Show filters
95 Total Results
Displaying 1-10 of 95
Sort by:
Attacker Value
Unknown

CVE-2024-9348

Disclosure Date: October 16, 2024 (last updated October 17, 2024)
Docker Desktop before v4.34.3 allows RCE via unsanitized GitHub source link in Build view.
0
Attacker Value
Unknown

CVE-2024-8696

Disclosure Date: September 12, 2024 (last updated September 14, 2024)
A remote code execution (RCE) vulnerability via crafted extension publisher-url/additional-urls could be abused by a malicious extension in Docker Desktop before 4.34.2.
Attacker Value
Unknown

CVE-2024-8695

Disclosure Date: September 12, 2024 (last updated September 14, 2024)
A remote code execution (RCE) vulnerability via crafted extension description/changelog could be abused by a malicious extension in Docker Desktop before 4.34.2.
Attacker Value
Unknown

CVE-2024-6222

Disclosure Date: July 09, 2024 (last updated July 13, 2024)
In Docker Desktop before v4.29.0, an attacker who has gained access to the Docker Desktop VM through a container breakout can further escape to the host by passing extensions and dashboard related IPC messages. Docker Desktop v4.29.0 https://docs.docker.com/desktop/release-notes/#4290 fixes the issue on MacOS, Linux and Windows with Hyper-V backend. As exploitation requires "Allow only extensions distributed through the Docker Marketplace" to be disabled, Docker Desktop  v4.31.0 https://docs.docker.com/desktop/release-notes/#4310  additionally changes the default configuration to enable this setting by default.
Attacker Value
Unknown

CVE-2024-5652

Disclosure Date: July 09, 2024 (last updated July 13, 2024)
In Docker Desktop on Windows before v4.31.0 allows a user in the docker-users group to cause a Windows Denial-of-Service through the exec-path Docker daemon config option in Windows containers mode.
Attacker Value
Unknown

CVE-2023-40453

Disclosure Date: November 07, 2023 (last updated November 15, 2023)
Docker Machine through 0.16.2 allows an attacker, who has control of a worker node, to provide crafted version data, which might potentially trick an administrator into performing an unsafe action (via escape sequence injection), or might have a data size that causes a denial of service to a bastion node. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Attacker Value
Unknown

CVE-2023-5166

Disclosure Date: September 25, 2023 (last updated October 08, 2023)
Docker Desktop before 4.23.0 allows Access Token theft via a crafted extension icon URL. This issue affects Docker Desktop: before 4.23.0.
Attacker Value
Unknown

CVE-2023-5165

Disclosure Date: September 25, 2023 (last updated October 08, 2023)
Docker Desktop before 4.23.0 allows an unprivileged user to bypass Enhanced Container Isolation (ECI) restrictions via the debug shell which remains accessible for a short time window after launching Docker Desktop. The affected functionality is available for Docker Business customers only and assumes an environment where users are not granted local root or Administrator privileges. This issue has been fixed in Docker Desktop 4.23.0. Affected Docker Desktop versions: from 4.13.0 before 4.23.0.
Attacker Value
Unknown

CVE-2023-0633

Disclosure Date: September 25, 2023 (last updated October 08, 2023)
In Docker Desktop on Windows before 4.12.0 an argument injection to installer may result in local privilege escalation (LPE).This issue affects Docker Desktop: before 4.12.0.
Attacker Value
Unknown

CVE-2023-0627

Disclosure Date: September 25, 2023 (last updated October 08, 2023)
Docker Desktop 4.11.x allows --no-windows-containers flag bypass via IPC response spoofing which may lead to Local Privilege Escalation (LPE).This issue affects Docker Desktop: 4.11.X.