Skip to content

Conversation

sebdanielsson
Copy link

Add markdown template for displaying vulnerabilities.

Add markdown template for displaying vulnerabilities.

Signed-off-by: Sebastian <sebastian.danielsson@proton.me>
@popey
Copy link
Contributor

popey commented Oct 9, 2025

Great idea. Thanks @sebdanielsson .

Package Version Installed Vulnerability ID Severity
login 1:4.13+dfsg1-4ubuntu3.2 CVE-2024-56433 Low
passwd 1:4.13+dfsg1-4ubuntu3.2 CVE-2024-56433 Low
libssl3t64 3.0.13-0ubuntu3.5 CVE-2024-41996 Low
libgcrypt20 1.10.3-2build1 CVE-2024-2236 Low
tar 1.35+dfsg-3build1 CVE-2025-45582 Medium
coreutils 9.4-3ubuntu6.1 CVE-2016-2781 Low
libssl3t64 3.0.13-0ubuntu3.5 CVE-2025-27587 Low
libpam-modules 1.5.3-5ubuntu5.5 CVE-2025-8941 Medium
libpam-modules-bin 1.5.3-5ubuntu5.5 CVE-2025-8941 Medium
libpam-runtime 1.5.3-5ubuntu5.5 CVE-2025-8941 Medium
libpam0g 1.5.3-5ubuntu5.5 CVE-2025-8941 Medium
libssl3t64 3.0.13-0ubuntu3.5 CVE-2025-9230 Medium
coreutils 9.4-3ubuntu6.1 CVE-2025-5278 Low
libncursesw6 6.4+20240113-1ubuntu2 CVE-2025-6141 Low
libtinfo6 6.4+20240113-1ubuntu2 CVE-2025-6141 Low
ncurses-base 6.4+20240113-1ubuntu2 CVE-2025-6141 Low
ncurses-bin 6.4+20240113-1ubuntu2 CVE-2025-6141 Low
gpgv 2.4.4-2ubuntu17.3 CVE-2022-3219 Low

I wonder if it might be worth adding a header or footer with some metadata, such as you might get in an HTML or JSON-formatted report:

# Vulnerability Report

- Name: ubuntu:latest
- Type: image
- Checksum: sha256:c3cee4aaf374d53303679d87528ae4ad32df1e8d990e482599dc5646d240349e
- Date: Thursday, October 9, 2025 at 09:01 AM

Signed-off-by: Sebastian <sebastian.danielsson@proton.me>
@sebdanielsson
Copy link
Author

Hey Popey! I didn’t know you work at Anchore now😄

I've added the name, type, checksum, and date now👍

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants