CVE Dashboard
Track security vulnerabilities for popular Kubernetes ecosystem container images.
Data sources: endoflife.date (Kubernetes and cloud provider version lifecycles), GitHub (Official Kubernetes release changelogs), NIST NVD (National Vulnerability Database for CVE data), Pluto by Fairwinds (API deprecation detection rules), Artifact Hub (Helm chart metadata and compatibility)
Frequently Asked Questions
- Which container images are tracked in the CVE Dashboard?
- The dashboard tracks 50 popular Kubernetes ecosystem images across 5 categories: databases, web proxies, observability tools, language runtimes, and infrastructure components.
- How often is the CVE data updated?
- CVE data is refreshed daily at 00:00 UTC from the NIST National Vulnerability Database (NVD).
- What does the Safe Version column show?
- The Safe Version shows the minimum version where all known CVEs are fixed. Update to this version or later to address all tracked vulnerabilities.
Related Tools
View all tools →Upgrade Planner
Plan your Kubernetes upgrade path with risk scores, breaking changes, and CVE impact.
Cloud Version Matrix
Compare EKS, GKE, AKS, and OKE Kubernetes version support and EOL dates.
API Deprecation Checker
Paste your YAML manifests to detect deprecated and removed Kubernetes APIs.
Helm Compatibility Checker
Check if a Helm chart is compatible with your target Kubernetes version.