |
rancher/machine:v0.15.0-rancher118 | false | Rancher v2.8 head | usr/local/bin/rancher-machine | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/machine:v0.15.0-rancher118 | false | Rancher v2.8 head | usr/local/bin/rancher-machine | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-apiserver:v3.26.3 | true | Rancher v2.8 head | code/apiserver | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.0 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-calico-apiserver:v3.26.3 | true | Rancher v2.8 head | code/apiserver | golang.org/x/crypto@v0.13.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-apiserver:v3.26.3 | true | Rancher v2.8 head | code/apiserver | golang.org/x/net@v0.15.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-calico-apiserver:v3.26.3 | true | Rancher v2.8 head | code/apiserver | golang.org/x/net@v0.15.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-apiserver:v3.26.3 | true | Rancher v2.8 head | code/apiserver | k8s.io/kubernetes@v1.26.8 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-apiserver:v3.27.0 | true | Rancher v2.8 head | code/apiserver | golang.org/x/crypto@v0.15.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-apiserver:v3.27.0 | true | Rancher v2.8 head | code/apiserver | golang.org/x/net@v0.18.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-apiserver:v3.27.0 | true | Rancher v2.8 head | code/apiserver | k8s.io/kubernetes@v1.27.8 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-apiserver:v3.27.2 | true | Rancher v2.8 head | code/apiserver | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-apiserver:v3.27.2 | true | Rancher v2.8 head | code/apiserver | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-apiserver:v3.27.2 | true | Rancher v2.8 head | code/apiserver | k8s.io/kubernetes@v1.27.8 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-apiserver:v3.27.3 | true | Rancher v2.8 head | code/apiserver | golang.org/x/crypto@v0.19.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-apiserver:v3.27.3 | true | Rancher v2.8 head | code/apiserver | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-apiserver:v3.27.3 | true | Rancher v2.8 head | code/apiserver | k8s.io/kubernetes@v1.27.8 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-apiserver:v3.28.1 | true | Rancher v2.8 head | code/apiserver | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-apiserver:v3.28.1 | true | Rancher v2.8 head | code/apiserver | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-apiserver:v3.28.2 | true | Rancher v2.8 head | code/apiserver | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-apiserver:v3.28.2 | true | Rancher v2.8 head | code/apiserver | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/calico | golang.org/x/crypto@v0.13.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/calico | golang.org/x/net@v0.15.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/calico | golang.org/x/net@v0.15.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.13.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/calico-ipam | golang.org/x/net@v0.15.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/calico-ipam | golang.org/x/net@v0.15.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/install | golang.org/x/crypto@v0.13.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/install | golang.org/x/net@v0.15.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-calico-cni:v3.26.3 | true | Rancher v2.8 head | opt/cni/bin/install | golang.org/x/net@v0.15.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.27.0 | true | Rancher v2.8 head | opt/cni/bin/calico | golang.org/x/crypto@v0.15.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.27.0 | true | Rancher v2.8 head | opt/cni/bin/calico | golang.org/x/net@v0.18.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.27.0 | true | Rancher v2.8 head | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.15.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.27.0 | true | Rancher v2.8 head | opt/cni/bin/calico-ipam | golang.org/x/net@v0.18.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.27.0 | true | Rancher v2.8 head | opt/cni/bin/install | golang.org/x/crypto@v0.15.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.27.0 | true | Rancher v2.8 head | opt/cni/bin/install | golang.org/x/net@v0.18.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.27.2 | true | Rancher v2.8 head | opt/cni/bin/calico | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.27.2 | true | Rancher v2.8 head | opt/cni/bin/calico | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.27.2 | true | Rancher v2.8 head | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.27.2 | true | Rancher v2.8 head | opt/cni/bin/calico-ipam | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.27.2 | true | Rancher v2.8 head | opt/cni/bin/install | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.27.3 | true | Rancher v2.8 head | opt/cni/bin/calico | golang.org/x/crypto@v0.19.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.27.3 | true | Rancher v2.8 head | opt/cni/bin/calico | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.27.3 | true | Rancher v2.8 head | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.19.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.27.3 | true | Rancher v2.8 head | opt/cni/bin/calico-ipam | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.27.3 | true | Rancher v2.8 head | opt/cni/bin/install | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.28.1 | true | Rancher v2.8 head | opt/cni/bin/calico | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.28.1 | true | Rancher v2.8 head | opt/cni/bin/calico | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.28.1 | true | Rancher v2.8 head | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.28.1 | true | Rancher v2.8 head | opt/cni/bin/calico-ipam | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.28.1 | true | Rancher v2.8 head | opt/cni/bin/install | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.28.2 | true | Rancher v2.8 head | opt/cni/bin/calico | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.28.2 | true | Rancher v2.8 head | opt/cni/bin/calico | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.28.2 | true | Rancher v2.8 head | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.28.2 | true | Rancher v2.8 head | opt/cni/bin/calico-ipam | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-cni:v3.28.2 | true | Rancher v2.8 head | opt/cni/bin/install | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.26.3 | true | Rancher v2.8 head | usr/bin/kube-controllers | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.0 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-calico-kube-controllers:v3.26.3 | true | Rancher v2.8 head | usr/bin/kube-controllers | golang.org/x/crypto@v0.13.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.26.3 | true | Rancher v2.8 head | usr/bin/kube-controllers | golang.org/x/net@v0.15.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-calico-kube-controllers:v3.26.3 | true | Rancher v2.8 head | usr/bin/kube-controllers | golang.org/x/net@v0.15.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.27.0 | true | Rancher v2.8 head | usr/bin/kube-controllers | golang.org/x/crypto@v0.15.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.27.0 | true | Rancher v2.8 head | usr/bin/kube-controllers | golang.org/x/net@v0.18.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.27.2 | true | Rancher v2.8 head | usr/bin/kube-controllers | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.27.2 | true | Rancher v2.8 head | usr/bin/kube-controllers | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.27.3 | true | Rancher v2.8 head | usr/bin/kube-controllers | golang.org/x/crypto@v0.19.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.27.3 | true | Rancher v2.8 head | usr/bin/kube-controllers | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.27.4 | true | Rancher v2.8 head | usr/bin/kube-controllers | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.27.4 | true | Rancher v2.8 head | usr/bin/kube-controllers | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.28.1 | true | Rancher v2.8 head | usr/bin/kube-controllers | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.28.1 | true | Rancher v2.8 head | usr/bin/kube-controllers | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.28.2 | true | Rancher v2.8 head | usr/bin/kube-controllers | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-kube-controllers:v3.28.2 | true | Rancher v2.8 head | usr/bin/kube-controllers | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-typha:v3.26.3 | true | Rancher v2.8 head | code/calico-typha | golang.org/x/crypto@v0.13.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-typha:v3.26.3 | true | Rancher v2.8 head | code/calico-typha | golang.org/x/net@v0.15.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-calico-typha:v3.26.3 | true | Rancher v2.8 head | code/calico-typha | golang.org/x/net@v0.15.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-typha:v3.27.0 | true | Rancher v2.8 head | code/calico-typha | golang.org/x/crypto@v0.15.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-typha:v3.27.0 | true | Rancher v2.8 head | code/calico-typha | golang.org/x/net@v0.18.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-typha:v3.27.2 | true | Rancher v2.8 head | code/calico-typha | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-typha:v3.27.2 | true | Rancher v2.8 head | code/calico-typha | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-typha:v3.27.3 | true | Rancher v2.8 head | code/calico-typha | golang.org/x/crypto@v0.19.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-typha:v3.27.3 | true | Rancher v2.8 head | code/calico-typha | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-typha:v3.28.1 | true | Rancher v2.8 head | usr/bin/calico-typha | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-typha:v3.28.1 | true | Rancher v2.8 head | usr/bin/calico-typha | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-typha:v3.28.2 | true | Rancher v2.8 head | usr/bin/calico-typha | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-calico-typha:v3.28.2 | true | Rancher v2.8 head | usr/bin/calico-typha | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-cilium:v1.16.0 | true | Rancher v2.8 head | opt/cni/bin/cilium-cni | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.0 | true | Rancher v2.8 head | usr/bin/cilium-agent | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.0 | true | Rancher v2.8 head | usr/bin/cilium-agent | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.0 | true | Rancher v2.8 head | usr/bin/cilium-bugtool | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.0 | true | Rancher v2.8 head | usr/bin/cilium-dbg | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.0 | true | Rancher v2.8 head | usr/bin/hubble | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.1 | true | Rancher v2.8 head | opt/cni/bin/cilium-cni | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.1 | true | Rancher v2.8 head | usr/bin/cilium-agent | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.1 | true | Rancher v2.8 head | usr/bin/cilium-agent | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.1 | true | Rancher v2.8 head | usr/bin/cilium-bugtool | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.1 | true | Rancher v2.8 head | usr/bin/cilium-dbg | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.1 | true | Rancher v2.8 head | usr/bin/hubble | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.2 | true | Rancher v2.8 head | opt/cni/bin/cilium-cni | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.2 | true | Rancher v2.8 head | usr/bin/cilium-agent | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.2 | true | Rancher v2.8 head | usr/bin/cilium-agent | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.2 | true | Rancher v2.8 head | usr/bin/cilium-bugtool | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.2 | true | Rancher v2.8 head | usr/bin/cilium-dbg | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-cilium:v1.16.2 | true | Rancher v2.8 head | usr/bin/hubble | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.0 | true | Rancher v2.8 head | usr/bin/clustermesh-apiserver | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.0 | true | Rancher v2.8 head | usr/bin/etcd | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.0 | true | Rancher v2.8 head | usr/bin/etcd | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.1 | true | Rancher v2.8 head | usr/bin/clustermesh-apiserver | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.1 | true | Rancher v2.8 head | usr/bin/etcd | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.1 | true | Rancher v2.8 head | usr/bin/etcd | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.2 | true | Rancher v2.8 head | usr/bin/clustermesh-apiserver | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.2 | true | Rancher v2.8 head | usr/bin/etcd | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-clustermesh-apiserver:v1.16.2 | true | Rancher v2.8 head | usr/bin/etcd | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.16.0 | true | Rancher v2.8 head | bin/grpc_health_probe | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.16.0 | true | Rancher v2.8 head | bin/grpc_health_probe | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.16.0 | true | Rancher v2.8 head | usr/bin/hubble-relay | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.16.1 | true | Rancher v2.8 head | bin/grpc_health_probe | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.16.1 | true | Rancher v2.8 head | bin/grpc_health_probe | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.16.1 | true | Rancher v2.8 head | usr/bin/hubble-relay | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.16.2 | true | Rancher v2.8 head | bin/grpc_health_probe | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.16.2 | true | Rancher v2.8 head | bin/grpc_health_probe | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cilium-hubble-relay:v1.16.2 | true | Rancher v2.8 head | usr/bin/hubble-relay | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-aws:v1.16.0 | true | Rancher v2.8 head | usr/bin/cilium-operator-aws | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-aws:v1.16.0 | true | Rancher v2.8 head | usr/bin/cilium-operator-aws | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-aws:v1.16.1 | true | Rancher v2.8 head | usr/bin/cilium-operator-aws | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-aws:v1.16.1 | true | Rancher v2.8 head | usr/bin/cilium-operator-aws | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-aws:v1.16.2 | true | Rancher v2.8 head | usr/bin/cilium-operator-aws | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-aws:v1.16.2 | true | Rancher v2.8 head | usr/bin/cilium-operator-aws | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-azure:v1.15.5 | true | Rancher v2.8 head | usr/bin/cilium-operator-azure | golang.org/x/crypto@v0.18.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-azure:v1.15.5 | true | Rancher v2.8 head | usr/bin/cilium-operator-azure | golang.org/x/net@v0.20.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-azure:v1.16.0 | true | Rancher v2.8 head | usr/bin/cilium-operator-azure | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-azure:v1.16.0 | true | Rancher v2.8 head | usr/bin/cilium-operator-azure | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-azure:v1.16.1 | true | Rancher v2.8 head | usr/bin/cilium-operator-azure | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-azure:v1.16.1 | true | Rancher v2.8 head | usr/bin/cilium-operator-azure | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-azure:v1.16.2 | true | Rancher v2.8 head | usr/bin/cilium-operator-azure | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-azure:v1.16.2 | true | Rancher v2.8 head | usr/bin/cilium-operator-azure | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-generic:v1.16.0 | true | Rancher v2.8 head | usr/bin/cilium-operator-generic | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-generic:v1.16.0 | true | Rancher v2.8 head | usr/bin/cilium-operator-generic | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-generic:v1.16.1 | true | Rancher v2.8 head | usr/bin/cilium-operator-generic | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-generic:v1.16.1 | true | Rancher v2.8 head | usr/bin/cilium-operator-generic | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-generic:v1.16.2 | true | Rancher v2.8 head | usr/bin/cilium-operator-generic | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cilium-operator-generic:v1.16.2 | true | Rancher v2.8 head | usr/bin/cilium-operator-generic | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-cluster-api-controller:v1.4.4 | true | Rancher v2.8 head | manager | golang.org/x/crypto@v0.3.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-cluster-api-controller:v1.4.4 | true | Rancher v2.8 head | manager | golang.org/x/net@v0.8.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.8 head | coredns | golang.org/x/crypto@v0.0.0-20221010152910-d6f0a8c073c2 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.8 head | coredns | golang.org/x/net@v0.4.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-coredns-coredns:1.10.1 | true | Rancher v2.8 head | coredns | golang.org/x/net@v0.4.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coredns-coredns:1.11.3 | true | Rancher v2.8 head | coredns | golang.org/x/crypto@v0.23.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coredns-coredns:1.11.3 | true | Rancher v2.8 head | coredns | golang.org/x/net@v0.25.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coredns-coredns:1.9.4 | true | Rancher v2.8 head | coredns | golang.org/x/crypto@v0.0.0-20220722155217-630584e8d5aa | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coredns-coredns:1.9.4 | true | Rancher v2.8 head | coredns | golang.org/x/net@v0.0.0-20220722155237-a158d28d115b | CVE-2022-27664 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-coredns-coredns:1.9.4 | true | Rancher v2.8 head | coredns | golang.org/x/net@v0.0.0-20220722155237-a158d28d115b | CVE-2022-41721 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coredns-coredns:1.9.4 | true | Rancher v2.8 head | coredns | golang.org/x/net@v0.0.0-20220722155237-a158d28d115b | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-coredns-coredns:1.9.4 | true | Rancher v2.8 head | coredns | golang.org/x/net@v0.0.0-20220722155237-a158d28d115b | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coredns-coredns:1.9.4 | true | Rancher v2.8 head | coredns | golang.org/x/text@v0.3.7 | CVE-2022-32149 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.8 head | usr/local/bin/etcd | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.8 head | usr/local/bin/etcd | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.8 head | usr/local/bin/etcdctl | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.25.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.8 head | usr/local/bin/etcdctl | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.8 head | usr/local/bin/etcdctl | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.8 head | usr/local/bin/etcdutl | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.25.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.8 head | usr/local/bin/etcdutl | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.10 | true | Rancher v2.8 head | usr/local/bin/etcdutl | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.9 | true | Rancher v2.8 head | usr/local/bin/etcd | golang.org/x/crypto@v0.0.0-20220411220226-7b82a4e95df4 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.9 | true | Rancher v2.8 head | usr/local/bin/etcd | golang.org/x/net@v0.7.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.9 | true | Rancher v2.8 head | usr/local/bin/etcdctl | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.25.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-coreos-etcd:v3.5.9 | true | Rancher v2.8 head | usr/local/bin/etcdctl | golang.org/x/crypto@v0.0.0-20220411220226-7b82a4e95df4 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.9 | true | Rancher v2.8 head | usr/local/bin/etcdctl | golang.org/x/net@v0.7.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-coreos-etcd:v3.5.9 | true | Rancher v2.8 head | usr/local/bin/etcdctl | golang.org/x/net@v0.7.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.9 | true | Rancher v2.8 head | usr/local/bin/etcdctl | google.golang.org/grpc@v1.41.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-coreos-etcd:v3.5.9 | true | Rancher v2.8 head | usr/local/bin/etcdutl | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.25.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-coreos-etcd:v3.5.9 | true | Rancher v2.8 head | usr/local/bin/etcdutl | golang.org/x/crypto@v0.0.0-20220411220226-7b82a4e95df4 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.9 | true | Rancher v2.8 head | usr/local/bin/etcdutl | golang.org/x/net@v0.7.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-coreos-etcd:v3.5.9 | true | Rancher v2.8 head | usr/local/bin/etcdutl | golang.org/x/net@v0.7.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-coreos-etcd:v3.5.9 | true | Rancher v2.8 head | usr/local/bin/etcdutl | google.golang.org/grpc@v1.41.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | usr/local/bin/dex | golang.org/x/crypto@v0.10.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | usr/local/bin/dex | golang.org/x/net@v0.11.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | usr/local/bin/gomplate | golang.org/x/crypto@v0.0.0-20220525230936-793ad666bf5e | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | usr/local/bin/gomplate | golang.org/x/net@v0.7.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | usr/local/bin/gomplate | golang.org/x/net@v0.7.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-dexidp-dex:v2.37.0 | true | Rancher v2.8 head | usr/local/bin/gomplate | google.golang.org/grpc@v1.46.2 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-flannel-flannel:v0.21.4 | true | Rancher v2.8 head | opt/bin/flanneld | golang.org/x/crypto@v0.0.0-20220829220503-c86fa9a7ed90 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-flannel-flannel:v0.21.4 | true | Rancher v2.8 head | opt/bin/flanneld | golang.org/x/net@v0.7.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-flannel-flannel:v0.21.4 | true | Rancher v2.8 head | opt/bin/flanneld | golang.org/x/net@v0.7.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-flannel-flannel:v0.21.4 | true | Rancher v2.8 head | opt/bin/flanneld | google.golang.org/grpc@v1.40.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-grafana-grafana:10.4.9 | true | Rancher v2.8 head | usr/share/grafana/bin/grafana | github.com/grafana/grafana-plugin-sdk-go@v0.218.0 | CVE-2024-8986 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-grafana-grafana:10.4.9 | true | Rancher v2.8 head | usr/share/grafana/bin/grafana | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-grafana-grafana:10.4.9 | true | Rancher v2.8 head | usr/share/grafana/bin/grafana | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-istio-install-cni:1.19.6-distroless | true | Rancher v2.8 head | opt/cni/bin/istio-cni | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-install-cni:1.19.6-distroless | true | Rancher v2.8 head | opt/cni/bin/istio-cni | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-install-cni:1.19.6-distroless | true | Rancher v2.8 head | usr/local/bin/install-cni | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-install-cni:1.19.6-distroless | true | Rancher v2.8 head | usr/local/bin/install-cni | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-install-cni:1.20.3-distroless | true | Rancher v2.8 head | opt/cni/bin/istio-cni | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-install-cni:1.20.3-distroless | true | Rancher v2.8 head | opt/cni/bin/istio-cni | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-install-cni:1.20.3-distroless | true | Rancher v2.8 head | usr/local/bin/install-cni | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-install-cni:1.20.3-distroless | true | Rancher v2.8 head | usr/local/bin/install-cni | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-install-cni:1.21.1-distroless | true | Rancher v2.8 head | opt/cni/bin/istio-cni | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-install-cni:1.21.1-distroless | true | Rancher v2.8 head | opt/cni/bin/istio-cni | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-istio-install-cni:1.21.1-distroless | true | Rancher v2.8 head | usr/local/bin/install-cni | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-install-cni:1.21.1-distroless | true | Rancher v2.8 head | usr/local/bin/install-cni | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-istio-pilot:1.19.6-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-discovery | github.com/docker/docker@v24.0.7+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-pilot:1.19.6-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-discovery | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-pilot:1.19.6-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-discovery | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-pilot:1.20.3-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-discovery | github.com/docker/docker@v24.0.7+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-pilot:1.20.3-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-discovery | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-pilot:1.20.3-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-discovery | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-pilot:1.21.1-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-discovery | github.com/docker/docker@v24.0.7+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-pilot:1.21.1-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-discovery | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-pilot:1.21.1-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-discovery | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-istio-proxyv2:1.19.6-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-agent | github.com/docker/docker@v24.0.7+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-proxyv2:1.19.6-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-agent | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-proxyv2:1.19.6-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-agent | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-proxyv2:1.21.1-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-agent | github.com/docker/docker@v24.0.7+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-proxyv2:1.21.1-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-agent | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-istio-proxyv2:1.21.1-distroless | true | Rancher v2.8 head | usr/local/bin/pilot-agent | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-jaegertracing-all-in-one:1.52.0 | true | Rancher v2.8 head | go/bin/all-in-one-linux | golang.org/x/crypto@v0.16.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-jaegertracing-all-in-one:1.52.0 | true | Rancher v2.8 head | go/bin/all-in-one-linux | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-jaegertracing-all-in-one:1.56.0 | true | Rancher v2.8 head | go/bin/all-in-one-linux | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-jaegertracing-all-in-one:1.56.0 | true | Rancher v2.8 head | go/bin/all-in-one-linux | golang.org/x/net@v0.22.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-dnsmasq-nanny:1.22.28 | true | Rancher v2.8 head | dnsmasq-nanny | github.com/coredns/coredns@v1.10.0 | CVE-2023-28452 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-dnsmasq-nanny:1.22.28 | true | Rancher v2.8 head | dnsmasq-nanny | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-kube-dns:1.22.28 | true | Rancher v2.8 head | kube-dns | github.com/coredns/coredns@v1.10.0 | CVE-2023-28452 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-kube-dns:1.22.28 | true | Rancher v2.8 head | kube-dns | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-node-cache:1.22.28 | true | Rancher v2.8 head | node-cache | github.com/coredns/coredns@v1.10.0 | CVE-2023-28452 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-node-cache:1.22.28 | true | Rancher v2.8 head | node-cache | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-node-cache:1.22.28 | true | Rancher v2.8 head | node-cache | k8s.io/kubernetes@v1.26.10 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-sidecar:1.22.28 | true | Rancher v2.8 head | sidecar | github.com/coredns/coredns@v1.10.0 | CVE-2023-28452 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-k8s-dns-sidecar:1.22.28 | true | Rancher v2.8 head | sidecar | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.8 head | opt/kiali/kiali | go.opentelemetry.io/contrib/instrumentation/github.com/gorilla/mux/otelmux@v0.27.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.8 head | opt/kiali/kiali | golang.org/x/crypto@v0.0.0-20220214200702-86341886e292 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.8 head | opt/kiali/kiali | golang.org/x/crypto@v0.0.0-20220214200702-86341886e292 | CVE-2022-27191 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kiali-kiali:v1.75.0 | true | Rancher v2.8 head | opt/kiali/kiali | golang.org/x/net@v0.8.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kiali-kiali:v1.79.0 | true | Rancher v2.8 head | opt/kiali/kiali | go.opentelemetry.io/contrib/instrumentation/github.com/gorilla/mux/otelmux@v0.27.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kiali-kiali:v1.79.0 | true | Rancher v2.8 head | opt/kiali/kiali | golang.org/x/crypto@v0.15.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kiali-kiali:v1.79.0 | true | Rancher v2.8 head | opt/kiali/kiali | golang.org/x/net@v0.18.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kube-logging-logging-operator:4.8.0 | true | Rancher v2.8 head | manager | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kube-rbac-proxy:v0.14.0 | true | Rancher v2.8 head | usr/local/bin/kube-rbac-proxy | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.20.0 | CVE-2023-47108 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kube-rbac-proxy:v0.14.0 | true | Rancher v2.8 head | usr/local/bin/kube-rbac-proxy | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.20.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kube-rbac-proxy:v0.14.0 | true | Rancher v2.8 head | usr/local/bin/kube-rbac-proxy | golang.org/x/crypto@v0.0.0-20220315160706-3147a52a75dd | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kube-rbac-proxy:v0.14.0 | true | Rancher v2.8 head | usr/local/bin/kube-rbac-proxy | golang.org/x/net@v0.4.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kube-rbac-proxy:v0.15.0 | true | Rancher v2.8 head | usr/local/bin/kube-rbac-proxy | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.20.0 | CVE-2023-47108 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kube-rbac-proxy:v0.15.0 | true | Rancher v2.8 head | usr/local/bin/kube-rbac-proxy | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.20.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kube-rbac-proxy:v0.15.0 | true | Rancher v2.8 head | usr/local/bin/kube-rbac-proxy | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kube-rbac-proxy:v0.15.0 | true | Rancher v2.8 head | usr/local/bin/kube-rbac-proxy | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.8 head | kube-vip | golang.org/x/crypto@v0.1.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.8 head | kube-vip | golang.org/x/net@v0.8.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.6.0 | true | Rancher v2.8 head | kube-vip | golang.org/x/net@v0.8.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.8.7 | true | Rancher v2.8 head | kube-vip | golang.org/x/crypto@v0.23.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-kube-vip-kube-vip-iptables:v0.8.7 | true | Rancher v2.8 head | kube-vip | golang.org/x/net@v0.25.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-library-traefik:2.10.7 | true | Rancher v2.8 head | usr/local/bin/traefik | github.com/docker/docker@v20.10.21+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-library-traefik:2.10.7 | true | Rancher v2.8 head | usr/local/bin/traefik | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-library-traefik:2.10.7 | true | Rancher v2.8 head | usr/local/bin/traefik | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-library-traefik:2.11.10 | true | Rancher v2.8 head | usr/local/bin/traefik | golang.org/x/crypto@v0.27.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-library-traefik:2.11.10 | true | Rancher v2.8 head | usr/local/bin/traefik | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-library-traefik:2.11.8 | true | Rancher v2.8 head | usr/local/bin/traefik | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-library-traefik:2.11.8 | true | Rancher v2.8 head | usr/local/bin/traefik | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-longhornio-csi-attacher:v4.8.0 | true | Rancher v2.8 head | csi-attacher | golang.org/x/net@v0.32.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-longhornio-csi-node-driver-registrar:v2.13.0 | true | Rancher v2.8 head | csi-node-driver-registrar | golang.org/x/net@v0.32.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-longhornio-csi-provisioner:v4.0.1-20250204 | true | Rancher v2.8 head | csi-provisioner | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-longhornio-csi-snapshotter:v7.0.2-20250204 | true | Rancher v2.8 head | csi-snapshotter | golang.org/x/net@v0.20.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-longhornio-livenessprobe:v2.15.0 | true | Rancher v2.8 head | livenessprobe | golang.org/x/net@v0.32.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | golang.org/x/net@v0.0.0-20210726213435-c6fcb2dbf985 | CVE-2022-27664 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | golang.org/x/net@v0.0.0-20210726213435-c6fcb2dbf985 | CVE-2022-41723 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | golang.org/x/net@v0.0.0-20210726213435-c6fcb2dbf985 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | golang.org/x/net@v0.0.0-20210726213435-c6fcb2dbf985 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-messagebird-sachet:0.3.1 | true | Rancher v2.8 head | usr/local/bin/sachet | gopkg.in/yaml.v3@v3.0.0-20210107192922-496545a6307b | CVE-2022-28948 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-metrics-server:v0.6.2 | true | Rancher v2.8 head | metrics-server | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.20.0 | CVE-2023-47108 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-metrics-server:v0.6.2 | true | Rancher v2.8 head | metrics-server | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.20.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-metrics-server:v0.6.3 | true | Rancher v2.8 head | metrics-server | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.20.0 | CVE-2023-47108 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-metrics-server:v0.6.3 | true | Rancher v2.8 head | metrics-server | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.20.0 | CVE-2023-45142 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-metrics-server:v0.6.3 | true | Rancher v2.8 head | metrics-server | golang.org/x/crypto@v0.6.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-metrics-server:v0.6.3 | true | Rancher v2.8 head | metrics-server | golang.org/x/net@v0.7.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-metrics-server:v0.7.0 | true | Rancher v2.8 head | metrics-server | golang.org/x/crypto@v0.18.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-metrics-server:v0.7.0 | true | Rancher v2.8 head | metrics-server | golang.org/x/net@v0.20.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-metrics-server:v0.7.2 | true | Rancher v2.8 head | metrics-server | golang.org/x/crypto@v0.26.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-metrics-server:v0.7.2 | true | Rancher v2.8 head | metrics-server | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-minio-mc:RELEASE.2023-06-28T21-54-17Z | true | Rancher v2.8 head | usr/bin/mc | golang.org/x/crypto@v0.9.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-minio-mc:RELEASE.2023-06-28T21-54-17Z | true | Rancher v2.8 head | usr/bin/mc | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-minio-mc:RELEASE.2023-06-28T21-54-17Z | true | Rancher v2.8 head | usr/bin/mc | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-minio-mc:RELEASE.2023-06-28T21-54-17Z | true | Rancher v2.8 head | usr/bin/mc | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-minio-minio:RELEASE.2023-07-07T07-13-57Z | true | Rancher v2.8 head | opt/bin/minio | github.com/nats-io/nkeys@v0.4.4 | CVE-2023-46129 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-minio-minio:RELEASE.2023-07-07T07-13-57Z | true | Rancher v2.8 head | opt/bin/minio | golang.org/x/crypto@v0.11.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-minio-minio:RELEASE.2023-07-07T07-13-57Z | true | Rancher v2.8 head | opt/bin/minio | golang.org/x/net@v0.12.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-minio-minio:RELEASE.2023-07-07T07-13-57Z | true | Rancher v2.8 head | opt/bin/minio | golang.org/x/net@v0.12.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-minio-minio:RELEASE.2023-07-07T07-13-57Z | true | Rancher v2.8 head | opt/bin/minio | google.golang.org/grpc@v1.56.2 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-openpolicyagent-gatekeeper-crds:v3.13.0 | true | Rancher v2.8 head | kubectl | github.com/docker/distribution@v2.8.1+incompatible | CVE-2023-2253 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-openpolicyagent-gatekeeper-crds:v3.13.0 | true | Rancher v2.8 head | kubectl | golang.org/x/net@v0.8.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-openpolicyagent-gatekeeper:v3.13.0 | true | Rancher v2.8 head | manager | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.37.0 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-openpolicyagent-gatekeeper:v3.13.0 | true | Rancher v2.8 head | manager | golang.org/x/net@v0.11.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bellsoft-liberica/10.2.6/bin/main | golang.org/x/net@v0.11.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bellsoft-liberica/10.2.6/bin/main | golang.org/x/net@v0.11.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bundle-install/0.7.9/bin/run | github.com/cloudflare/circl@v1.3.3 | GHSA-9763-4f94-gfch | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bundle-install/0.7.9/bin/run | github.com/docker/docker@v23.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bundle-install/0.7.9/bin/run | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bundle-install/0.7.9/bin/run | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bundle-install/0.7.9/bin/run | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bundle-install/0.7.9/bin/run | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bundler/0.7.21/bin/run | github.com/cloudflare/circl@v1.3.3 | GHSA-9763-4f94-gfch | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bundler/0.7.21/bin/run | github.com/docker/docker@v23.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bundler/0.7.21/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49569 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bundler/0.7.21/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49568 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bundler/0.7.21/bin/run | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bundler/0.7.21/bin/run | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bundler/0.7.21/bin/run | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_bundler/0.7.21/bin/run | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_composer-install/0.3.15/bin/run | github.com/cloudflare/circl@v1.3.2 | GHSA-9763-4f94-gfch | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_composer-install/0.3.15/bin/run | github.com/docker/docker@v23.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_composer-install/0.3.15/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49569 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_composer-install/0.3.15/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49568 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_composer-install/0.3.15/bin/run | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_composer-install/0.3.15/bin/run | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_composer-install/0.3.15/bin/run | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_composer-install/0.3.15/bin/run | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_composer/0.5.15/bin/run | github.com/cloudflare/circl@v1.3.2 | GHSA-9763-4f94-gfch | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_composer/0.5.15/bin/run | github.com/docker/docker@v23.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_composer/0.5.15/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49569 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_composer/0.5.15/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49568 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_composer/0.5.15/bin/run | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_composer/0.5.15/bin/run | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_composer/0.5.15/bin/run | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_composer/0.5.15/bin/run | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_conda-env-update/0.7.11/bin/run | github.com/cloudflare/circl@v1.1.0 | GHSA-9763-4f94-gfch | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_conda-env-update/0.7.11/bin/run | github.com/docker/docker@v23.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_conda-env-update/0.7.11/bin/run | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_conda-env-update/0.7.11/bin/run | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_conda-env-update/0.7.11/bin/run | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_conda-env-update/0.7.11/bin/run | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_cpython/1.8.11/bin/run | github.com/cloudflare/circl@v1.3.3 | GHSA-9763-4f94-gfch | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_cpython/1.8.11/bin/run | github.com/docker/docker@v20.10.3-0.20221013203545-33ab36d6b304+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_cpython/1.8.11/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49569 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_cpython/1.8.11/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49568 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_cpython/1.8.11/bin/run | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_cpython/1.8.11/bin/run | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_cpython/1.8.11/bin/run | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_cpython/1.8.11/bin/run | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-core-aspnet-runtime/0.3.19/bin/run | github.com/cloudflare/circl@v1.3.2 | GHSA-9763-4f94-gfch | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-core-aspnet-runtime/0.3.19/bin/run | github.com/docker/docker@v23.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-core-aspnet-runtime/0.3.19/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49569 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-core-aspnet-runtime/0.3.19/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49568 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-core-aspnet-runtime/0.3.19/bin/run | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-core-aspnet-runtime/0.3.19/bin/run | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-core-aspnet-runtime/0.3.19/bin/run | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-core-aspnet-runtime/0.3.19/bin/run | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-core-sdk/0.13.17/bin/run | github.com/cloudflare/circl@v1.3.3 | GHSA-9763-4f94-gfch | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-core-sdk/0.13.17/bin/run | github.com/docker/docker@v23.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-core-sdk/0.13.17/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49569 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-core-sdk/0.13.17/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49568 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-core-sdk/0.13.17/bin/run | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-core-sdk/0.13.17/bin/run | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-core-sdk/0.13.17/bin/run | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-core-sdk/0.13.17/bin/run | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-execute/0.14.17/bin/run | github.com/cloudflare/circl@v1.3.3 | GHSA-9763-4f94-gfch | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-execute/0.14.17/bin/run | github.com/docker/docker@v23.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-execute/0.14.17/bin/run | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-execute/0.14.17/bin/run | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-execute/0.14.17/bin/run | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-execute/0.14.17/bin/run | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-publish/0.12.15/bin/run | github.com/cloudflare/circl@v1.3.3 | GHSA-9763-4f94-gfch | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-publish/0.12.15/bin/run | github.com/docker/docker@v23.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-publish/0.12.15/bin/run | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-publish/0.12.15/bin/run | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-publish/0.12.15/bin/run | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_dotnet-publish/0.12.15/bin/run | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_encrypt-at-rest/4.5.5/bin/helper | golang.org/x/crypto@v0.11.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_encrypt-at-rest/4.5.5/bin/main | golang.org/x/crypto@v0.11.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_git/1.0.6/bin/run | golang.org/x/net@v0.9.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_git/1.0.6/bin/run | golang.org/x/net@v0.9.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-build/2.0.22/bin/run | github.com/cloudflare/circl@v1.3.3 | GHSA-9763-4f94-gfch | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-build/2.0.22/bin/run | github.com/docker/docker@v23.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-build/2.0.22/bin/run | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-build/2.0.22/bin/run | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-build/2.0.22/bin/run | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-build/2.0.22/bin/run | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-dist/2.3.10/bin/run | github.com/cloudflare/circl@v1.3.3 | GHSA-9763-4f94-gfch | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-dist/2.3.10/bin/run | github.com/docker/docker@v23.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-dist/2.3.10/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49569 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-dist/2.3.10/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49568 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-dist/2.3.10/bin/run | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-dist/2.3.10/bin/run | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-dist/2.3.10/bin/run | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-dist/2.3.10/bin/run | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-mod-vendor/1.0.21/bin/run | github.com/cloudflare/circl@v1.3.3 | GHSA-9763-4f94-gfch | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-mod-vendor/1.0.21/bin/run | github.com/docker/docker@v23.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-mod-vendor/1.0.21/bin/run | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-mod-vendor/1.0.21/bin/run | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-mod-vendor/1.0.21/bin/run | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_go-mod-vendor/1.0.21/bin/run | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_httpd/0.7.11/bin/run | github.com/cloudflare/circl@v1.3.3 | GHSA-9763-4f94-gfch | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_httpd/0.7.11/bin/run | github.com/docker/docker@v23.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_httpd/0.7.11/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49569 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_httpd/0.7.11/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49568 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_httpd/0.7.11/bin/run | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_httpd/0.7.11/bin/run | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_httpd/0.7.11/bin/run | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_httpd/0.7.11/bin/run | google.golang.org/grpc@v1.55.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_icu/0.6.14/bin/run | github.com/cloudflare/circl@v1.3.3 | GHSA-9763-4f94-gfch | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_icu/0.6.14/bin/run | github.com/docker/docker@v23.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_icu/0.6.14/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49569 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_icu/0.6.14/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49568 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_icu/0.6.14/bin/run | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_icu/0.6.14/bin/run | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_icu/0.6.14/bin/run | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_icu/0.6.14/bin/run | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_liberty/3.8.2/bin/main | golang.org/x/net@v0.11.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_liberty/3.8.2/bin/main | golang.org/x/net@v0.11.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_miniconda/0.8.4/bin/run | github.com/cloudflare/circl@v1.3.3 | GHSA-9763-4f94-gfch | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_miniconda/0.8.4/bin/run | github.com/docker/docker@v23.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_miniconda/0.8.4/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49569 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_miniconda/0.8.4/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49568 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_miniconda/0.8.4/bin/run | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_miniconda/0.8.4/bin/run | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_miniconda/0.8.4/bin/run | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_miniconda/0.8.4/bin/run | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_mri/0.14.5/bin/run | github.com/cloudflare/circl@v1.3.3 | GHSA-9763-4f94-gfch | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_mri/0.14.5/bin/run | github.com/docker/docker@v23.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_mri/0.14.5/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49569 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_mri/0.14.5/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49568 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_mri/0.14.5/bin/run | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_mri/0.14.5/bin/run | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_mri/0.14.5/bin/run | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_mri/0.14.5/bin/run | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_nginx/0.15.3/bin/run | github.com/cloudflare/circl@v1.3.3 | GHSA-9763-4f94-gfch | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_nginx/0.15.3/bin/run | github.com/docker/docker@v23.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_nginx/0.15.3/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49569 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_nginx/0.15.3/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49568 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_nginx/0.15.3/bin/run | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_nginx/0.15.3/bin/run | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_nginx/0.15.3/bin/run | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_nginx/0.15.3/bin/run | google.golang.org/grpc@v1.55.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_node-engine/1.6.0/bin/run | github.com/cloudflare/circl@v1.3.3 | GHSA-9763-4f94-gfch | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_node-engine/1.6.0/bin/run | github.com/docker/docker@v23.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_node-engine/1.6.0/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49569 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_node-engine/1.6.0/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49568 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_node-engine/1.6.0/bin/run | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_node-engine/1.6.0/bin/run | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_node-engine/1.6.0/bin/run | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_node-engine/1.6.0/bin/run | google.golang.org/grpc@v1.55.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_node-run-script/1.0.10/bin/run | golang.org/x/net@v0.11.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_node-run-script/1.0.10/bin/run | golang.org/x/net@v0.11.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_node-start/1.0.11/bin/run | golang.org/x/net@v0.11.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_node-start/1.0.11/bin/run | golang.org/x/net@v0.11.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_npm-install/1.1.4/bin/run | github.com/cloudflare/circl@v1.3.3 | GHSA-9763-4f94-gfch | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_npm-install/1.1.4/bin/run | github.com/docker/docker@v23.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_npm-install/1.1.4/bin/run | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_npm-install/1.1.4/bin/run | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_npm-install/1.1.4/bin/run | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_npm-install/1.1.4/bin/run | google.golang.org/grpc@v1.55.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_npm-start/1.0.11/bin/run | golang.org/x/net@v0.11.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_npm-start/1.0.11/bin/run | golang.org/x/net@v0.11.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_passenger/0.10.3/bin/run | github.com/cloudflare/circl@v1.3.2 | GHSA-9763-4f94-gfch | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_passenger/0.10.3/bin/run | github.com/docker/docker@v23.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_passenger/0.10.3/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49569 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_passenger/0.10.3/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49568 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_passenger/0.10.3/bin/run | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_passenger/0.10.3/bin/run | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_passenger/0.10.3/bin/run | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_passenger/0.10.3/bin/run | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-builtin-server/0.4.14/bin/run | golang.org/x/net@v0.11.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-builtin-server/0.4.14/bin/run | golang.org/x/net@v0.11.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-dist/2.1.8/bin/run | github.com/cloudflare/circl@v1.3.3 | GHSA-9763-4f94-gfch | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-dist/2.1.8/bin/run | github.com/docker/docker@v23.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-dist/2.1.8/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49569 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-dist/2.1.8/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49568 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-dist/2.1.8/bin/run | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-dist/2.1.8/bin/run | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-dist/2.1.8/bin/run | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-dist/2.1.8/bin/run | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-fpm/0.2.15/bin/run | golang.org/x/net@v0.11.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-fpm/0.2.15/bin/run | golang.org/x/net@v0.11.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-httpd/0.3.15/bin/run | golang.org/x/net@v0.11.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-httpd/0.3.15/bin/run | golang.org/x/net@v0.11.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-memcached-session-handler/0.2.14/bin/run | golang.org/x/net@v0.11.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-memcached-session-handler/0.2.14/bin/run | golang.org/x/net@v0.11.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-nginx/0.3.1/bin/run | golang.org/x/net@v0.11.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-nginx/0.3.1/bin/run | golang.org/x/net@v0.11.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-redis-session-handler/0.2.15/bin/run | golang.org/x/net@v0.11.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-redis-session-handler/0.2.15/bin/run | golang.org/x/net@v0.11.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-start/0.4.15/bin/run | golang.org/x/net@v0.11.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_php-start/0.4.15/bin/run | golang.org/x/net@v0.11.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pip-install/0.5.16/bin/run | github.com/cloudflare/circl@v1.3.2 | GHSA-9763-4f94-gfch | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pip-install/0.5.16/bin/run | github.com/docker/docker@v23.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pip-install/0.5.16/bin/run | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pip-install/0.5.16/bin/run | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pip-install/0.5.16/bin/run | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pip-install/0.5.16/bin/run | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pip/0.17.4/bin/run | github.com/cloudflare/circl@v1.3.3 | GHSA-9763-4f94-gfch | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pip/0.17.4/bin/run | github.com/docker/docker@v23.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pip/0.17.4/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49569 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pip/0.17.4/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49568 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pip/0.17.4/bin/run | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pip/0.17.4/bin/run | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pip/0.17.4/bin/run | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pip/0.17.4/bin/run | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pipenv-install/0.6.17/bin/run | github.com/cloudflare/circl@v1.1.0 | GHSA-9763-4f94-gfch | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pipenv-install/0.6.17/bin/run | github.com/docker/docker@v23.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pipenv-install/0.6.17/bin/run | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pipenv-install/0.6.17/bin/run | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pipenv-install/0.6.17/bin/run | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pipenv-install/0.6.17/bin/run | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pipenv/1.18.0/bin/run | github.com/cloudflare/circl@v1.3.3 | GHSA-9763-4f94-gfch | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pipenv/1.18.0/bin/run | github.com/docker/docker@v23.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pipenv/1.18.0/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49569 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pipenv/1.18.0/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49568 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pipenv/1.18.0/bin/run | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pipenv/1.18.0/bin/run | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pipenv/1.18.0/bin/run | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_pipenv/1.18.0/bin/run | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_poetry-install/0.3.16/bin/run | github.com/cloudflare/circl@v1.1.0 | GHSA-9763-4f94-gfch | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_poetry-install/0.3.16/bin/run | github.com/docker/docker@v23.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_poetry-install/0.3.16/bin/run | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_poetry-install/0.3.16/bin/run | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_poetry-install/0.3.16/bin/run | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_poetry-install/0.3.16/bin/run | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_poetry-run/0.4.18/bin/run | golang.org/x/net@v0.11.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_poetry-run/0.4.18/bin/run | golang.org/x/net@v0.11.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_poetry/0.6.4/bin/run | github.com/cloudflare/circl@v1.1.0 | GHSA-9763-4f94-gfch | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_poetry/0.6.4/bin/run | github.com/docker/docker@v23.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_poetry/0.6.4/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49569 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_poetry/0.6.4/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49568 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_poetry/0.6.4/bin/run | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_poetry/0.6.4/bin/run | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_poetry/0.6.4/bin/run | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_poetry/0.6.4/bin/run | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_puma/0.4.31/bin/run | golang.org/x/net@v0.12.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_puma/0.4.31/bin/run | golang.org/x/net@v0.12.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_python-start/0.14.11/bin/run | golang.org/x/net@v0.11.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_python-start/0.14.11/bin/run | golang.org/x/net@v0.11.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_rackup/0.4.30/bin/run | golang.org/x/net@v0.12.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_rackup/0.4.30/bin/run | golang.org/x/net@v0.12.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_rails-assets/0.9.1/bin/run | golang.org/x/net@v0.12.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_rails-assets/0.9.1/bin/run | golang.org/x/net@v0.12.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_rake/0.4.30/bin/run | golang.org/x/net@v0.12.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_rake/0.4.30/bin/run | golang.org/x/net@v0.12.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_thin/0.5.30/bin/run | golang.org/x/net@v0.12.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_thin/0.5.30/bin/run | golang.org/x/net@v0.12.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_unicorn/0.4.30/bin/run | golang.org/x/net@v0.12.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_unicorn/0.4.30/bin/run | golang.org/x/net@v0.12.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_vsdbg/0.2.10/bin/run | github.com/cloudflare/circl@v1.3.2 | GHSA-9763-4f94-gfch | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_vsdbg/0.2.10/bin/run | github.com/docker/docker@v23.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_vsdbg/0.2.10/bin/run | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_vsdbg/0.2.10/bin/run | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_vsdbg/0.2.10/bin/run | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_vsdbg/0.2.10/bin/run | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn-install/1.1.3/bin/run | github.com/cloudflare/circl@v1.3.3 | GHSA-9763-4f94-gfch | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn-install/1.1.3/bin/run | github.com/docker/docker@v23.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn-install/1.1.3/bin/run | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn-install/1.1.3/bin/run | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn-install/1.1.3/bin/run | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn-install/1.1.3/bin/run | google.golang.org/grpc@v1.55.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn-start/1.0.11/bin/run | golang.org/x/net@v0.11.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn-start/1.0.11/bin/run | golang.org/x/net@v0.11.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn/1.1.9/bin/run | github.com/cloudflare/circl@v1.3.3 | GHSA-9763-4f94-gfch | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn/1.1.9/bin/run | github.com/docker/docker@v23.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn/1.1.9/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49569 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn/1.1.9/bin/run | github.com/go-git/go-git/v5@v5.6.1 | CVE-2023-49568 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn/1.1.9/bin/run | golang.org/x/crypto@v0.8.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn/1.1.9/bin/run | golang.org/x/net@v0.10.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn/1.1.9/bin/run | golang.org/x/net@v0.10.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/buildpacks/paketo-buildpacks_yarn/1.1.9/bin/run | google.golang.org/grpc@v1.55.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/lifecycle/lifecycle | github.com/docker/docker@v23.0.4+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/lifecycle/lifecycle | github.com/moby/buildkit@v0.11.5 | CVE-2024-23652 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/lifecycle/lifecycle | github.com/moby/buildkit@v0.11.5 | CVE-2024-23653 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/lifecycle/lifecycle | github.com/moby/buildkit@v0.11.5 | CVE-2024-23651 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/lifecycle/lifecycle | github.com/opencontainers/runc@v1.1.7 | CVE-2024-21626 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/lifecycle/lifecycle | golang.org/x/crypto@v0.5.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/lifecycle/lifecycle | golang.org/x/net@v0.8.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/lifecycle/lifecycle | golang.org/x/net@v0.8.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | cnb/lifecycle/lifecycle | google.golang.org/grpc@v1.53.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-paketobuildpacks-builder:0.2.443-full | true | Rancher v2.8 head | usr/local/bin/yj | gopkg.in/yaml.v3@v3.0.0-20210107192922-496545a6307b | CVE-2022-28948 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.12.0 | true | Rancher v2.8 head | adapter | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-adapter-prometheus-adapter:v0.12.0 | true | Rancher v2.8 head | adapter | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-alertmanager:v0.27.0 | true | Rancher v2.8 head | bin/alertmanager | golang.org/x/crypto@v0.18.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-alertmanager:v0.27.0 | true | Rancher v2.8 head | bin/alertmanager | golang.org/x/net@v0.20.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-alertmanager:v0.27.0 | true | Rancher v2.8 head | bin/amtool | golang.org/x/crypto@v0.18.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-alertmanager:v0.27.0 | true | Rancher v2.8 head | bin/amtool | golang.org/x/net@v0.20.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-node-exporter:v1.7.0 | true | Rancher v2.8 head | bin/node_exporter | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-node-exporter:v1.7.0 | true | Rancher v2.8 head | bin/node_exporter | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-prometheus:v2.50.1 | true | Rancher v2.8 head | bin/prometheus | github.com/docker/docker@v25.0.0+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-prometheus:v2.50.1 | true | Rancher v2.8 head | bin/prometheus | golang.org/x/crypto@v0.18.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-prometheus:v2.50.1 | true | Rancher v2.8 head | bin/prometheus | golang.org/x/net@v0.20.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-prometheus:v2.50.1 | true | Rancher v2.8 head | bin/promtool | github.com/docker/docker@v25.0.0+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-prometheus:v2.50.1 | true | Rancher v2.8 head | bin/promtool | golang.org/x/crypto@v0.18.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-prometheus-prometheus:v2.50.1 | true | Rancher v2.8 head | bin/promtool | golang.org/x/net@v0.20.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-attacher:v4.5.1 | true | Rancher v2.8 head | csi-attacher | golang.org/x/net@v0.18.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-node-driver-registrar:v2.10.1 | true | Rancher v2.8 head | csi-node-driver-registrar | golang.org/x/net@v0.18.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-provisioner:v4.0.1 | true | Rancher v2.8 head | csi-provisioner | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-resizer:v1.10.1 | true | Rancher v2.8 head | csi-resizer | golang.org/x/net@v0.18.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.1 | true | Rancher v2.8 head | csi-snapshotter | golang.org/x/net@v0.4.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-snapshotter:v6.2.2 | true | Rancher v2.8 head | csi-snapshotter | golang.org/x/net@v0.8.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-csi-snapshotter:v7.0.2 | true | Rancher v2.8 head | csi-snapshotter | golang.org/x/net@v0.20.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-livenessprobe:v2.12.0 | true | Rancher v2.8 head | livenessprobe | golang.org/x/net@v0.18.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-snapshot-controller:v6.2.1 | true | Rancher v2.8 head | snapshot-controller | golang.org/x/net@v0.4.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-snapshot-controller:v8.1.0 | true | Rancher v2.8 head | snapshot-controller | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2 | true | Rancher v2.8 head | snapshot-validation-webhook | golang.org/x/net@v0.8.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sig-storage-snapshot-validation-webhook:v8.1.0 | true | Rancher v2.8 head | snapshot-validation-webhook | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-sonobuoy-sonobuoy:v0.57.2 | true | Rancher v2.8 head | sonobuoy | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-thanos-thanos:v0.34.1 | true | Rancher v2.8 head | bin/thanos | golang.org/x/crypto@v0.16.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/mirrored-thanos-thanos:v0.34.1 | true | Rancher v2.8 head | bin/thanos | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/neuvector-controller:5.4.2 | false | Rancher v2.8 head | usr/local/bin/opa | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/nginx-ingress-controller:nginx-1.11.3-rancher1 | false | Rancher v2.8 head | nginx-ingress-controller | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/nginx-ingress-controller:v1.10.5-hardened3 | false | Rancher v2.8 head | nginx-ingress-controller | golang.org/x/net@v0.29.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/prometheus-federator:v0.3.4 | false | Rancher v2.8 head | usr/bin/prometheus-federator | golang.org/x/net@v0.7.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/prometheus-federator:v0.3.4 | false | Rancher v2.8 head | usr/bin/prometheus-federator | golang.org/x/net@v0.7.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/prometheus-federator:v0.3.4 | false | Rancher v2.8 head | usr/bin/prometheus-federator | helm.sh/helm/v3@v3.11.0 | CVE-2024-26147 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher-agent:v2.8-head | false | Rancher v2.8 head | usr/bin/agent | github.com/docker/docker@v20.10.25+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher-agent:v2.8-head | false | Rancher v2.8 head | usr/bin/agent | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher-agent:v2.8-head | false | Rancher v2.8 head | usr/bin/agent | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher-agent:v2.8-head | false | Rancher v2.8 head | usr/bin/agent | golang.org/x/crypto@v0.25.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher-agent:v2.8-head | false | Rancher v2.8 head | usr/bin/agent | golang.org/x/net@v0.27.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher-agent:v2.8-head | false | Rancher v2.8 head | usr/bin/agent | k8s.io/kubernetes@v1.28.6 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher-agent:v2.8-head | false | Rancher v2.8 head | usr/bin/kubectl | github.com/docker/distribution@v2.8.1+incompatible | CVE-2023-2253 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher-agent:v2.8-head | false | Rancher v2.8 head | usr/bin/kubectl | golang.org/x/net@v0.8.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher-csp-adapter:v3.0.1 | false | Rancher v2.8 head | usr/bin/csp-adapter | github.com/rancher/norman@v0.0.0-20220406153559-82478fb169cb | CVE-2023-32193 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher-csp-adapter:v3.0.1 | false | Rancher v2.8 head | usr/bin/csp-adapter | github.com/rancher/wrangler@v0.8.11-0.20220411195911-c2b951ab3480 | CVE-2022-31249 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher-csp-adapter:v3.0.1 | false | Rancher v2.8 head | usr/bin/csp-adapter | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher-webhook:v0.4.17-rc.1 | false | Rancher v2.8 head | usr/bin/webhook | github.com/rancher/norman@v0.0.0-20240206180703-6eda4bc94b4c | CVE-2023-32193 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher-webhook:v0.4.17-rc.1 | false | Rancher v2.8 head | usr/bin/webhook | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher-webhook:v0.4.17-rc.1 | false | Rancher v2.8 head | usr/bin/webhook | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher-webhook:v0.4.17-rc.1 | false | Rancher v2.8 head | usr/bin/webhook | k8s.io/kubernetes@v1.28.6 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | opt/drivers/management-state/bin/docker-machine-driver-harvester | github.com/docker/docker@v20.10.9+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | opt/drivers/management-state/bin/docker-machine-driver-harvester | github.com/rancher/norman@v0.0.0-20221205184727-32ef2e185b99 | CVE-2023-32193 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | opt/drivers/management-state/bin/docker-machine-driver-harvester | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | opt/drivers/management-state/bin/docker-machine-driver-harvester | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | opt/drivers/management-state/bin/docker-machine-driver-linode | github.com/docker/docker@v20.10.25+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | opt/drivers/management-state/bin/docker-machine-driver-linode | golang.org/x/crypto@v0.10.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | opt/drivers/management-state/bin/docker-machine-driver-linode | golang.org/x/net@v0.11.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | opt/drivers/management-state/bin/docker-machine-driver-linode | golang.org/x/net@v0.11.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/containerd | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.35.0 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/containerd | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/containerd | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/containerd-shim-runc-v2 | github.com/opencontainers/runc@v1.1.5 | CVE-2024-21626 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/containerd-shim-runc-v2 | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/etcdctl | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.25.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/etcdctl | golang.org/x/crypto@v0.0.0-20220411220226-7b82a4e95df4 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/etcdctl | golang.org/x/net@v0.7.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/etcdctl | golang.org/x/net@v0.7.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/etcdctl | google.golang.org/grpc@v1.41.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/helm_v3 | github.com/docker/docker@v24.0.7+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/helm_v3 | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/helm_v3 | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/k3s | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.35.0 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/k3s | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/k3s | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/rancher | github.com/docker/docker@v20.10.25+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/rancher | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/rancher | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/rancher | golang.org/x/crypto@v0.25.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/rancher | golang.org/x/net@v0.27.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/rancher | k8s.io/kubernetes@v1.28.6 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/rancher-machine | github.com/moby/moby@v1.4.2-0.20170731201646-1009e6a40b29 | CVE-2024-36621 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/rancher-machine | github.com/moby/moby@v1.4.2-0.20170731201646-1009e6a40b29 | CVE-2024-36623 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/rancher-machine | golang.org/x/crypto@v0.16.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/rancher-machine | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/rancher-machine | google.golang.org/grpc@v1.40.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/runc | golang.org/x/net@v0.8.0 | CVE-2023-39325 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/telemetry | github.com/rancher/norman@v0.0.0-20210709145327-afd06f533ca3 | CVE-2023-32193 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/telemetry | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/bin/telemetry | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/share/rancher/ui/assets/docker-machine-driver-harvester | github.com/docker/docker@v20.10.9+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/share/rancher/ui/assets/docker-machine-driver-harvester | github.com/rancher/norman@v0.0.0-20221205184727-32ef2e185b99 | CVE-2023-32193 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/share/rancher/ui/assets/docker-machine-driver-harvester | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/share/rancher/ui/assets/docker-machine-driver-harvester | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/share/rancher/ui/assets/docker-machine-driver-linode | github.com/docker/docker@v20.10.25+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/share/rancher/ui/assets/docker-machine-driver-linode | golang.org/x/crypto@v0.10.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/share/rancher/ui/assets/docker-machine-driver-linode | golang.org/x/net@v0.11.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rancher:v2.8-head | false | Rancher v2.8 head | usr/share/rancher/ui/assets/docker-machine-driver-linode | golang.org/x/net@v0.11.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | opt/rke-tools/bin/cri-dockerd | github.com/docker/docker@v24.0.9+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | opt/rke-tools/bin/cri-dockerd | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | opt/rke-tools/bin/cri-dockerd | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | opt/rke-tools/bin/cri-dockerd | k8s.io/kubernetes@v1.27.13 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | usr/bin/confd | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | usr/bin/confd | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | usr/bin/confd | google.golang.org/grpc@v1.26.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | usr/local/bin/etcdctl | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | usr/local/bin/etcdctl | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.100 | false | Rancher v2.8 head | usr/local/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke-tools:v0.1.105 | false | Rancher v2.8 head | opt/rke-tools/bin/cri-dockerd | github.com/docker/docker@v24.0.9+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.105 | false | Rancher v2.8 head | opt/rke-tools/bin/cri-dockerd | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.105 | false | Rancher v2.8 head | opt/rke-tools/bin/cri-dockerd | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.105 | false | Rancher v2.8 head | opt/rke-tools/bin/cri-dockerd | k8s.io/kubernetes@v1.27.13 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.105 | false | Rancher v2.8 head | opt/rke-tools/rke-etcd-backup | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.105 | false | Rancher v2.8 head | opt/rke-tools/rke-etcd-backup | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.105 | false | Rancher v2.8 head | usr/bin/confd | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.105 | false | Rancher v2.8 head | usr/bin/confd | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.105 | false | Rancher v2.8 head | usr/bin/confd | google.golang.org/grpc@v1.26.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke-tools:v0.1.105 | false | Rancher v2.8 head | usr/local/bin/etcdctl | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.105 | false | Rancher v2.8 head | usr/local/bin/etcdctl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.105 | false | Rancher v2.8 head | usr/local/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/bin/cri-dockerd | github.com/docker/docker@v23.0.3+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/bin/cri-dockerd | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.20.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/bin/cri-dockerd | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.20.0 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/bin/cri-dockerd | golang.org/x/net@v0.7.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/bin/cri-dockerd | golang.org/x/net@v0.7.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/bin/cri-dockerd | k8s.io/kubernetes@v1.22.8 | CVE-2023-3676 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/bin/cri-dockerd | k8s.io/kubernetes@v1.22.8 | CVE-2023-3955 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | opt/rke-tools/bin/cri-dockerd | k8s.io/kubernetes@v1.22.8 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/bin/confd | golang.org/x/crypto@v0.5.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/bin/confd | golang.org/x/net@v0.7.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/bin/confd | golang.org/x/net@v0.7.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/bin/confd | google.golang.org/grpc@v1.26.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.25.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | golang.org/x/crypto@v0.0.0-20220411220226-7b82a4e95df4 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke-tools:v0.1.96 | false | Rancher v2.8 head | usr/local/bin/etcdctl | google.golang.org/grpc@v1.41.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-cloud-provider:v1.28.13-build20240910 | false | Rancher v2.8 head | usr/local/bin/rke2-cloud-provider | github.com/docker/docker@v25.0.5+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-cloud-provider:v1.28.13-build20240910 | false | Rancher v2.8 head | usr/local/bin/rke2-cloud-provider | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-cloud-provider:v1.28.13-build20240910 | false | Rancher v2.8 head | usr/local/bin/rke2-cloud-provider | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-cloud-provider:v1.28.15-0.20241016053552-63bfb1936862-build20241016 | false | Rancher v2.8 head | usr/local/bin/rke2-cloud-provider | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-cloud-provider:v1.28.15-0.20241016053552-63bfb1936862-build20241016 | false | Rancher v2.8 head | usr/local/bin/rke2-cloud-provider | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-cloud-provider:v1.28.15-0.20241016053552-63bfb1936862-build20241016 | false | Rancher v2.8 head | usr/local/bin/rke2-cloud-provider | golang.org/x/crypto@v0.27.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-cloud-provider:v1.28.15-0.20241016053552-63bfb1936862-build20241016 | false | Rancher v2.8 head | usr/local/bin/rke2-cloud-provider | golang.org/x/net@v0.28.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-cloud-provider:v1.29.3-build20240515 | false | Rancher v2.8 head | usr/local/bin/rke2-cloud-provider | github.com/docker/docker@v25.0.4+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-cloud-provider:v1.29.3-build20240515 | false | Rancher v2.8 head | usr/local/bin/rke2-cloud-provider | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-cloud-provider:v1.29.3-build20240515 | false | Rancher v2.8 head | usr/local/bin/rke2-cloud-provider | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-cloud-provider:v1.29.3-build20240515 | false | Rancher v2.8 head | usr/local/bin/rke2-cloud-provider | golang.org/x/net@v0.21.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.28.15-rke2r1 | false | Rancher v2.8 head | bin/containerd | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.45.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.15-rke2r1 | false | Rancher v2.8 head | bin/containerd | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.28.15-rke2r1 | false | Rancher v2.8 head | bin/containerd | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.28.15-rke2r1 | false | Rancher v2.8 head | bin/containerd-shim-runc-v2 | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.28.15-rke2r1 | false | Rancher v2.8 head | bin/crictl | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.15-rke2r1 | false | Rancher v2.8 head | bin/crictl | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.15-rke2r1 | false | Rancher v2.8 head | bin/crictl | golang.org/x/net@v0.14.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.15-rke2r1 | false | Rancher v2.8 head | bin/crictl | golang.org/x/net@v0.14.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.15-rke2r1 | false | Rancher v2.8 head | bin/crictl | google.golang.org/grpc@v1.54.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.15-rke2r1 | false | Rancher v2.8 head | bin/crictl | k8s.io/kubernetes@v1.28.0-rc.1 | CVE-2024-10220 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.28.15-rke2r1 | false | Rancher v2.8 head | bin/ctr | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-runtime:v1.28.15-rke2r1 | false | Rancher v2.8 head | bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.15-rke2r1 | false | Rancher v2.8 head | bin/kubelet | github.com/opencontainers/runc@v1.1.7 | CVE-2024-21626 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.15-rke2r1 | false | Rancher v2.8 head | bin/kubelet | go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.35.0 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.15-rke2r1 | false | Rancher v2.8 head | bin/kubelet | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.15-rke2r1 | false | Rancher v2.8 head | bin/kubelet | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.15-rke2r1 | false | Rancher v2.8 head | bin/kubelet | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.15-rke2r1 | false | Rancher v2.8 head | bin/kubelet | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-runtime:v1.28.15-rke2r1 | false | Rancher v2.8 head | bin/runc | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-upgrade:v1.27.16-rke2r2 | false | Rancher v2.8 head | opt/rke2 | github.com/docker/docker@v24.0.10-0.20240723193628-852759a7df45+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-upgrade:v1.27.16-rke2r2 | false | Rancher v2.8 head | opt/rke2 | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-upgrade:v1.27.16-rke2r2 | false | Rancher v2.8 head | opt/rke2 | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-upgrade:v1.27.16-rke2r2 | false | Rancher v2.8 head | opt/rke2 | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-upgrade:v1.27.16-rke2r2 | false | Rancher v2.8 head | opt/rke2 | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-upgrade:v1.27.16-rke2r2 | false | Rancher v2.8 head | usr/local/bin/kubectl | github.com/docker/distribution@v2.8.1+incompatible | CVE-2023-2253 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-upgrade:v1.27.16-rke2r2 | false | Rancher v2.8 head | usr/local/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-upgrade:v1.28.15-rke2r1 | false | Rancher v2.8 head | libcrypto3 | libcrypto3@3.3.2-r0 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/rke2-upgrade:v1.28.15-rke2r1 | false | Rancher v2.8 head | libssl3 | libssl3@3.3.2-r0 | CVE-2024-12797 | none | not affected | vulnerable code cannot be controlled by adversary | alpine |
rancher/rke2-upgrade:v1.28.15-rke2r1 | false | Rancher v2.8 head | opt/rke2 | github.com/docker/docker@v24.0.10-0.20240723193628-852759a7df45+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-upgrade:v1.28.15-rke2r1 | false | Rancher v2.8 head | opt/rke2 | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.35.0 | CVE-2023-47108 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-upgrade:v1.28.15-rke2r1 | false | Rancher v2.8 head | opt/rke2 | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp@v0.35.1 | CVE-2023-45142 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-upgrade:v1.28.15-rke2r1 | false | Rancher v2.8 head | opt/rke2 | golang.org/x/crypto@v0.17.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/rke2-upgrade:v1.28.15-rke2r1 | false | Rancher v2.8 head | opt/rke2 | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/rke2-upgrade:v1.28.15-rke2r1 | false | Rancher v2.8 head | usr/local/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/security-scan:v0.3.1 | false | Rancher v2.8 head | usr/bin/sonobuoy | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/security-scan:v0.3.1 | false | Rancher v2.8 head | usr/local/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/helm | github.com/docker/docker@v20.10.21+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/helm | golang.org/x/crypto@v0.5.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/helm | golang.org/x/net@v0.5.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/helm | golang.org/x/net@v0.5.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/helm | google.golang.org/grpc@v1.49.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/k9s | github.com/docker/docker@v20.10.21+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/k9s | golang.org/x/crypto@v0.5.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/k9s | golang.org/x/net@v0.5.0 | CVE-2023-39325 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/k9s | golang.org/x/net@v0.5.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/k9s | google.golang.org/grpc@v1.49.0 | GHSA-m425-mq94-257g | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.1.19 | false | Rancher v2.8 head | usr/local/bin/k9s | helm.sh/helm/v3@v3.11.1 | CVE-2024-26147 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/shell:v0.1.28 | false | Rancher v2.8 head | usr/local/bin/helm | github.com/docker/docker@v24.0.7+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.1.28 | false | Rancher v2.8 head | usr/local/bin/helm | golang.org/x/crypto@v0.14.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.1.28 | false | Rancher v2.8 head | usr/local/bin/helm | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.1.28 | false | Rancher v2.8 head | usr/local/bin/kubectl | github.com/docker/distribution@v2.8.1+incompatible | CVE-2023-2253 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.1.28 | false | Rancher v2.8 head | usr/local/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/shell:v0.2.1 | false | Rancher v2.8 head | usr/local/bin/helm | github.com/docker/docker@v24.0.9+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.2.1 | false | Rancher v2.8 head | usr/local/bin/helm | golang.org/x/crypto@v0.21.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.2.1 | false | Rancher v2.8 head | usr/local/bin/helm | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/shell:v0.2.1 | false | Rancher v2.8 head | usr/local/bin/k9s | github.com/docker/docker@v26.0.1+incompatible | CVE-2024-41110 | none | not affected | vulnerable code not present | gobinary |
rancher/shell:v0.2.1 | false | Rancher v2.8 head | usr/local/bin/k9s | golang.org/x/crypto@v0.22.0 | CVE-2024-45337 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/shell:v0.2.1 | false | Rancher v2.8 head | usr/local/bin/k9s | golang.org/x/net@v0.24.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/shell:v0.2.1 | false | Rancher v2.8 head | usr/local/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/system-agent:v0.3.10-suc | false | Rancher v2.8 head | opt/rancher-system-agent-suc/rancher-system-agent | golang.org/x/crypto@v0.24.0 | CVE-2024-45337 | none | not affected | vulnerable code not present | gobinary |
rancher/system-agent:v0.3.10-suc | false | Rancher v2.8 head | opt/rancher-system-agent-suc/rancher-system-agent | golang.org/x/net@v0.26.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |
rancher/system-agent:v0.3.10-suc | false | Rancher v2.8 head | usr/bin/kubectl | golang.org/x/net@v0.23.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/system-upgrade-controller:v0.13.4 | false | Rancher v2.8 head | bin/system-upgrade-controller | golang.org/x/net@v0.17.0 | CVE-2024-45338 | none | not affected | vulnerable code not in execute path | gobinary |
rancher/ui-plugin-operator:v0.1.3 | false | Rancher v2.8 head | usr/bin/ui-plugin-operator | github.com/rancher/wrangler@v0.8.8 | CVE-2022-31249 | none | not affected | vulnerable code not present | gobinary |
rancher/ui-plugin-operator:v0.1.3 | false | Rancher v2.8 head | usr/bin/ui-plugin-operator | golang.org/x/net@v0.19.0 | CVE-2024-45338 | none | not affected | vulnerable code not present | gobinary |