When Snyk Container detects vulnerabilities, they are presented in the output:
Each vulnerability contains the following information:
The importance of the specific vulnerability. For more information, see Severity levels of detected Linux vulnerabilities.
A clear heading
A summary of the vulnerability and the package it affects.
A brief description of the type of issue or Common Vulnerabilities and Exposure (CVE) reference, if a CVE exists.
A link to vulnerability details, including links to upstream sources and global vulnerabilities databases.
The top-level package names that the vulnerability affects.
How the affected packages came to be in the image.
Whether the vulnerability is in the base image or which line in the Dockerfile introduced the vulnerability.
If available, the version of the package that has a fix for the vulnerability.
Vulnerabilities appear in reverse order of severity so that you can see the most important issues first, with limited scrolling required.
Snyk also reports the total dependencies scanned for known vulnerabilities and the total number of vulnerabilities.
Snyk groups together vulnerabilities that are found in multiple packages. This helps you focus on the number of vulnerabilities rather than the instances only.
Base image recommendations
If Snyk identifies the base image, and the image uses an Official Docker image, the output includes recommendations for upgrades, in order to fix some of the discovered vulnerabilities.
This provides a level of situational awareness, showing the vulnerability counts in minor and major upgrades or in alternative base images, which might have fewer vulnerabilities.