github.com/devseccon/trivy@v0.47.1-0.20231123133102-bd902a0bd996/pkg/scanner/local/testdata/fixtures/happy.yaml (about)

     1  - bucket: alpine 3.11
     2    pairs:
     3      - bucket: musl
     4        pairs:
     5          - key: CVE-2020-9999
     6            value:
     7              FixedVersion: 1.2.4
     8  - bucket: "rubygems::GitHub Security Advisory RubyGems"
     9    pairs:
    10      - bucket: rails
    11        pairs:
    12          - key: CVE-2014-0081
    13            value:
    14              PatchedVersions:
    15                - "4.0.3"
    16                - "3.2.17"
    17              VulnerableVersions:
    18                - ">= 4.0.0, < 4.0.3"
    19                - ">= 3.0.0, < 3.2.17"
    20  
    21  - bucket: "composer::GitHub Security Advisory Composer"
    22    pairs:
    23      - bucket: laravel/framework
    24        pairs:
    25          - key: CVE-2021-21263
    26            value:
    27              PatchedVersions:
    28                - 8.22.1
    29                - 7.30.3
    30                - 6.20.12
    31              VulnerableVersions:
    32                - ">= 8.0.0, < 8.22.1"
    33                - ">= 7.0.0, < 7.30.3"
    34                - "< 6.20.12"
    35  - bucket: vulnerability
    36    pairs:
    37      - key: CVE-2020-9999
    38        value:
    39          Title: dos
    40          Description: dos vulnerability
    41          Severity: HIGH
    42      - key: CVE-2014-0081
    43        value:
    44          Title: xss
    45          Description: xss vulnerability
    46          Severity: MEDIUM
    47          References:
    48            - http://example.com
    49          LastModifiedDate: "2020-02-01T01:01:00Z"
    50          PublishedDate: "2020-01-01T01:01:00Z"