Scenario
Context: We started with a Docker image built from a Dockerfile using an outdated base image that contained many known security vulnerabilities. Using this old base image unintentionally introduced many security weaknesses into the Docker image.