Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
docker docker 1.3.1 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2014-6408
Docker 1.3.0 up to and including 1.3.1 allows remote malicious users to modify the default run profile of image containers and possibly bypass the container by applying unspecified security options to an image.
Docker Docker 1.3.0
Docker Docker 1.3.1
1 Article
7.5
CVSSv2
CVE-2014-6407
Docker prior to 1.3.2 allows remote malicious users to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation.
Docker Docker
Docker Docker 1.3.0
Docker Docker 1.0.0
1 Article
5
CVSSv2
CVE-2014-5277
Docker prior to 1.3.1 and docker-py prior to 0.5.3 fall back to HTTP when the HTTPS connection to the registry fails, which allows man-in-the-middle malicious users to conduct downgrade attacks and obtain authentication and image data by leveraging a network position between the ...
Docker Docker
Docker Docker-py
7.5
CVSSv2
CVE-2016-8954
IBM dashDB Local uses hard-coded credentials that could allow a remote malicious user to gain access to the Docker container or database.
Ibm Dashdb Local 1.1.0
Ibm Dashdb Local 1.2.1
Ibm Dashdb Local 1.3.0
Ibm Dashdb Local 1.2.0
Ibm Dashdb Local 1.3.1
Ibm Dashdb Local 1.0.0
Ibm Dashdb Local 1.1.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3581
reflected XSS
CVE-2024-26925
CVE-2024-27956
LFI
CVE-2024-3607
CVE-2024-3107
CVE-2024-3295
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started