Search CVE reports


Toggle filters

31 – 40 of 62 results


CVE-2019-15752

Medium priority
Not affected

Docker Desktop Community Edition before 2.1.0.1 allows local users to gain privileges by placing a Trojan horse docker-credential-wincred.exe file in %PROGRAMDATA%\DockerDesktop\version-bin\ as a low-privilege user, and...

1 affected package

docker.io

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
docker.io Not affected
Show less packages

CVE-2019-14271

Medium priority
Not affected

In Docker 19.03.x before 19.03.1 linked against the GNU C Library (aka glibc), code injection can occur when the nsswitch facility dynamically loads a library inside a chroot that contains the contents of the container.

1 affected package

docker.io

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
docker.io Not affected
Show less packages

CVE-2019-13509

Low priority
Not affected

In Docker CE and EE before 18.09.8 (as well as Docker EE before 17.06.2-ee-23 and 18.x before 18.03.1-ee-10), Docker Engine in debug mode may sometimes add secrets to the debug log. This applies to a scenario where docker stack...

1 affected package

docker.io

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
docker.io Not affected
Show less packages

CVE-2019-13139

Medium priority
Not affected

In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the “docker build” command would be able to gain command execution. An issue exists in the way “docker build” processes remote...

1 affected package

docker.io

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
docker.io Not affected
Show less packages

CVE-2019-1020014

Low priority
Fixed

docker-credential-helpers before 0.6.3 has a double free in the List functions.

2 affected packages

golang-github-docker-docker-credential-helpers, docker.io

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
golang-github-docker-docker-credential-helpers Not affected Not affected Fixed
docker.io Not affected Not affected Fixed
Show less packages

CVE-2018-20699

Negligible priority
Fixed

Docker Engine before 18.09 allows attackers to cause a denial of service (dockerd memory consumption) via a large integer in a --cpuset-mems or --cpuset-cpus value, related to daemon/daemon_unix.go, pkg/parsers/parsers.go, and...

1 affected package

docker.io

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
docker.io Fixed
Show less packages

CVE-2018-15664

Medium priority
Fixed

In Docker through 18.06.1-ce-rc2, the API endpoints behind the ‘docker cp’ command are vulnerable to a symlink-exchange attack with Directory Traversal, giving attackers arbitrary read-write access to the host filesystem with root...

1 affected package

docker.io

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
docker.io Fixed
Show less packages

CVE-2018-12608

Low priority
Fixed

An issue was discovered in Docker Moby before 17.06.0. The Docker engine validated a client TLS certificate using both the configured client CA root certificate and all system roots on non-Windows systems. This allowed a client...

1 affected package

docker.io

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
docker.io Fixed
Show less packages

CVE-2018-10892

Medium priority

Some fixes available 3 of 4

The default OCI linux spec in oci/defaults{_linux}.go in Docker/Moby from 1.11 to current does not block /proc/acpi pathnames. The flaw allows an attacker to modify host’s hardware like enabling/disabling bluetooth or turning...

1 affected package

docker.io

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
docker.io Fixed
Show less packages

CVE-2017-16539

Medium priority

Some fixes available 3 of 5

The DefaultLinuxSpec function in oci/defaults.go in Docker Moby through 17.03.2-ce does not block /proc/scsi pathnames, which allows attackers to trigger data loss (when certain older Linux kernels are used) by leveraging Docker...

1 affected package

docker.io

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
docker.io Fixed
Show less packages