diff --git a/labels/docker.io+anchore+test_images@sha256:7536ee345532f674ec9e448e3768db4e546c48220ba2b6ec9bc9cfbfb3b7b74a/89420d31-0d2f-4f46-a6a7-4e4ae9a537ec.json b/labels/docker.io+anchore+test_images@sha256:7536ee345532f674ec9e448e3768db4e546c48220ba2b6ec9bc9cfbfb3b7b74a/89420d31-0d2f-4f46-a6a7-4e4ae9a537ec.json new file mode 100644 index 00000000..e52ad266 --- /dev/null +++ b/labels/docker.io+anchore+test_images@sha256:7536ee345532f674ec9e448e3768db4e546c48220ba2b6ec9bc9cfbfb3b7b74a/89420d31-0d2f-4f46-a6a7-4e4ae9a537ec.json @@ -0,0 +1 @@ +{"ID": "89420d31-0d2f-4f46-a6a7-4e4ae9a537ec", "effective_cve": "CVE-2019-16884", "image": {"exact": "docker.io/anchore/test_images@sha256:7536ee345532f674ec9e448e3768db4e546c48220ba2b6ec9bc9cfbfb3b7b74a"}, "label": "FP", "note": "This is not a docker problem, it affects runc", "package": {"name": "github.com/docker/docker", "version": "v17.12.0-ce-rc1.0.20200309214505-aa6a9891b09c+incompatible"}, "timestamp": "2023-08-16T17:47:36.987942", "tool": "grype@v0.63.1+profile=cpe", "user": "bress", "vulnerability_id": "CVE-2019-16884"} \ No newline at end of file diff --git a/labels/docker.io+anchore+test_images@sha256:7536ee345532f674ec9e448e3768db4e546c48220ba2b6ec9bc9cfbfb3b7b74a/c9b26750-a773-4de7-8ae1-e6c2874f88f2.json b/labels/docker.io+anchore+test_images@sha256:7536ee345532f674ec9e448e3768db4e546c48220ba2b6ec9bc9cfbfb3b7b74a/c9b26750-a773-4de7-8ae1-e6c2874f88f2.json new file mode 100644 index 00000000..9c11c5bf --- /dev/null +++ b/labels/docker.io+anchore+test_images@sha256:7536ee345532f674ec9e448e3768db4e546c48220ba2b6ec9bc9cfbfb3b7b74a/c9b26750-a773-4de7-8ae1-e6c2874f88f2.json @@ -0,0 +1 @@ +{"ID": "c9b26750-a773-4de7-8ae1-e6c2874f88f2", "effective_cve": "CVE-2019-16884", "image": {"exact": "docker.io/anchore/test_images@sha256:7536ee345532f674ec9e448e3768db4e546c48220ba2b6ec9bc9cfbfb3b7b74a"}, "label": "TP", "package": {"name": "github.com/opencontainers/runc", "version": "v0.1.1"}, "timestamp": "2023-08-16T17:48:52.615499", "tool": "grype@v0.63.1+profile=nocpe", "user": "bress", "vulnerability_id": "CVE-2019-16884"} \ No newline at end of file diff --git a/labels/docker.io+anchore+test_images@sha256:7536ee345532f674ec9e448e3768db4e546c48220ba2b6ec9bc9cfbfb3b7b74a/e13a59ed-29e5-4585-b0ef-984b1b60f573.json b/labels/docker.io+anchore+test_images@sha256:7536ee345532f674ec9e448e3768db4e546c48220ba2b6ec9bc9cfbfb3b7b74a/e13a59ed-29e5-4585-b0ef-984b1b60f573.json deleted file mode 100644 index e0d28f6a..00000000 --- a/labels/docker.io+anchore+test_images@sha256:7536ee345532f674ec9e448e3768db4e546c48220ba2b6ec9bc9cfbfb3b7b74a/e13a59ed-29e5-4585-b0ef-984b1b60f573.json +++ /dev/null @@ -1 +0,0 @@ -{"ID": "e13a59ed-29e5-4585-b0ef-984b1b60f573", "effective_cve": "CVE-2019-16884", "image": {"exact": "docker.io/anchore/test_images@sha256:7536ee345532f674ec9e448e3768db4e546c48220ba2b6ec9bc9cfbfb3b7b74a"}, "label": "TP", "package": {"name": "github.com/docker/docker", "version": "v17.12.0-ce-rc1.0.20200309214505-aa6a9891b09c+incompatible"}, "timestamp": "2022-09-14T15:25:49+01:00", "user": "westonsteimel", "vulnerability_id": "CVE-2019-16884"} \ No newline at end of file diff --git a/labels/docker.io+anchore+test_images@sha256:b3534fc2e37943136d5b54e3a58b55d4ccd4363d926cf7aa5bf55a524cf8275b/17edadc6-1d12-47dd-8633-cadc883264ff.json b/labels/docker.io+anchore+test_images@sha256:b3534fc2e37943136d5b54e3a58b55d4ccd4363d926cf7aa5bf55a524cf8275b/17edadc6-1d12-47dd-8633-cadc883264ff.json new file mode 100644 index 00000000..0adfc6da --- /dev/null +++ b/labels/docker.io+anchore+test_images@sha256:b3534fc2e37943136d5b54e3a58b55d4ccd4363d926cf7aa5bf55a524cf8275b/17edadc6-1d12-47dd-8633-cadc883264ff.json @@ -0,0 +1 @@ +{"ID": "17edadc6-1d12-47dd-8633-cadc883264ff", "effective_cve": "CVE-2021-28165", "image": {"exact": "docker.io/anchore/test_images@sha256:b3534fc2e37943136d5b54e3a58b55d4ccd4363d926cf7aa5bf55a524cf8275b"}, "label": "FP", "note": "Jetty upstream says this affects jetty-io", "package": {"name": "jetty-server", "version": "9.1.0.M0"}, "timestamp": "2023-08-16T18:18:26.959654", "tool": "grype@v0.63.1+profile=cpe", "user": "bress", "vulnerability_id": "CVE-2021-28165"} \ No newline at end of file diff --git a/labels/docker.io+anchore+test_images@sha256:b3534fc2e37943136d5b54e3a58b55d4ccd4363d926cf7aa5bf55a524cf8275b/1dbb2ec9-be50-4e87-af89-25f845845078.json b/labels/docker.io+anchore+test_images@sha256:b3534fc2e37943136d5b54e3a58b55d4ccd4363d926cf7aa5bf55a524cf8275b/1dbb2ec9-be50-4e87-af89-25f845845078.json new file mode 100644 index 00000000..0def0481 --- /dev/null +++ b/labels/docker.io+anchore+test_images@sha256:b3534fc2e37943136d5b54e3a58b55d4ccd4363d926cf7aa5bf55a524cf8275b/1dbb2ec9-be50-4e87-af89-25f845845078.json @@ -0,0 +1 @@ +{"ID": "1dbb2ec9-be50-4e87-af89-25f845845078", "effective_cve": "CVE-2020-27216", "image": {"exact": "docker.io/anchore/test_images@sha256:b3534fc2e37943136d5b54e3a58b55d4ccd4363d926cf7aa5bf55a524cf8275b"}, "label": "FP", "note": "This affects jetty-webapp\n", "package": {"name": "jetty-server", "version": "9.1.0.M0"}, "timestamp": "2023-08-16T18:15:36.071194", "tool": "grype@v0.63.1+profile=cpe", "user": "bress", "vulnerability_id": "CVE-2020-27216"} \ No newline at end of file diff --git a/labels/docker.io+anchore+test_images@sha256:b3534fc2e37943136d5b54e3a58b55d4ccd4363d926cf7aa5bf55a524cf8275b/262de524-0bbf-4b01-9bef-02aae7c5b5c6.json b/labels/docker.io+anchore+test_images@sha256:b3534fc2e37943136d5b54e3a58b55d4ccd4363d926cf7aa5bf55a524cf8275b/262de524-0bbf-4b01-9bef-02aae7c5b5c6.json deleted file mode 100644 index 844beaf3..00000000 --- a/labels/docker.io+anchore+test_images@sha256:b3534fc2e37943136d5b54e3a58b55d4ccd4363d926cf7aa5bf55a524cf8275b/262de524-0bbf-4b01-9bef-02aae7c5b5c6.json +++ /dev/null @@ -1 +0,0 @@ -{"ID": "262de524-0bbf-4b01-9bef-02aae7c5b5c6", "effective_cve": "CVE-2020-27216", "image": {"exact": "docker.io/anchore/test_images@sha256:b3534fc2e37943136d5b54e3a58b55d4ccd4363d926cf7aa5bf55a524cf8275b"}, "label": "TP", "package": {"name": "jetty-server", "version": "9.1.0.M0"}, "timestamp": "2022-11-01T18:16:49+00:00", "tool": "grype@v0.51.0-7-gfcce63b", "user": "westonsteimel", "vulnerability_id": "CVE-2020-27216"} \ No newline at end of file diff --git a/labels/docker.io+anchore+test_images@sha256:b3534fc2e37943136d5b54e3a58b55d4ccd4363d926cf7aa5bf55a524cf8275b/3cd70f90-e1b8-4411-944c-9d55d06640a6.json b/labels/docker.io+anchore+test_images@sha256:b3534fc2e37943136d5b54e3a58b55d4ccd4363d926cf7aa5bf55a524cf8275b/3cd70f90-e1b8-4411-944c-9d55d06640a6.json new file mode 100644 index 00000000..9feab85a --- /dev/null +++ b/labels/docker.io+anchore+test_images@sha256:b3534fc2e37943136d5b54e3a58b55d4ccd4363d926cf7aa5bf55a524cf8275b/3cd70f90-e1b8-4411-944c-9d55d06640a6.json @@ -0,0 +1 @@ +{"ID": "3cd70f90-e1b8-4411-944c-9d55d06640a6", "effective_cve": "CVE-2021-28169", "image": {"exact": "docker.io/anchore/test_images@sha256:b3534fc2e37943136d5b54e3a58b55d4ccd4363d926cf7aa5bf55a524cf8275b"}, "label": "FP", "note": "This affects jetty-servlets", "package": {"name": "jetty-server", "version": "9.1.0.M0"}, "timestamp": "2023-08-16T18:19:24.678277", "tool": "grype@v0.63.1+profile=cpe", "user": "bress", "vulnerability_id": "CVE-2021-28169"} \ No newline at end of file diff --git a/labels/docker.io+anchore+test_images@sha256:b3534fc2e37943136d5b54e3a58b55d4ccd4363d926cf7aa5bf55a524cf8275b/8fbb8f4a-28c1-4f93-afed-9f4abecc8a0b.json b/labels/docker.io+anchore+test_images@sha256:b3534fc2e37943136d5b54e3a58b55d4ccd4363d926cf7aa5bf55a524cf8275b/8fbb8f4a-28c1-4f93-afed-9f4abecc8a0b.json deleted file mode 100644 index 275dbe0f..00000000 --- a/labels/docker.io+anchore+test_images@sha256:b3534fc2e37943136d5b54e3a58b55d4ccd4363d926cf7aa5bf55a524cf8275b/8fbb8f4a-28c1-4f93-afed-9f4abecc8a0b.json +++ /dev/null @@ -1 +0,0 @@ -{"ID": "8fbb8f4a-28c1-4f93-afed-9f4abecc8a0b", "effective_cve": "CVE-2021-28169", "image": {"exact": "docker.io/anchore/test_images@sha256:b3534fc2e37943136d5b54e3a58b55d4ccd4363d926cf7aa5bf55a524cf8275b"}, "label": "TP", "package": {"name": "jetty-server", "version": "9.1.0.M0"}, "timestamp": "2022-11-01T18:16:37+00:00", "tool": "grype@v0.51.0-7-gfcce63b", "user": "westonsteimel", "vulnerability_id": "CVE-2021-28169"} \ No newline at end of file diff --git a/labels/docker.io+anchore+test_images@sha256:b3534fc2e37943136d5b54e3a58b55d4ccd4363d926cf7aa5bf55a524cf8275b/90df0123-540f-4f95-a153-e9b66986f2ca.json b/labels/docker.io+anchore+test_images@sha256:b3534fc2e37943136d5b54e3a58b55d4ccd4363d926cf7aa5bf55a524cf8275b/90df0123-540f-4f95-a153-e9b66986f2ca.json deleted file mode 100644 index 0b7db16c..00000000 --- a/labels/docker.io+anchore+test_images@sha256:b3534fc2e37943136d5b54e3a58b55d4ccd4363d926cf7aa5bf55a524cf8275b/90df0123-540f-4f95-a153-e9b66986f2ca.json +++ /dev/null @@ -1 +0,0 @@ -{"ID": "90df0123-540f-4f95-a153-e9b66986f2ca", "effective_cve": "CVE-2021-28165", "image": {"exact": "docker.io/anchore/test_images@sha256:b3534fc2e37943136d5b54e3a58b55d4ccd4363d926cf7aa5bf55a524cf8275b"}, "label": "TP", "package": {"name": "jetty-server", "version": "9.1.0.M0"}, "timestamp": "2022-11-01T18:16:45+00:00", "tool": "grype@v0.51.0-7-gfcce63b", "user": "westonsteimel", "vulnerability_id": "CVE-2021-28165"} \ No newline at end of file diff --git a/labels/docker.io+gitlab+gitlab-ce@sha256:04d4219d5dfb3acccc9997e50477c8d24b371387a95857e1ea8fc779e17a716c/1236aa89-0acd-4cca-b76e-06662cdbecbd.json b/labels/docker.io+gitlab+gitlab-ce@sha256:04d4219d5dfb3acccc9997e50477c8d24b371387a95857e1ea8fc779e17a716c/1236aa89-0acd-4cca-b76e-06662cdbecbd.json deleted file mode 100644 index 9de3f129..00000000 --- a/labels/docker.io+gitlab+gitlab-ce@sha256:04d4219d5dfb3acccc9997e50477c8d24b371387a95857e1ea8fc779e17a716c/1236aa89-0acd-4cca-b76e-06662cdbecbd.json +++ /dev/null @@ -1 +0,0 @@ -{"ID": "1236aa89-0acd-4cca-b76e-06662cdbecbd", "effective_cve": "CVE-2018-25032", "image": {"exact": "docker.io/gitlab/gitlab-ce@sha256:04d4219d5dfb3acccc9997e50477c8d24b371387a95857e1ea8fc779e17a716c"}, "label": "TP", "package": {"name": "zlib", "version": "1.1.0"}, "timestamp": "2022-12-09T21:03:53+00:00", "tool": "grype@v0.53.1", "user": "westonsteimel", "vulnerability_id": "CVE-2018-25032"} \ No newline at end of file diff --git a/labels/docker.io+gitlab+gitlab-ce@sha256:04d4219d5dfb3acccc9997e50477c8d24b371387a95857e1ea8fc779e17a716c/5c183f5b-e635-4003-992f-7edf015e23aa.json b/labels/docker.io+gitlab+gitlab-ce@sha256:04d4219d5dfb3acccc9997e50477c8d24b371387a95857e1ea8fc779e17a716c/5c183f5b-e635-4003-992f-7edf015e23aa.json new file mode 100644 index 00000000..90ec8df9 --- /dev/null +++ b/labels/docker.io+gitlab+gitlab-ce@sha256:04d4219d5dfb3acccc9997e50477c8d24b371387a95857e1ea8fc779e17a716c/5c183f5b-e635-4003-992f-7edf015e23aa.json @@ -0,0 +1 @@ +{"ID": "5c183f5b-e635-4003-992f-7edf015e23aa", "effective_cve": "CVE-2018-25032", "image": {"exact": "docker.io/gitlab/gitlab-ce@sha256:04d4219d5dfb3acccc9997e50477c8d24b371387a95857e1ea8fc779e17a716c"}, "label": "FP", "note": "This is the ruby zlib, this library uses the system zlib", "package": {"name": "zlib", "version": "1.1.0"}, "timestamp": "2023-08-16T18:04:29.231647", "tool": "grype@v0.63.1+profile=cpe", "user": "bress", "vulnerability_id": "CVE-2018-25032"} \ No newline at end of file diff --git a/labels/docker.io+gitlab+gitlab-ce@sha256:04d4219d5dfb3acccc9997e50477c8d24b371387a95857e1ea8fc779e17a716c/66ca0ed8-71db-40ca-a9d7-b00b53d0757c.json b/labels/docker.io+gitlab+gitlab-ce@sha256:04d4219d5dfb3acccc9997e50477c8d24b371387a95857e1ea8fc779e17a716c/66ca0ed8-71db-40ca-a9d7-b00b53d0757c.json deleted file mode 100644 index 0f8cbda3..00000000 --- a/labels/docker.io+gitlab+gitlab-ce@sha256:04d4219d5dfb3acccc9997e50477c8d24b371387a95857e1ea8fc779e17a716c/66ca0ed8-71db-40ca-a9d7-b00b53d0757c.json +++ /dev/null @@ -1 +0,0 @@ -{"ID": "66ca0ed8-71db-40ca-a9d7-b00b53d0757c", "effective_cve": "CVE-2002-0059", "image": {"exact": "docker.io/gitlab/gitlab-ce@sha256:04d4219d5dfb3acccc9997e50477c8d24b371387a95857e1ea8fc779e17a716c"}, "label": "TP", "package": {"name": "zlib", "version": "1.1.0"}, "timestamp": "2022-12-09T21:03:49+00:00", "tool": "grype@v0.53.1", "user": "westonsteimel", "vulnerability_id": "CVE-2002-0059"} \ No newline at end of file diff --git a/labels/docker.io+gitlab+gitlab-ce@sha256:04d4219d5dfb3acccc9997e50477c8d24b371387a95857e1ea8fc779e17a716c/ccec18ad-22d7-40d7-8072-fcbffa65a07b.json b/labels/docker.io+gitlab+gitlab-ce@sha256:04d4219d5dfb3acccc9997e50477c8d24b371387a95857e1ea8fc779e17a716c/ccec18ad-22d7-40d7-8072-fcbffa65a07b.json new file mode 100644 index 00000000..67f0c0d9 --- /dev/null +++ b/labels/docker.io+gitlab+gitlab-ce@sha256:04d4219d5dfb3acccc9997e50477c8d24b371387a95857e1ea8fc779e17a716c/ccec18ad-22d7-40d7-8072-fcbffa65a07b.json @@ -0,0 +1 @@ +{"ID": "ccec18ad-22d7-40d7-8072-fcbffa65a07b", "effective_cve": "CVE-2002-0059", "image": {"exact": "docker.io/gitlab/gitlab-ce@sha256:04d4219d5dfb3acccc9997e50477c8d24b371387a95857e1ea8fc779e17a716c"}, "label": "FP", "note": "This is the ruby zlib, this library uses the system zlib", "package": {"name": "zlib", "version": "1.1.0"}, "timestamp": "2023-08-16T18:04:24.687642", "tool": "grype@v0.63.1+profile=cpe", "user": "bress", "vulnerability_id": "CVE-2002-0059"} \ No newline at end of file diff --git a/labels/docker.io+sonatype+nexus3@sha256:e8fea6b4279f2b5b24b36170459cb7aa3d6afe999f9d3e3713541be28bae8ec4/5b31526f-8e63-44fc-a65a-ce19ea31f7f1.json b/labels/docker.io+sonatype+nexus3@sha256:e8fea6b4279f2b5b24b36170459cb7aa3d6afe999f9d3e3713541be28bae8ec4/5b31526f-8e63-44fc-a65a-ce19ea31f7f1.json new file mode 100644 index 00000000..65585111 --- /dev/null +++ b/labels/docker.io+sonatype+nexus3@sha256:e8fea6b4279f2b5b24b36170459cb7aa3d6afe999f9d3e3713541be28bae8ec4/5b31526f-8e63-44fc-a65a-ce19ea31f7f1.json @@ -0,0 +1 @@ +{"ID": "5b31526f-8e63-44fc-a65a-ce19ea31f7f1", "effective_cve": "CVE-2020-17510", "image": {"exact": "docker.io/sonatype/nexus3@sha256:e8fea6b4279f2b5b24b36170459cb7aa3d6afe999f9d3e3713541be28bae8ec4"}, "label": "FP", "note": "This affects shiro-spring", "package": {"name": "shiro-web", "version": "1.6.0"}, "timestamp": "2023-08-16T18:02:29.357318", "tool": "grype@v0.63.1+profile=cpe", "user": "bress", "vulnerability_id": "CVE-2020-17510"} \ No newline at end of file diff --git a/labels/docker.io+sonatype+nexus3@sha256:e8fea6b4279f2b5b24b36170459cb7aa3d6afe999f9d3e3713541be28bae8ec4/b4146a68-9f59-473a-83cc-cefb879cf459.json b/labels/docker.io+sonatype+nexus3@sha256:e8fea6b4279f2b5b24b36170459cb7aa3d6afe999f9d3e3713541be28bae8ec4/b4146a68-9f59-473a-83cc-cefb879cf459.json deleted file mode 100644 index c47f7903..00000000 --- a/labels/docker.io+sonatype+nexus3@sha256:e8fea6b4279f2b5b24b36170459cb7aa3d6afe999f9d3e3713541be28bae8ec4/b4146a68-9f59-473a-83cc-cefb879cf459.json +++ /dev/null @@ -1 +0,0 @@ -{"ID": "b4146a68-9f59-473a-83cc-cefb879cf459", "effective_cve": "CVE-2020-17510", "image": {"exact": "docker.io/sonatype/nexus3@sha256:e8fea6b4279f2b5b24b36170459cb7aa3d6afe999f9d3e3713541be28bae8ec4"}, "label": "TP", "package": {"name": "shiro-web", "version": "1.6.0"}, "timestamp": "2022-11-25T17:34:44+00:00", "tool": "grype@v0.53.1", "user": "westonsteimel", "vulnerability_id": "CVE-2020-17510"} \ No newline at end of file