Github.Com Docker Docker vulnerabilities
28 known vulnerabilities affecting github.com/docker_docker.
Total CVEs
28
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH8MEDIUM16LOW2
Vulnerabilities
Page 2 of 2
CVE-2015-3630HIGH≥ 1.6.0, < 1.6.12022-02-15
CVE-2015-3630 [HIGH] CWE-285 Information Exposure in Docker Engine
Information Exposure in Docker Engine
Docker Engine before 1.6.1 uses weak permissions for (1) /proc/asound, (2) /proc/timer_stats, (3) /proc/latency_stats, and (4) /proc/fs, which allows local users to modify the host, obtain sensitive information, and perform protocol downgrade attacks via a crafted image.
ghsaosv
CVE-2014-3499HIGH≥ 0, < 1.0.12022-02-15
CVE-2014-3499 [HIGH] CWE-269 Privilege Escalation in Docker
Privilege Escalation in Docker
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.
ghsaosv
CVE-2015-3627MEDIUM≥ 0, < 1.6.12022-02-15
CVE-2015-3627 [MEDIUM] CWE-59 Symlink Attack in Libcontainer and Docker Engine
Symlink Attack in Libcontainer and Docker Engine
Libcontainer and Docker Engine before 1.6.1 opens the file-descriptor passed to the pid-1 process before performing the chroot, which allows local users to gain privileges via a symlink attack in an image.
ghsaosv
CVE-2014-9358MEDIUM≥ 0, < 1.3.22022-02-15
CVE-2014-9358 [MEDIUM] CWE-59 Directory Traversal in Docker
Directory Traversal in Docker
Docker before 1.3.3 does not properly validate image IDs, which allows remote attackers to conduct path traversal attacks and spoof repositories via a crafted image in a (1) "docker load" operation or (2) "registry communications."
ghsaosv
CVE-2014-5277MEDIUM≥ 0, < 1.3.12022-02-15
CVE-2014-5277 [MEDIUM] Man-in-the-Middle (MitM)
Man-in-the-Middle (MitM)
Docker before 1.3.1 and docker-py before 0.5.3 fall back to HTTP when the HTTPS connection to the registry fails, which allows man-in-the-middle attackers to conduct downgrade attacks and obtain authentication and image data by leveraging a network position between the client and the registry to block HTTPS traffic.
ghsaosv
CVE-2015-3631MEDIUM≥ 0, < 1.6.12022-02-15
CVE-2015-3631 [MEDIUM] CWE-285 Arbitrary File Override in Docker Engine
Arbitrary File Override in Docker Engine
Docker Engine before 1.6.1 allows local users to set arbitrary Linux Security Modules (LSM) and docker_t policies via an image that allows volumes to override files in /proc.
ghsaosv
CVE-2014-6408MEDIUM≥ 1.3.0, < 1.3.22022-02-15
CVE-2014-6408 [MEDIUM] CWE-285 Access Restriction Bypass in Docker
Access Restriction Bypass in Docker
Docker 1.3.0 through 1.3.1 allows remote attackers to modify the default run profile of image containers and possibly bypass the container by applying unspecified security options to an image.
ghsaosv
CVE-2014-9356MEDIUM≥ 0, < 1.3.32021-05-18
CVE-2014-9356 [MEDIUM] CWE-22 Path Traversal in Docker
Path Traversal in Docker
Path traversal vulnerability in Docker before 1.3.3 allows remote attackers to write to arbitrary files and bypass a container protection mechanism via a full pathname in a symlink in an (1) image or (2) build in a Dockerfile.
ghsaosv
← Previous2 / 2