Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
docker engine vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2014-8179
Docker Engine prior to 1.8.3 and CS Docker Engine prior to 1.6.2-CS7 does not properly validate and extract the manifest object from its JSON representation during a pull, which allows malicious users to inject new attributes in a JSON object and bypass pull-by-digest validation.
Docker Cs Engine
Docker Docker
Opensuse Opensuse 13.2
5.5
CVSSv3
CVE-2014-8178
Docker Engine prior to 1.8.3 and CS Docker Engine prior to 1.6.2-CS7 do not use a globally unique identifier to store image layers, which makes it easier for malicious users to poison the image cache via a crafted image in pull or push commands.
Docker Cs Engine
Docker Docker
Opensuse Opensuse 13.2
4.9
CVSSv3
CVE-2018-20699
Docker Engine prior to 18.09 allows malicious users to cause a denial of service (dockerd memory consumption) via a large integer in a --cpuset-mems or --cpuset-cpus value, related to daemon/daemon_unix.go, pkg/parsers/parsers.go, and pkg/sysinfo/sysinfo.go.
Docker Engine
Redhat Enterprise Linux Server 7.0
6
CVSSv3
CVE-2020-13401
An issue exists in Docker Engine prior to 19.03.11. An attacker in a container, with the CAP_NET_RAW capability, can craft IPv6 router advertisements, and consequently spoof external IPv6 hosts, obtain sensitive information, or cause a denial of service.
Docker Engine
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Debian Debian Linux 10.0
Broadcom Sannav -
2 Github repositories
7.5
CVSSv3
CVE-2019-13509
In Docker CE and EE prior to 18.09.8 (as well as Docker EE prior to 17.06.2-ee-23 and 18.x prior to 18.03.1-ee-10), Docker Engine in debug mode may sometimes add secrets to the debug log. This applies to a scenario where docker stack deploy is run to redeploy a stack that include...
Docker Docker 17.03.2
Docker Docker 17.06.2
Docker Docker 18.03.1
Docker Docker
NA
CVE-2014-6407
Docker prior to 1.3.2 allows remote malicious users to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation.
Docker Docker
Docker Docker 1.3.0
Docker Docker 1.0.0
1 Article
NA
CVE-2014-6408
Docker 1.3.0 up to and including 1.3.1 allows remote malicious users to modify the default run profile of image containers and possibly bypass the container by applying unspecified security options to an image.
Docker Docker 1.3.0
Docker Docker 1.3.1
1 Article
NA
CVE-2015-3627
Libcontainer and Docker Engine prior to 1.6.1 opens the file-descriptor passed to the pid-1 process before performing the chroot, which allows local users to gain privileges via a symlink attack in an image.
Docker Libcontainer
Docker Docker
1 Github repository
NA
CVE-2015-3631
Docker Engine prior to 1.6.1 allows local users to set arbitrary Linux Security Modules (LSM) and docker_t policies via an image that allows volumes to override files in /proc.
Docker Docker
NA
CVE-2015-3630
Docker Engine prior to 1.6.1 uses weak permissions for (1) /proc/asound, (2) /proc/timer_stats, (3) /proc/latency_stats, and (4) /proc/fs, which allows local users to modify the host, obtain sensitive information, and perform protocol downgrade attacks via a crafted image.
Docker Docker
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-26978
CVE-2024-26982
wireless
CVE-2023-6949
CVE-2024-26980
CVE-2024-32766
CVE-2024-26939
cache poisoning
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »