Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
docker docker 1.3.1 vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2016-8954
IBM dashDB Local uses hard-coded credentials that could allow a remote malicious user to gain access to the Docker container or database.
Ibm Dashdb Local 1.1.0
Ibm Dashdb Local 1.2.1
Ibm Dashdb Local 1.3.0
Ibm Dashdb Local 1.2.0
Ibm Dashdb Local 1.3.1
Ibm Dashdb Local 1.0.0
Ibm Dashdb Local 1.1.1
NA
CVE-2014-6407
Docker prior to 1.3.2 allows remote malicious users to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation.
Docker Docker
Docker Docker 1.3.0
Docker Docker 1.0.0
1 Article
NA
CVE-2014-6408
Docker 1.3.0 up to and including 1.3.1 allows remote malicious users to modify the default run profile of image containers and possibly bypass the container by applying unspecified security options to an image.
Docker Docker 1.3.0
Docker Docker 1.3.1
1 Article
NA
CVE-2014-5277
Docker prior to 1.3.1 and docker-py prior to 0.5.3 fall back to HTTP when the HTTPS connection to the registry fails, which allows man-in-the-middle malicious users to conduct downgrade attacks and obtain authentication and image data by leveraging a network position between the ...
Docker Docker
Docker Docker-py
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started