Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
docker docker vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2021-3193
Improper access and command validation in the Nagios Docker Config Wizard prior to 1.1.2, as used in Nagios XI up to and including 5.7, allows an unauthenticated malicious user to execute remote code as the apache user.
Nagios Nagios Xi
7.5
CVSSv2
CVE-2020-11651
An issue exists in SaltStack Salt prior to 2019.2.4 and 3000 prior to 3000.2. The salt-master process ClearFuncs class does not properly validate method calls. This allows a remote user to access some methods without authentication. These methods can be used to retrieve user toke...
Saltstack Salt
Opensuse Leap 15.1
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 16.04
Vmware Application Remote Collector 8.0.0
Vmware Application Remote Collector 7.5.0
17 Github repositories
4 Articles
7.5
CVSSv2
CVE-2020-11878
The Jitsi Meet (aka docker-jitsi-meet) stack on Docker before stable-4384-1 uses default passwords (such as passw0rd) for system accounts.
Jitsi Meet
7.5
CVSSv2
CVE-2020-11710
An issue exists in docker-kong (for Kong) up to and including 2.0.3. The admin API port may be accessible on interfaces other than 127.0.0.1. NOTE: The vendor argue that this CVE is not a vulnerability because it has an inaccurate bug scope and patch links. “1) Inaccurate B...
Konghq Docker-kong
2 Github repositories
7.5
CVSSv2
CVE-2020-7606
docker-compose-remote-api up to and including 0.1.4 allows execution of arbitrary commands. Within 'index.js' of the package, the function 'exec(serviceName, cmd, fnStdout, fnStderr, fnExit)' uses the variable 'serviceName' which can be controlled by...
Docker-compose-remote-api Project Docker-compose-remote-api
7.5
CVSSv2
CVE-2014-0048
An issue was found in Docker prior to 1.6.0. Some programs and scripts in Docker are downloaded via HTTP and then executed or used in unsafe ways.
Docker Docker
Apache Geode 1.12.0
7.5
CVSSv2
CVE-2019-19781
An issue exists in Citrix Application Delivery Controller (ADC) and Gateway 10.5, 11.1, 12.0, 12.1, and 13.0. They allow Directory Traversal.
Citrix Application Delivery Controller Firmware 10.5
Citrix Application Delivery Controller Firmware 11.1
Citrix Application Delivery Controller Firmware 12.0
Citrix Application Delivery Controller Firmware 12.1
Citrix Application Delivery Controller Firmware 13.0
Citrix Netscaler Gateway Firmware 10.5
Citrix Netscaler Gateway Firmware 11.1
Citrix Netscaler Gateway Firmware 12.0
Citrix Netscaler Gateway Firmware 12.1
Citrix Gateway Firmware 13.0
2 Metasploit modules
64 Github repositories
21 Articles
7.5
CVSSv2
CVE-2019-14271
In Docker 19.03.x prior to 19.03.1 linked against the GNU C Library (aka glibc), code injection can occur when the nsswitch facility dynamically loads a library inside a chroot that contains the contents of the container.
Docker Docker
Debian Debian Linux 10.0
Opensuse Leap 15.0
Opensuse Leap 15.1
8 Github repositories
7.5
CVSSv2
CVE-2018-11756
In PHP Runtime for Apache OpenWhisk, a Docker action inheriting one of the Docker tags openwhisk/action-php-v7.2:1.0.0 or openwhisk/action-php-v7.1:1.0.1 (or earlier) may allow an malicious user to replace the user function inside the container if the user code is vulnerable to c...
Apache Openwhisk
7.5
CVSSv2
CVE-2018-11757
In Docker Skeleton Runtime for Apache OpenWhisk, a Docker action inheriting the Docker tag openwhisk/dockerskeleton:1.3.0 (or earlier) may allow an malicious user to replace the user function inside the container if the user code is vulnerable to code exploitation.
Apache Openwhisk
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5324
path traversal
CVE-2024-4743
CVE-2024-5184
TCP
CVE-2024-27822
code injection
CVE-2024-28995
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »