Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
docker docker vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2024-2216
A missing permission check in an HTTP endpoint in Jenkins docker-build-step Plugin 2.11 and previous versions allows attackers with Overall/Read permission to connect to an attacker-specified TCP or Unix socket URL, and to reconfigure the plugin using the provided connection test...
NA
CVE-2023-51518
Apache James prior to version 3.7.5 and 3.8.0 exposes a JMX endpoint on localhost subject to pre-authentication deserialisation of untrusted data. Given a deserialisation gadjet, this could be leveraged as part of an exploit chain that could result in privilege escalation. Note t...
1 Github repository
9.1
CVSSv3
CVE-2024-1355
A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance via the actions-console docker container while setting a service URL. Exploitation of this...
Github Enterprise Server
7.5
CVSSv3
CVE-2024-23756
The HTTP PUT and DELETE methods are enabled in the Plone official Docker version 5.2.13 (5221), allowing unauthenticated malicious users to execute dangerous actions such as uploading files to the server or deleting them.
Plone Plone 5.2.13
7.5
CVSSv3
CVE-2023-38369
IBM Security Access Manager Container 10.0.0.0 up to and including 10.0.6.1 does not require that docker images should have strong passwords by default, which makes it easier for malicious users to compromise user accounts. IBM X-Force ID: 261196.
Ibm Security Access Manager Container
9.8
CVSSv3
CVE-2024-23054
An issue in Plone Docker Official Image 5.2.13 (5221) open-source software that could allow for remote code execution due to a package listed in ++plone++static/components not existing in the public package index (npm).
Plone Plone Docker Official Image 5.2.13
9
CVSSv3
CVE-2023-31004
IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 up to and including 10.0.6.1 and IBM Security Verify Access Docker 10.0.0.0 up to and including 10.0.6.1) could allow a remote malicious user to gain access to the underlying system using man in ...
Ibm Security Verify Access
Ibm Security Verify Access Docker
7.8
CVSSv3
CVE-2023-31005
IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 up to and including 10.0.6.1 and IBM Security Verify Access Docker 10.0.0.0 up to and including 10.0.6.1) could allow a local user to escalate their privileges due to an improper security configu...
Ibm Security Verify Access
Ibm Security Verify Access Docker
7.5
CVSSv3
CVE-2023-31006
IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 up to and including 10.0.6.1 and IBM Security Verify Access Docker 10.0.0.0 up to and including 10.0.6.1) is vulnerable to a denial of service attacks on the DSC server. IBM X-Force ID: 254776.
Ibm Security Verify Access
Ibm Security Verify Access Docker
7.1
CVSSv3
CVE-2023-32327
IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 up to and including 10.0.6.1 and IBM Security Verify Access Docker 10.0.0.0 up to and including 10.0.6.1) is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. ...
Ibm Security Verify Access
Ibm Security Verify Access Docker
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »