Mobyproject Moby vulnerabilities
21 known vulnerabilities affecting mobyproject/moby.
Total CVEs
21
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH7MEDIUM14
Vulnerabilities
Page 1 of 2
CVE-2026-34040HIGHCVSS 7.8fixed in 29.3.12026-03-31
CVE-2026-34040 [HIGH] CWE-288 CVE-2026-34040: Moby is an open source container framework. Prior to version 29.3.1, a security vulnerability has be
Moby is an open source container framework. Prior to version 29.3.1, a security vulnerability has been detected that allows attackers to bypass authorization plugins (AuthZ). This issue has been patched in version 29.3.1.
nvd
CVE-2026-33997HIGHCVSS 8.1fixed in 29.3.12026-03-31
CVE-2026-33997 [MEDIUM] CWE-193 CVE-2026-33997: Moby is an open source container framework. Prior to version 29.3.1, a security vulnerability has be
Moby is an open source container framework. Prior to version 29.3.1, a security vulnerability has been detected that allows plugins privilege validation to be bypassed during docker plugin install. Due to an error in the daemon's privilege comparison logic, the daemon may incorrectly accept a privilege set that differs from the one approved by the u
nvd
CVE-2025-54388MEDIUMCVSS 5.1≥ 28.2.0, < 28.3.32025-07-30
CVE-2025-54388 [MEDIUM] CWE-909 CVE-2025-54388: Moby is an open source container framework developed by Docker Inc. that is distributed as Docker En
Moby is an open source container framework developed by Docker Inc. that is distributed as Docker Engine, Mirantis Container Runtime, and various other downstream projects/products. In versions 28.2.0 through 28.3.2, when the firewalld service is reloaded it removes all iptables rules including those created by Docker. While Docker should automatica
nvd
CVE-2025-54410MEDIUMCVSS 5.2fixed in 25.0.132025-07-30
CVE-2025-54410 [LOW] CWE-909 CVE-2025-54410: Moby is an open source container framework developed by Docker Inc. that is distributed as Docker En
Moby is an open source container framework developed by Docker Inc. that is distributed as Docker Engine, Mirantis Container Runtime, and various other downstream projects/products. A firewalld vulnerability affects Moby releases before 28.0.0. When firewalld reloads, Docker fails to re-create iptables rules that isolate bridge networks, allowing any c
nvd
CVE-2024-36623HIGHCVSS 8.1≤ 25.0.32024-11-29
CVE-2024-36623 [HIGH] CWE-362 CVE-2024-36623: moby through v25.0.3 has a Race Condition vulnerability in the streamformatter package which can be
moby through v25.0.3 has a Race Condition vulnerability in the streamformatter package which can be used to trigger multiple concurrent write operations resulting in data corruption or application crashes.
nvd
CVE-2024-36621MEDIUMCVSS 6.5v25.0.52024-11-29
CVE-2024-36621 [MEDIUM] CWE-362 CVE-2024-36621: moby v25.0.5 is affected by a Race Condition in builder/builder-next/adapters/snapshot/layer.go. The
moby v25.0.5 is affected by a Race Condition in builder/builder-next/adapters/snapshot/layer.go. The vulnerability could be used to trigger concurrent builds that call the EnsureLayer function resulting in resource leaks/exhaustion.
nvd
CVE-2024-36620MEDIUMCVSS 6.5≥ 25.0.0, ≤ 26.0.22024-11-29
CVE-2024-36620 [MEDIUM] CWE-476 CVE-2024-36620: moby v25.0.0 - v26.0.2 is vulnerable to NULL Pointer Dereference via daemon/images/image_history.go.
moby v25.0.0 - v26.0.2 is vulnerable to NULL Pointer Dereference via daemon/images/image_history.go.
nvd
CVE-2024-32473MEDIUMCVSS 6.5≥ 26.0.0, < 26.0.22024-04-18
CVE-2024-32473 [MEDIUM] CWE-668 CVE-2024-32473: Moby is an open source container framework that is a key component of Docker Engine, Docker Desktop,
Moby is an open source container framework that is a key component of Docker Engine, Docker Desktop, and other distributions of container tooling or runtimes. In 26.0.0, IPv6 is not disabled on network interfaces, including those belonging to networks where `--ipv6=false`. An container with an `ipvlan` or `macvlan` interface will normally be configu
nvd
CVE-2024-29018HIGHCVSS 7.5fixed in 23.0.11≥ 24.0.0, < 25.0.5+1 more2024-03-20
CVE-2024-29018 [MEDIUM] CWE-669 CVE-2024-29018: Moby is an open source container framework that is a key component of Docker Engine, Docker Desktop,
Moby is an open source container framework that is a key component of Docker Engine, Docker Desktop, and other distributions of container tooling or runtimes. Moby's networking implementation allows for many networks, each with their own IP address range and gateway, to be defined. This feature is frequently referred to as custom networks, as each n
nvd
CVE-2024-24557HIGHCVSS 7.8fixed in 24.0.9≥ 25.0.0, < 25.0.22024-02-01
CVE-2024-24557 [MEDIUM] CWE-345 CVE-2024-24557: Moby is an open-source project created by Docker to enable software containerization. The classic bu
Moby is an open-source project created by Docker to enable software containerization. The classic builder cache system is prone to cache poisoning if the image is built FROM scratch. Also, changes to some instructions (most important being HEALTHCHECK and ONBUILD) would not cause a cache miss. An attacker with the knowledge of the Dockerfile someone
nvd
CVE-2023-28840HIGHCVSS 8.7≥ 1.12.0, < 20.10.24≥ 23.0.0, < 23.0.32023-04-04
CVE-2023-28840 [HIGH] CWE-420 CVE-2023-28840: Moby is an open source container framework developed by Docker Inc. that is distributed as Docker, M
Moby is an open source container framework developed by Docker Inc. that is distributed as Docker, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (`dockerd`), which is developed as moby/moby, is commonly referred to as *Docker*.
Swarm Mode, which is compiled in and delivered by default in dockerd
nvd
CVE-2023-28841MEDIUMCVSS 6.8≥ 1.12.0, < 20.10.24≥ 23.0.0, < 23.0.32023-04-04
CVE-2023-28841 [MEDIUM] CWE-311 CVE-2023-28841: Moby is an open source container framework developed by Docker Inc. that is distributed as Docker, M
Moby is an open source container framework developed by Docker Inc. that is distributed as Docker, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (`dockerd`), which is developed as moby/moby is commonly referred to as *Docker*.
Swarm Mode, which is compiled in and delivered by default in `docke
nvd
CVE-2023-28842MEDIUMCVSS 6.8≥ 1.12.0, < 20.10.24≥ 23.0.0, < 23.0.32023-04-04
CVE-2023-28842 [MEDIUM] CWE-420 CVE-2023-28842: Moby) is an open source container framework developed by Docker Inc. that is distributed as Docker,
Moby) is an open source container framework developed by Docker Inc. that is distributed as Docker, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (`dockerd`), which is developed as moby/moby is commonly referred to as *Docker*.
Swarm Mode, which is compiled in and delivered by default in `docke
nvd
CVE-2022-36109MEDIUMCVSS 6.3fixed in 20.10.182022-09-09
CVE-2022-36109 [MEDIUM] CWE-863 CVE-2022-36109: Moby is an open-source project created by Docker to enable software containerization. A bug was foun
Moby is an open-source project created by Docker to enable software containerization. A bug was found in Moby (Docker Engine) where supplementary groups are not set up properly. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group
nvd
CVE-2022-27652MEDIUMCVSS 5.3fixed in 20.10.142022-04-18
CVE-2022-27652 [MEDIUM] CWE-276 CVE-2022-27652: A flaw was found in cri-o, where containers were incorrectly started with non-empty default permissi
A flaw was found in cri-o, where containers were incorrectly started with non-empty default permissions. A vulnerability was found in Moby (Docker Engine) where containers started incorrectly with non-empty inheritable Linux process capabilities. This flaw allows an attacker with access to programs with inheritable file capabilities to elevate those
nvd
CVE-2022-24769MEDIUMCVSS 5.9fixed in 20.10.142022-03-24
CVE-2022-24769 [MEDIUM] CWE-732 CVE-2022-24769: Moby is an open-source project created by Docker to enable and accelerate software containerization.
Moby is an open-source project created by Docker to enable and accelerate software containerization. A bug was found in Moby (Docker Engine) prior to version 20.10.14 where containers were incorrectly started with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capa
nvd
CVE-2021-41089MEDIUMCVSS 6.3fixed in 20.10.92021-10-04
CVE-2021-41089 [LOW] CWE-281 CVE-2021-41089: Moby is an open-source project created by Docker to enable software containerization. A bug was foun
Moby is an open-source project created by Docker to enable software containerization. A bug was found in Moby (Docker Engine) where attempting to copy files using `docker cp` into a specially-crafted container can result in Unix file permission changes for existing files in the host’s filesystem, widening access to others. This bug does not directly al
nvd
CVE-2021-41091MEDIUMCVSS 6.3fixed in 20.10.92021-10-04
CVE-2021-41091 [MEDIUM] CWE-281 CVE-2021-41091: Moby is an open-source project created by Docker to enable software containerization. A bug was foun
Moby is an open-source project created by Docker to enable software containerization. A bug was found in Moby (Docker Engine) where the data directory (typically `/var/lib/docker`) contained subdirectories with insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When
nvd
CVE-2018-12608HIGHCVSS 7.5fixed in 17.06.02018-09-10
CVE-2018-12608 [HIGH] CWE-295 CVE-2018-12608: An issue was discovered in Docker Moby before 17.06.0. The Docker engine validated a client TLS cert
An issue was discovered in Docker Moby before 17.06.0. The Docker engine validated a client TLS certificate using both the configured client CA root certificate and all system roots on non-Windows systems. This allowed a client with any domain validated certificate signed by a system-trusted root CA (as opposed to one signed by the configured CA root
nvd
CVE-2018-10892MEDIUMCVSS 5.3≥ 1.11, ≤ 17.03.22018-07-06
CVE-2018-10892 [MEDIUM] CWE-250 CVE-2018-10892: The default OCI linux spec in oci/defaults{_linux}.go in Docker/Moby from 1.11 to current does not b
The default OCI linux spec in oci/defaults{_linux}.go in Docker/Moby from 1.11 to current does not block /proc/acpi pathnames. The flaw allows an attacker to modify host's hardware like enabling/disabling bluetooth or turning up/down keyboard brightness.
nvd
1 / 2Next →