Show filters
95 Total Results
Displaying 91-95 of 95
Sort by:
Attacker Value
Unknown
CVE-2014-6408
Disclosure Date: December 12, 2014 (last updated October 05, 2023)
Docker 1.3.0 through 1.3.1 allows remote attackers to modify the default run profile of image containers and possibly bypass the container by applying unspecified security options to an image.
0
Attacker Value
Unknown
CVE-2014-6407
Disclosure Date: December 12, 2014 (last updated October 05, 2023)
Docker before 1.3.2 allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation.
0
Attacker Value
Unknown
CVE-2014-5277
Disclosure Date: November 17, 2014 (last updated October 05, 2023)
Docker before 1.3.1 and docker-py before 0.5.3 fall back to HTTP when the HTTPS connection to the registry fails, which allows man-in-the-middle attackers to conduct downgrade attacks and obtain authentication and image data by leveraging a network position between the client and the registry to block HTTPS traffic.
0
Attacker Value
Unknown
CVE-2014-3499
Disclosure Date: July 11, 2014 (last updated October 05, 2023)
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.
0
Attacker Value
Unknown
CVE-2004-2197
Disclosure Date: December 31, 2004 (last updated February 22, 2025)
kdocker.cpp in kdocker 0.1 through 0.8 does not properly check the ownership of files, which could allow local users to execute arbitrary programs.
0