Show filters
95 Total Results
Displaying 51-60 of 95
Sort by:
Attacker Value
Unknown
CVE-2020-11492
Disclosure Date: June 05, 2020 (last updated February 21, 2025)
An issue was discovered in Docker Desktop through 2.2.0.5 on Windows. If a local attacker sets up their own named pipe prior to starting Docker with the same name, this attacker can intercept a connection attempt from Docker Service (which runs as SYSTEM), and then impersonate their privileges.
0
Attacker Value
Unknown
CVE-2020-13401
Disclosure Date: June 02, 2020 (last updated February 21, 2025)
An issue was discovered in Docker Engine before 19.03.11. An attacker in a container, with the CAP_NET_RAW capability, can craft IPv6 router advertisements, and consequently spoof external IPv6 hosts, obtain sensitive information, or cause a denial of service.
0
Attacker Value
Unknown
CVE-2020-10665
Disclosure Date: March 18, 2020 (last updated February 21, 2025)
Docker Desktop allows local privilege escalation to NT AUTHORITY\SYSTEM because it mishandles the collection of diagnostics with Administrator privileges, leading to arbitrary DACL permissions overwrites and arbitrary file writes. This affects Docker Desktop Enterprise before 2.1.0.9, Docker Desktop for Windows Stable before 2.2.0.4, and Docker Desktop for Windows Edge before 2.2.2.0.
0
Attacker Value
Unknown
CVE-2020-7606
Disclosure Date: March 15, 2020 (last updated February 21, 2025)
docker-compose-remote-api through 0.1.4 allows execution of arbitrary commands. Within 'index.js' of the package, the function 'exec(serviceName, cmd, fnStdout, fnStderr, fnExit)' uses the variable 'serviceName' which can be controlled by users without any sanitization.
0
Attacker Value
Unknown
CVE-2014-5278
Disclosure Date: February 07, 2020 (last updated November 08, 2023)
A vulnerability exists in Docker before 1.2 via container names, which may collide with and override container IDs.
0
Attacker Value
Unknown
CVE-2014-0048
Disclosure Date: January 02, 2020 (last updated February 21, 2025)
An issue was found in Docker before 1.6.0. Some programs and scripts in Docker are downloaded via HTTP and then executed or used in unsafe ways.
0
Attacker Value
Unknown
CVE-2014-8179
Disclosure Date: December 17, 2019 (last updated November 27, 2024)
Docker Engine before 1.8.3 and CS Docker Engine before 1.6.2-CS7 does not properly validate and extract the manifest object from its JSON representation during a pull, which allows attackers to inject new attributes in a JSON object and bypass pull-by-digest validation.
0
Attacker Value
Unknown
CVE-2014-8178
Disclosure Date: December 17, 2019 (last updated November 27, 2024)
Docker Engine before 1.8.3 and CS Docker Engine before 1.6.2-CS7 do not use a globally unique identifier to store image layers, which makes it easier for attackers to poison the image cache via a crafted image in pull or push commands.
0
Attacker Value
Unknown
CVE-2014-9356
Disclosure Date: December 02, 2019 (last updated November 27, 2024)
Path traversal vulnerability in Docker before 1.3.3 allows remote attackers to write to arbitrary files and bypass a container protection mechanism via a full pathname in a symlink in an (1) image or (2) build in a Dockerfile.
0
Attacker Value
Unknown
CVE-2019-16884
Disclosure Date: September 25, 2019 (last updated November 08, 2023)
runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.
0