Grype scans docker images for known vulnerabilities.

  • How to install
 curl -sSfL https://raw.githubusercontent.com/anchore/grype/main/install.sh | sudo sh -s -- -b /usr/local/bin
  • How to launch
 grype docker:ubuntu

With a typical output:

$ grype registry.hub.docker.com/library/ubuntu
 ✔ Vulnerability DB        [no update available]
 ✔ Loaded image
 ✔ Parsed image
 ✔ Cataloged packages      [101 packages]
 ✔ Scanned image           [17 vulnerabilities]
NAME          INSTALLED                 FIXED-IN  TYPE  VULNERABILITY   SEVERITY
coreutils     8.32-4.1ubuntu1                     deb   CVE-2016-2781   Low
libc-bin      2.35-0ubuntu3.1                     deb   CVE-2016-20013  Negligible
libc6         2.35-0ubuntu3.1                     deb   CVE-2016-20013  Negligible
libgmp10      2:6.2.1+dfsg-3ubuntu1               deb   CVE-2021-43618  Low
libncurses6   6.3-2                               deb   CVE-2022-29458  Negligible
libncursesw6  6.3-2                               deb   CVE-2022-29458  Negligible
libpcre2-8-0  10.39-3build1                       deb   CVE-2022-1586   Low
libpcre2-8-0  10.39-3build1                       deb   CVE-2022-1587   Low
libpcre3      2:8.39-13ubuntu0.22.04.1            deb   CVE-2017-11164  Negligible
libtinfo6     6.3-2                               deb   CVE-2022-29458  Negligible
login         1:4.8.1-2ubuntu2                    deb   CVE-2013-4235   Low
ncurses-base  6.3-2                               deb   CVE-2022-29458  Negligible
ncurses-bin   6.3-2                               deb   CVE-2022-29458  Negligible
passwd        1:4.8.1-2ubuntu2                    deb   CVE-2013-4235   Low
perl-base     5.34.0-3ubuntu1                     deb   CVE-2020-16156  Medium
tar           1.34+dfsg-1build3                   deb   CVE-2019-9923   Low
zlib1g        1:1.2.11.dfsg-2ubuntu9              deb   CVE-2022-37434  Medium