Anchore Enterprise Vulnerability
File Types
DefectDojo parser accepts a .json file.
You can generate vulnerability data using the Anchore Enterprise CLI tool, Anchorectl, or through the Enterprise UI.
Generating a Vulnerability Report:
Using Anchorectl: Run the following command to generate a vulnerability report in JSON format
anchorectl image vulnerabilities ubuntu:latest -o json
Using the Anchore UI: Navigate to the desired image in the Anchore Enterprise UI, click on the Vulnerabilities tab, and download the report in JSON format.
Acceptable JSON Format
All properties are strings and are required by the parser. As the parser evolved, two anchore engine parser JSON formats are present till now. Both (old / new) are supported.
{
"vulnerabilityId": "CVE-2023-24531",
"cves": "CVE-2023-24531",
"severity": "Critical",
"detectedAt": "2025-03-18T08:09:03Z",
"packageType": "Go",
"path": "/usr/local/bin/gosu",
"package": "stdlib-go1.18.2",
"fixAvailable": "1.21.0-0",
"fixObservedAt": "2025-03-18T08:09:03Z",
"link": "https://nvd.nist.gov/vuln/detail/CVE-2023-24531",
"nvdCvssBaseScore": 9.8
}
Sample Scan Data
Sample Anchore-Engine scans can be found here