Show filters
95 Total Results
Displaying 1-10 of 95
Sort by:
Attacker Value
Unknown
CVE-2024-9348
Disclosure Date: October 16, 2024 (last updated October 17, 2024)
Docker Desktop before v4.34.3 allows RCE via unsanitized GitHub source link in Build view.
0
Attacker Value
Unknown
CVE-2024-8696
Disclosure Date: September 12, 2024 (last updated September 14, 2024)
A remote code execution (RCE) vulnerability via crafted extension publisher-url/additional-urls could be abused by a malicious extension in Docker Desktop before 4.34.2.
0
Attacker Value
Unknown
CVE-2024-8695
Disclosure Date: September 12, 2024 (last updated September 14, 2024)
A remote code execution (RCE) vulnerability via crafted extension description/changelog could be abused by a malicious extension in Docker Desktop before 4.34.2.
0
Attacker Value
Unknown
CVE-2024-6222
Disclosure Date: July 09, 2024 (last updated July 13, 2024)
In Docker Desktop before v4.29.0, an attacker who has gained access to the Docker Desktop VM through a container breakout can further escape to the host by passing extensions and dashboard related IPC messages.
Docker Desktop v4.29.0 https://docs.docker.com/desktop/release-notes/#4290 fixes the issue on MacOS, Linux and Windows with Hyper-V backend.
As exploitation requires "Allow only extensions distributed through the Docker Marketplace" to be disabled, Docker Desktop v4.31.0 https://docs.docker.com/desktop/release-notes/#4310 additionally changes the default configuration to enable this setting by default.
0
Attacker Value
Unknown
CVE-2024-5652
Disclosure Date: July 09, 2024 (last updated July 13, 2024)
In Docker Desktop on Windows before v4.31.0 allows a user in the docker-users group to cause a Windows Denial-of-Service through the exec-path Docker daemon config option in Windows containers mode.
0
Attacker Value
Unknown
CVE-2023-40453
Disclosure Date: November 07, 2023 (last updated November 15, 2023)
Docker Machine through 0.16.2 allows an attacker, who has control of a worker node, to provide crafted version data, which might potentially trick an administrator into performing an unsafe action (via escape sequence injection), or might have a data size that causes a denial of service to a bastion node. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
0
Attacker Value
Unknown
CVE-2023-5166
Disclosure Date: September 25, 2023 (last updated October 08, 2023)
Docker Desktop before 4.23.0 allows Access Token theft via a crafted extension icon URL.
This issue affects Docker Desktop: before 4.23.0.
0
Attacker Value
Unknown
CVE-2023-5165
Disclosure Date: September 25, 2023 (last updated October 08, 2023)
Docker Desktop before 4.23.0 allows an unprivileged user to bypass Enhanced Container Isolation (ECI) restrictions via the debug shell which remains accessible for a short time window after launching Docker Desktop. The affected functionality is available for Docker Business customers only and assumes an environment where users are not granted local root or Administrator privileges.
This issue has been fixed in Docker Desktop 4.23.0.
Affected Docker Desktop versions: from 4.13.0 before 4.23.0.
0
Attacker Value
Unknown
CVE-2023-0633
Disclosure Date: September 25, 2023 (last updated October 08, 2023)
In Docker Desktop on Windows before 4.12.0 an argument injection to installer may result in local privilege escalation (LPE).This issue affects Docker Desktop: before 4.12.0.
0
Attacker Value
Unknown
CVE-2023-0627
Disclosure Date: September 25, 2023 (last updated October 08, 2023)
Docker Desktop 4.11.x allows --no-windows-containers flag bypass via IPC response spoofing which may lead to Local Privilege Escalation (LPE).This issue affects Docker Desktop: 4.11.X.
0