Show filters
95 Total Results
Displaying 91-95 of 95
Sort by:
Attacker Value
Unknown

CVE-2014-6408

Disclosure Date: December 12, 2014 (last updated October 05, 2023)
Docker 1.3.0 through 1.3.1 allows remote attackers to modify the default run profile of image containers and possibly bypass the container by applying unspecified security options to an image.
0
Attacker Value
Unknown

CVE-2014-6407

Disclosure Date: December 12, 2014 (last updated October 05, 2023)
Docker before 1.3.2 allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation.
0
Attacker Value
Unknown

CVE-2014-5277

Disclosure Date: November 17, 2014 (last updated October 05, 2023)
Docker before 1.3.1 and docker-py before 0.5.3 fall back to HTTP when the HTTPS connection to the registry fails, which allows man-in-the-middle attackers to conduct downgrade attacks and obtain authentication and image data by leveraging a network position between the client and the registry to block HTTPS traffic.
0
Attacker Value
Unknown

CVE-2014-3499

Disclosure Date: July 11, 2014 (last updated October 05, 2023)
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.
0
Attacker Value
Unknown

CVE-2004-2197

Disclosure Date: December 31, 2004 (last updated February 22, 2025)
kdocker.cpp in kdocker 0.1 through 0.8 does not properly check the ownership of files, which could allow local users to execute arbitrary programs.
0