Go module
github.com/jrosinsk/rancher
history
arrow_drop_downv2.0.2+incompatible
Newer version availablewarning
Warning
We found errors while resolving dependencies that may result in an incomplete or inaccurate dependency graph.
Show details
- could not find module for package import: github.com/coreos/etcd/etcdmain
- could not find module for package import: github.com/rancher/norman/event
- could not find module for package import: github.com/rancher/norman/leader
- could not find module for package import: github.com/rancher/norman/pkg/dump
- could not find module for package import: github.com/rancher/norman/signal
- could not find module for package import: github.com/rancher/types/apis/apps/v1beta2
- could not find module for package import: k8s.io/apiserver/pkg/util/flag
- could not find module for package import: k8s.io/apiserver/pkg/util/logs
- could not find module for package import: k8s.io/kubernetes/federation/cmd/federation-apiserver/app
- could not find module for package import: k8s.io/kubernetes/federation/cmd/federation-apiserver/app/options
- could not find module for package import: k8s.io/kubernetes/federation/cmd/federation-controller-manager/app
- could not find module for package import: k8s.io/kubernetes/federation/cmd/federation-controller-manager/app/options
- could not find module for package import: k8s.io/kubernetes/pkg/client/metrics/prometheus
- could not find module for package import: k8s.io/kubernetes/pkg/kubectl/cmd
- could not find module for package import: k8s.io/kubernetes/pkg/kubectl/cmd/util
- could not find module for package import: k8s.io/kubernetes/pkg/util/template
- could not find module for package import: k8s.io/kubernetes/pkg/version/prometheus
- could not find module for package import: k8s.io/kubernetes/pkg/version/verflag
- could not find module for package import: k8s.io/kubernetes/plugin/cmd/kube-scheduler/app
- could not find module for package import: k8s.io/kubernetes/plugin/cmd/kube-scheduler/app/options
- Errors found while resolving some dependencies. Please go to the Dependencies tab for more information.
Security Advisories
45
In the dependencies
Similar advisories
Moby (Docker Engine) started with non-empty inheritable Linux process capabilities
5.9 MODERATE·GHSA-2mm7-x5h6-5pvq
Similar advisories
Access Control Bypass
4.2 MODERATE·GHSA-9qq2-xhmc-h9qr
Similar advisories
Arbitrary File Override in Docker Engine
5.1 MODERATE·GHSA-v4h8-794j-g8mm
Similar advisories
Rancher Vulnerable to Cross-site Request Forgery (CSRF)
8.7 HIGH·GHSA-xhg2-rvm8-w2jh
Similar advisories
Docker supplementary group permissions not set up properly, allowing attackers to bypass primary group restrictions
6.3 MODERATE·GHSA-rc4r-wh2q-q6c4
Similar advisories
Container build can leak any path on the host into the container
LOW·GHSA-vp35-85q5-9f25
Similar advisories
Denial of service (DoS) when processing Git credentials
5.9 MODERATE·GHSA-8fcj-gf77-47mg
Similar advisories
Command injection in Git package in Wrangler
7.5 HIGH·GHSA-qrg7-hfx7-95c5
Similar advisories
Rancher Privilege Escalation Vulnerability
8.8 HIGH·GHSA-gc62-j469-9gjm
Similar advisories
Similar advisories
Moby (Docker Engine) Insufficiently restricted permissions on data directory
5.9 MODERATE·GHSA-3fwx-pjgw-3558
Similar advisories
Classic builder cache poisoning
6.9 MODERATE·GHSA-xw73-rw38-6vjc
Similar advisories
Go JOSE vulnerable to Improper Handling of Highly Compressed Data (Data Amplification)
4.3 MODERATE·GHSA-c5q2-7r4c-mv6g
Similar advisories
Similar advisories
Rancher Login Parameter Can Be Edited
4.7 MODERATE·GHSA-2p4g-jrmx-r34m
Similar advisories
Rancher Project Members Have Continued Access to Namespaces After Being Removed From Them
8.1 HIGH·GHSA-6r7x-4q7g-h83j
Similar advisories
Rancher does not properly specify ApiGroup when creating Kubernetes RBAC resources
8.8 HIGH·GHSA-f9xf-jq4j-vqw4
Similar advisories
Rancher Privilege escalation vulnerability via malicious "Connection" header
8.8 HIGH·GHSA-pvxj-25m6-7vqr
Similar advisories
Rancher Recreates Default User With Known Password Despite Deletion
9.8 CRITICAL·GHSA-xh8x-j8h3-m5ph
Similar advisories
`docker cp` allows unexpected chmod of host files in Moby Docker Engine
2.8 LOW·GHSA-v994-f8vw-g7j4
Similar advisories
Moby (Docker Engine) is vulnerable to Ambiguous OCI manifest parsing
MODERATE·GHSA-xmmx-7jpf-fx42
Similar advisories
Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto
9.1 CRITICAL·GHSA-v778-237x-gjrc
Similar advisories
Non-linear parsing of case-insensitive content in golang.org/x/net/html
HIGH·GHSA-w32m-9786-jp63
Rancher Cross-site Scripting Vulnerability
6.1 MODERATE·GHSA-6m8r-jh89-rq7h
/sys/devices/virtual/powercap accessible by default to containers
MODERATE·GHSA-jq35-85cj-fj4p
Moby's external DNS requests from 'internal' networks could lead to data exfiltration
5.9 MODERATE·GHSA-mq39-4gv4-mvpx
Exposure of SSH credentials in Rancher/Fleet
LOW·GHSA-wm2r-rp98-8pmh
Dependents
This package has no known dependents.
Package metadata as of .
Links
- Origin
- Repo
Projects
jrosinsk/rancher
GitHub
Complete container management platform
call_split 0 forks
star 0 stars
OpenSSF scorecard
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
View information about checks and how to fix failures.
Score
2.4/10
Scorecard as of .
Code-Review
0/10
Determines if the project requires human code review before pull requests (aka merge requests) are merged.
Reasoning
Found 0/30 approved changesets -- score normalized to 0
Maintained
0/10
Determines if the project is "actively maintained".
Reasoning
0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0
Security-Policy
10/10
Determines if the project has published a security policy.
Reasoning
security policy file detected
CII-Best-Practices
0/10
Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.
Reasoning
no effort to earn an OpenSSF best practices badge detected
License
10/10
Determines if the project has defined a license.
Reasoning
license file detected
SAST
0/10
Determines if the project uses static code analysis.
Reasoning
no SAST tool detected
Fuzzing
0/10
Determines if the project uses fuzzing.
Reasoning
project is not fuzzed
Binary-Artifacts
10/10
Determines if the project has generated executable (binary) artifacts in the source repository.
Reasoning
no binaries found in the repo
Branch-Protection
0/10
Determines if the default and release branches are protected with GitHub's branch protection settings.
Reasoning
branch protection not enabled on development/release branches
Pinned-Dependencies
0/10
Determines if the project has declared and pinned the dependencies of its build process.
Reasoning
dependency not pinned by hash detected -- score normalized to 0
Vulnerabilities
0/10
Determines if the project has open, known unfixed vulnerabilities.
Reasoning
81 existing vulnerabilities detected
Project metadata as of .