github.com/devseccon/trivy@v0.47.1-0.20231123133102-bd902a0bd996/pkg/scanner/local/testdata/fixtures/happy.yaml (about) 1 - bucket: alpine 3.11 2 pairs: 3 - bucket: musl 4 pairs: 5 - key: CVE-2020-9999 6 value: 7 FixedVersion: 1.2.4 8 - bucket: "rubygems::GitHub Security Advisory RubyGems" 9 pairs: 10 - bucket: rails 11 pairs: 12 - key: CVE-2014-0081 13 value: 14 PatchedVersions: 15 - "4.0.3" 16 - "3.2.17" 17 VulnerableVersions: 18 - ">= 4.0.0, < 4.0.3" 19 - ">= 3.0.0, < 3.2.17" 20 21 - bucket: "composer::GitHub Security Advisory Composer" 22 pairs: 23 - bucket: laravel/framework 24 pairs: 25 - key: CVE-2021-21263 26 value: 27 PatchedVersions: 28 - 8.22.1 29 - 7.30.3 30 - 6.20.12 31 VulnerableVersions: 32 - ">= 8.0.0, < 8.22.1" 33 - ">= 7.0.0, < 7.30.3" 34 - "< 6.20.12" 35 - bucket: vulnerability 36 pairs: 37 - key: CVE-2020-9999 38 value: 39 Title: dos 40 Description: dos vulnerability 41 Severity: HIGH 42 - key: CVE-2014-0081 43 value: 44 Title: xss 45 Description: xss vulnerability 46 Severity: MEDIUM 47 References: 48 - http://example.com 49 LastModifiedDate: "2020-02-01T01:01:00Z" 50 PublishedDate: "2020-01-01T01:01:00Z"