Skip to main content
Version: 3.13-dev

Container Vulnerability Reports

Container Vulnerability Reports lists unique container images that have vulnerabilities in the selected namespace. You can open each report to see scan metadata and the full list of CVEs. This page is reachable from Security > Container Scanning > Vulnerability Reports or by clicking the Vulnerability Reports block on the Container Scanning Overview page.

Reports List​

The page shows a short description such as Unique container images with vulnerabilities in namespace <namespace>. At the top right you can change the Namespace to filter by namespace.

Table​

Use the Columns control (e.g. "Columns 9") to choose which columns are visible. The table includes:

ColumnDescription
ImageContainer image (e.g. library/nginx:latest). Rows can be expanded (arrow) for more detail.
NamespaceNamespace where the image is used.
ResourcesNumber of resources using this image (e.g. "1 resource"); the value is clickable and leads to the report details.
CriticalCount of critical vulnerabilities.
HighCount of high-severity vulnerabilities.
MediumCount of medium-severity.
LowCount of low-severity.
TotalTotal vulnerability count.
Last ScanDate and time of the last scan.

Pagination at the bottom (e.g. "Rows per page 25", "1–1 of 1") lets you move through the list. Click a row or the Resources link to open Report Details for that image.

Report Details​

When you open a report, the breadcrumbs show Security > Container Scanning > Vulnerability Reports > Report Details.

At the top you see:

  • Severity summary β€” Badges with counts: Critical, High, Medium, Low, Unknown (e.g. "0 Critical", "5 High").
  • Container block β€” Image name (e.g. index.docker.io/library/nginx:latest), Container name, Resource (e.g. ReplicaSet/webserver-bc6dbb848), Namespace, and base OS (e.g. debian 13.3).

Two tabs are available: Overview and Vulnerabilities (with the total count, e.g. "Vulnerabilities 5").

Overview Tab​

The Overview tab shows structured information:

  • Scan Information β€” Scanner (e.g. Trivy), Scanner Version (e.g. 0.66.0), Vendor (e.g. Aqua Security), Last Scan (date and time).
  • Image Information β€” Registry (e.g. index.docker.io), Repository (e.g. library/nginx), Tag (e.g. latest), Digest (truncated hash).
  • Operating System β€” Family and Version of the base image (e.g. debian 13.3).
  • Resource Information β€” Namespace, Resource Kind (e.g. ReplicaSet), Resource Name, Container name.

Use this to understand how and when the image was scanned and where it runs.

Vulnerabilities Tab​

The Vulnerabilities tab lists all findings for this image. The table has:

ColumnDescription
CVE IDCVE identifier (e.g. CVE-2026-0861, CVE-2026-22695). Each CVE ID is a link that opens the vulnerability details in the Aqua Vulnerability Database (e.g. https://avd.aquasec.com/nvd/2026/cve-2026-0861/), where you can read description, CVSS, affected software, and mitigations.
SeveritySeverity level (e.g. High), often with a colored tag.
ResourceAffected package or component.
Installed VersionVersion currently in the image.
Fixed VersionVersion that fixes the issue (may be empty if no fix is known).
ScoreSeverity score (e.g. 8.1, 7.1).
TitleShort description of the vulnerability.

Use Columns (e.g. "Columns 7") to customize the table. Pagination (e.g. "Rows per page: 25", "1–5 of 5") lets you move through the list when there are many vulnerabilities.