docker CVE Vulnerabilities & Metrics

Focus on docker vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About docker Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with docker. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total docker CVEs: 75
Earliest CVE date: 11 Jul 2014, 14:55 UTC
Latest CVE date: 12 Sep 2024, 18:15 UTC

Latest CVE reference: CVE-2024-8696

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 4

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -71.43%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -71.43%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical docker CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 4.94

Max CVSS: 10.0

Critical CVEs (≥9): 16

CVSS Range vs. Count

Range Count
0.0-3.9 25
4.0-6.9 30
7.0-8.9 10
9.0-10.0 16

CVSS Distribution Chart

Top 5 Highest CVSS docker CVEs

These are the five CVEs with the highest CVSS scores for docker, sorted by severity first and recency.

All CVEs for docker

CVE-2024-8696 docker vulnerability CVSS: 0 12 Sep 2024, 18:15 UTC

A remote code execution (RCE) vulnerability via crafted extension publisher-url/additional-urls could be abused by a malicious extension in Docker Desktop before 4.34.2.

CVE-2024-8695 docker vulnerability CVSS: 0 12 Sep 2024, 18:15 UTC

A remote code execution (RCE) vulnerability via crafted extension description/changelog could be abused by a malicious extension in Docker Desktop before 4.34.2.

CVE-2024-6222 docker vulnerability CVSS: 0 09 Jul 2024, 18:15 UTC

In Docker Desktop before v4.29.0, an attacker who has gained access to the Docker Desktop VM through a container breakout can further escape to the host by passing extensions and dashboard related IPC messages. Docker Desktop v4.29.0 https://docs.docker.com/desktop/release-notes/#4290 fixes the issue on MacOS, Linux and Windows with Hyper-V backend. As exploitation requires "Allow only extensions distributed through the Docker Marketplace" to be disabled, Docker Desktop  v4.31.0 https://docs.docker.com/desktop/release-notes/#4310  additionally changes the default configuration to enable this setting by default.

CVE-2024-5652 docker vulnerability CVSS: 0 09 Jul 2024, 17:15 UTC

In Docker Desktop on Windows before v4.31.0 allows a user in the docker-users group to cause a Windows Denial-of-Service through the exec-path Docker daemon config option in Windows containers mode.

CVE-2023-40453 docker vulnerability CVSS: 0 07 Nov 2023, 04:20 UTC

Docker Machine through 0.16.2 allows an attacker, who has control of a worker node, to provide crafted version data, which might potentially trick an administrator into performing an unsafe action (via escape sequence injection), or might have a data size that causes a denial of service to a bastion node. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

CVE-2023-5166 docker vulnerability CVSS: 0 25 Sep 2023, 16:15 UTC

Docker Desktop before 4.23.0 allows Access Token theft via a crafted extension icon URL. This issue affects Docker Desktop: before 4.23.0.

CVE-2023-5165 docker vulnerability CVSS: 0 25 Sep 2023, 16:15 UTC

Docker Desktop before 4.23.0 allows an unprivileged user to bypass Enhanced Container Isolation (ECI) restrictions via the debug shell which remains accessible for a short time window after launching Docker Desktop. The affected functionality is available for Docker Business customers only and assumes an environment where users are not granted local root or Administrator privileges. This issue has been fixed in Docker Desktop 4.23.0. Affected Docker Desktop versions: from 4.13.0 before 4.23.0.

CVE-2023-0633 docker vulnerability CVSS: 0 25 Sep 2023, 16:15 UTC

In Docker Desktop on Windows before 4.12.0 an argument injection to installer may result in local privilege escalation (LPE).This issue affects Docker Desktop: before 4.12.0.

CVE-2023-0627 docker vulnerability CVSS: 0 25 Sep 2023, 16:15 UTC

Docker Desktop 4.11.x allows --no-windows-containers flag bypass via IPC response spoofing which may lead to Local Privilege Escalation (LPE).This issue affects Docker Desktop: 4.11.X.

CVE-2023-0626 docker vulnerability CVSS: 0 25 Sep 2023, 16:15 UTC

Docker Desktop before 4.12.0 is vulnerable to RCE via query parameters in message-box route. This issue affects Docker Desktop: before 4.12.0.

CVE-2023-0625 docker vulnerability CVSS: 0 25 Sep 2023, 16:15 UTC

Docker Desktop before 4.12.0 is vulnerable to RCE via a crafted extension description or changelog. This issue affects Docker Desktop: before 4.12.0.

CVE-2022-38730 docker vulnerability CVSS: 0 27 Apr 2023, 20:15 UTC

Docker Desktop for Windows before 4.6 allows attackers to overwrite any file through the windowscontainers/start dockerBackendV2 API by controlling the data-root field inside the DaemonJSON field in the WindowsContainerStartRequest class. This allows exploiting a symlink vulnerability in ..\dataRoot\network\files\local-kv.db because of a TOCTOU race condition.

CVE-2022-37326 docker vulnerability CVSS: 0 27 Apr 2023, 20:15 UTC

Docker Desktop for Windows before 4.6.0 allows attackers to delete (or create) any file through the dockerBackendV2 windowscontainers/start API by controlling the pidfile field inside the DaemonJSON field in the WindowsContainerStartRequest class. This can indirectly lead to privilege escalation.

CVE-2022-34292 docker vulnerability CVSS: 0 27 Apr 2023, 20:15 UTC

Docker Desktop for Windows before 4.6.0 allows attackers to overwrite any file through a symlink attack on the hyperv/create dockerBackendV2 API by controlling the DataFolder parameter for DockerDesktop.vhdx, a similar issue to CVE-2022-31647.

CVE-2022-31647 docker vulnerability CVSS: 0 27 Apr 2023, 20:15 UTC

Docker Desktop before 4.6.0 on Windows allows attackers to delete any file through the hyperv/destroy dockerBackendV2 API via a symlink in the DataFolder parameter, a different vulnerability than CVE-2022-26659.

CVE-2023-1802 docker vulnerability CVSS: 0 06 Apr 2023, 09:15 UTC

In Docker Desktop 4.17.x the Artifactory Integration falls back to sending registry credentials over plain HTTP if the HTTPS health check has failed. A targeted network sniffing attack can lead to a disclosure of sensitive information. Only users who have Access Experimental Features enabled and have logged in to a private registry are affected.

CVE-2023-0629 docker vulnerability CVSS: 0 13 Mar 2023, 12:15 UTC

Docker Desktop before 4.17.0 allows an unprivileged user to bypass Enhanced Container Isolation (ECI) restrictions by setting the Docker host to docker.raw.sock, or npipe:////.pipe/docker_engine_linux on Windows, via the -H (--host) CLI flag or the DOCKER_HOST environment variable and launch containers without the additional hardening features provided by ECI. This would not affect already running containers, nor containers launched through the usual approach (without Docker's raw socket). The affected functionality is available for Docker Business customers only and assumes an environment where users are not granted local root or Administrator privileges. This issue has been fixed in Docker Desktop 4.17.0. Affected Docker Desktop versions: from 4.13.0 before 4.17.0.

CVE-2023-0628 docker vulnerability CVSS: 0 13 Mar 2023, 12:15 UTC

Docker Desktop before 4.17.0 allows an attacker to execute an arbitrary command inside a Dev Environments container during initialization by tricking a user to open a crafted malicious docker-desktop:// URL.

CVE-2021-44719 docker vulnerability CVSS: 6.6 25 May 2022, 16:15 UTC

Docker Desktop 4.3.0 has Incorrect Access Control.

CVE-2022-26659 docker vulnerability CVSS: 3.6 25 Mar 2022, 21:15 UTC

Docker Desktop installer on Windows in versions before 4.6.0 allows an attacker to overwrite any administrator writable files by creating a symlink in place of where the installer writes its log file. Starting from version 4.6.0, the Docker Desktop installer, when run elevated, will write its log files to a location not writable by non-administrator users.

CVE-2022-25365 docker vulnerability CVSS: 4.6 19 Feb 2022, 02:15 UTC

Docker Desktop before 4.5.1 on Windows allows attackers to move arbitrary files. NOTE: this issue exists because of an incomplete fix for CVE-2022-23774.

CVE-2022-23774 docker vulnerability CVSS: 5.0 01 Feb 2022, 06:15 UTC

Docker Desktop before 4.4.4 on Windows allows attackers to move arbitrary files.

CVE-2021-45449 docker vulnerability CVSS: 2.1 12 Jan 2022, 20:15 UTC

Docker Desktop version 4.3.0 and 4.3.1 has a bug that may log sensitive information (access token or password) on the user's machine during login. This only affects users if they are on Docker Desktop 4.3.0, 4.3.1 and the user has logged in while on 4.3.0, 4.3.1. Gaining access to this data would require having access to the user’s local files.

CVE-2021-41092 docker vulnerability CVSS: 5.0 04 Oct 2021, 20:15 UTC

Docker CLI is the command line interface for the docker container runtime. A bug was found in the Docker CLI where running `docker login my-private-registry.example.com` with a misconfigured configuration file (typically `~/.docker/config.json`) listing a `credsStore` or `credHelpers` that could not be executed would result in any provided credentials being sent to `registry-1.docker.io` rather than the intended private registry. This bug has been fixed in Docker CLI 20.10.9. Users should update to this version as soon as possible. For users unable to update ensure that any configured credsStore or credHelpers entries in the configuration file reference an installed credential helper that is executable and on the PATH.

CVE-2021-37841 docker vulnerability CVSS: 4.6 12 Aug 2021, 14:15 UTC

Docker Desktop before 3.6.0 suffers from incorrect access control. If a low-privileged account is able to access the server running the Windows containers, it can lead to a full container compromise in both process isolation and Hyper-V isolation modes. This security issue leads an attacker with low privilege to read, write and possibly even execute code inside the containers.

CVE-2021-21285 docker vulnerability CVSS: 4.3 02 Feb 2021, 18:15 UTC

In Docker before versions 9.03.15, 20.10.3 there is a vulnerability in which pulling an intentionally malformed Docker image manifest crashes the dockerd daemon. Versions 20.10.3 and 19.03.15 contain patches that prevent the daemon from crashing.

CVE-2021-21284 docker vulnerability CVSS: 2.7 02 Feb 2021, 18:15 UTC

In Docker before versions 9.03.15, 20.10.3 there is a vulnerability involving the --userns-remap option in which access to remapped root allows privilege escalation to real root. When using "--userns-remap", if the root user in the remapped namespace has access to the host filesystem they can modify files under "/var/lib/docker/<remapping>" that cause writing files with extended privileges. Versions 20.10.3 and 19.03.15 contain patches that prevent privilege escalation from remapped user.

CVE-2021-3162 docker vulnerability CVSS: 4.6 15 Jan 2021, 22:15 UTC

Docker Desktop Community before 2.5.0.0 on macOS mishandles certificate checking, leading to local privilege escalation.

CVE-2020-27534 docker vulnerability CVSS: 5.0 30 Dec 2020, 23:15 UTC

util/binfmt_misc/check.go in Builder in Docker Engine before 19.03.9 calls os.OpenFile with a potentially unsafe qemu-check temporary pathname, constructed with an empty first argument in an ioutil.TempDir call.

CVE-2020-35197 docker vulnerability CVSS: 10.0 17 Dec 2020, 02:15 UTC

The official memcached docker images before 1.5.11-alpine (Alpine specific) contain a blank password for a root user. System using the memcached docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.

CVE-2020-35196 docker vulnerability CVSS: 10.0 17 Dec 2020, 02:15 UTC

The official rabbitmq docker images before 3.7.13-beta.1-management-alpine (Alpine specific) contain a blank password for a root user. System using the rabbitmq docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.

CVE-2020-35195 docker vulnerability CVSS: 10.0 17 Dec 2020, 02:15 UTC

The official haproxy docker images before 1.8.18-alpine (Alpine specific) contain a blank password for a root user. System using the haproxy docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.

CVE-2020-35186 docker vulnerability CVSS: 10.0 17 Dec 2020, 02:15 UTC

The official adminer docker images before 4.7.0-fastcgi contain a blank password for a root user. System using the adminer docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.

CVE-2020-35184 docker vulnerability CVSS: 10.0 17 Dec 2020, 02:15 UTC

The official composer docker images before 1.8.3 contain a blank password for a root user. System using the composer docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.

CVE-2020-35185 docker vulnerability CVSS: 10.0 17 Dec 2020, 01:15 UTC

The official ghost docker images before 2.16.1-alpine (Alpine specific) contain a blank password for a root user. System using the ghost docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.

CVE-2020-35467 docker vulnerability CVSS: 10.0 15 Dec 2020, 23:15 UTC

The Docker Docs Docker image through 2020-12-14 contains a blank password for the root user. Systems deployed using affected versions of the Docker Docs container may allow a remote attacker to achieve root access with a blank password.

CVE-2020-29591 docker vulnerability CVSS: 10.0 11 Dec 2020, 15:15 UTC

Versions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.

CVE-2020-29601 docker vulnerability CVSS: 10.0 08 Dec 2020, 16:15 UTC

The official notary docker images before signer-0.6.1-1 contain a blank password for a root user. System using the notary docker container deployed by affected versions of the docker image may allow an remote attacker to achieve root access with a blank password.

CVE-2020-29581 docker vulnerability CVSS: 10.0 08 Dec 2020, 16:15 UTC

The official spiped docker images before 1.5-alpine contain a blank password for a root user. Systems using the spiped docker container deployed by affected versions of the docker image may allow an remote attacker to achieve root access with a blank password.

CVE-2020-29580 docker vulnerability CVSS: 10.0 08 Dec 2020, 16:15 UTC

The official storm Docker images before 1.2.1 contain a blank password for a root user. Systems using the Storm Docker container deployed by affected versions of the Docker image may allow an remote attacker to achieve root access with a blank password.

CVE-2020-29575 docker vulnerability CVSS: 10.0 08 Dec 2020, 16:15 UTC

The official elixir Docker images before 1.8.0-alpine (Alpine specific) contain a blank password for a root user. Systems using the elixir Linux Docker container deployed by affected versions of the Docker image may allow a remote attacker to achieve root access with a blank password.

CVE-2020-29389 docker vulnerability CVSS: 10.0 02 Dec 2020, 17:15 UTC

The official Crux Linux Docker images 3.0 through 3.4 contain a blank password for a root user. System using the Crux Linux Docker container deployed by affected versions of the Docker image may allow an attacker to achieve root access with a blank password.

CVE-2020-14300 docker vulnerability CVSS: 4.6 13 Jul 2020, 22:15 UTC

The docker packages version docker-1.13.1-108.git4ef4b30.el7 as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 (https://access.redhat.com/errata/RHBA-2020:0053) included an incorrect version of runc that was missing multiple bug and security fixes. One of the fixes regressed in that update was the fix for CVE-2016-9962, that was previously corrected in the docker packages in Red Hat Enterprise Linux 7 Extras via RHSA-2017:0116 (https://access.redhat.com/errata/RHSA-2017:0116). The CVE-2020-14300 was assigned to this security regression and it is specific to the docker packages produced by Red Hat. The original issue - CVE-2016-9962 - could possibly allow a process inside container to compromise a process entering container namespace and execute arbitrary code outside of the container. This could lead to compromise of the container host or other containers running on the same container host. This issue only affects a single version of Docker, 1.13.1-108.git4ef4b30, shipped in Red Hat Enterprise Linux 7. Both earlier and later versions are not affected.

CVE-2020-14298 docker vulnerability CVSS: 4.6 13 Jul 2020, 21:15 UTC

The version of docker as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 advisory included an incorrect version of runc missing the fix for CVE-2019-5736, which was previously fixed via RHSA-2019:0304. This issue could allow a malicious or compromised container to compromise the container host and other containers running on the same host. This issue only affects docker version 1.13.1-108.git4ef4b30.el7, shipped in Red Hat Enterprise Linux 7 Extras. Both earlier and later versions are not affected.

CVE-2020-15360 docker vulnerability CVSS: 4.6 27 Jun 2020, 13:15 UTC

com.docker.vmnetd in Docker Desktop 2.3.0.3 allows privilege escalation because of a lack of client verification.

CVE-2020-11492 docker vulnerability CVSS: 7.2 05 Jun 2020, 14:15 UTC

An issue was discovered in Docker Desktop through 2.2.0.5 on Windows. If a local attacker sets up their own named pipe prior to starting Docker with the same name, this attacker can intercept a connection attempt from Docker Service (which runs as SYSTEM), and then impersonate their privileges.

CVE-2020-13401 docker vulnerability CVSS: 6.0 02 Jun 2020, 14:15 UTC

An issue was discovered in Docker Engine before 19.03.11. An attacker in a container, with the CAP_NET_RAW capability, can craft IPv6 router advertisements, and consequently spoof external IPv6 hosts, obtain sensitive information, or cause a denial of service.

CVE-2020-10665 docker vulnerability CVSS: 7.2 18 Mar 2020, 19:15 UTC

Docker Desktop allows local privilege escalation to NT AUTHORITY\SYSTEM because it mishandles the collection of diagnostics with Administrator privileges, leading to arbitrary DACL permissions overwrites and arbitrary file writes. This affects Docker Desktop Enterprise before 2.1.0.9, Docker Desktop for Windows Stable before 2.2.0.4, and Docker Desktop for Windows Edge before 2.2.2.0.

CVE-2014-5278 docker vulnerability CVSS: 4.3 07 Feb 2020, 18:15 UTC

A vulnerability exists in Docker before 1.2 via container names, which may collide with and override container IDs.

CVE-2014-0048 docker vulnerability CVSS: 7.5 02 Jan 2020, 17:15 UTC

An issue was found in Docker before 1.6.0. Some programs and scripts in Docker are downloaded via HTTP and then executed or used in unsafe ways.

CVE-2014-8179 docker vulnerability CVSS: 5.0 17 Dec 2019, 18:15 UTC

Docker Engine before 1.8.3 and CS Docker Engine before 1.6.2-CS7 does not properly validate and extract the manifest object from its JSON representation during a pull, which allows attackers to inject new attributes in a JSON object and bypass pull-by-digest validation.

CVE-2014-8178 docker vulnerability CVSS: 1.9 17 Dec 2019, 14:15 UTC

Docker Engine before 1.8.3 and CS Docker Engine before 1.6.2-CS7 do not use a globally unique identifier to store image layers, which makes it easier for attackers to poison the image cache via a crafted image in pull or push commands.

CVE-2014-9356 docker vulnerability CVSS: 8.5 02 Dec 2019, 18:15 UTC

Path traversal vulnerability in Docker before 1.3.3 allows remote attackers to write to arbitrary files and bypass a container protection mechanism via a full pathname in a symlink in an (1) image or (2) build in a Dockerfile.

CVE-2019-16884 docker vulnerability CVSS: 5.0 25 Sep 2019, 18:15 UTC

runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.

CVE-2019-15752 docker vulnerability CVSS: 9.3 28 Aug 2019, 21:15 UTC

Docker Desktop Community Edition before 2.1.0.1 allows local users to gain privileges by placing a Trojan horse docker-credential-wincred.exe file in %PROGRAMDATA%\DockerDesktop\version-bin\ as a low-privilege user, and then waiting for an admin or service user to authenticate with Docker, restart Docker, or run 'docker login' to force the command.

CVE-2019-13139 docker vulnerability CVSS: 4.6 22 Aug 2019, 20:15 UTC

In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag.

CVE-2019-14271 docker vulnerability CVSS: 7.5 29 Jul 2019, 18:15 UTC

In Docker 19.03.x before 19.03.1 linked against the GNU C Library (aka glibc), code injection can occur when the nsswitch facility dynamically loads a library inside a chroot that contains the contents of the container.

CVE-2019-1020014 docker vulnerability CVSS: 2.1 29 Jul 2019, 13:15 UTC

docker-credential-helpers before 0.6.3 has a double free in the List functions.

CVE-2019-13509 docker vulnerability CVSS: 5.0 18 Jul 2019, 16:15 UTC

In Docker CE and EE before 18.09.8 (as well as Docker EE before 17.06.2-ee-23 and 18.x before 18.03.1-ee-10), Docker Engine in debug mode may sometimes add secrets to the debug log. This applies to a scenario where docker stack deploy is run to redeploy a stack that includes (non external) secrets. It potentially applies to other API users of the stack API if they resend the secret.

CVE-2018-15664 docker vulnerability CVSS: 6.2 23 May 2019, 14:29 UTC

In Docker through 18.06.1-ce-rc2, the API endpoints behind the 'docker cp' command are vulnerable to a symlink-exchange attack with Directory Traversal, giving attackers arbitrary read-write access to the host filesystem with root privileges, because daemon/archive.go does not do archive operations on a frozen filesystem (or from within a chroot).

CVE-2019-5736 docker vulnerability CVSS: 9.3 11 Feb 2019, 19:29 UTC

runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.

CVE-2018-20699 docker vulnerability CVSS: 4.0 12 Jan 2019, 02:29 UTC

Docker Engine before 18.09 allows attackers to cause a denial of service (dockerd memory consumption) via a large integer in a --cpuset-mems or --cpuset-cpus value, related to daemon/daemon_unix.go, pkg/parsers/parsers.go, and pkg/sysinfo/sysinfo.go.

CVE-2018-15514 docker vulnerability CVSS: 6.5 01 Sep 2018, 01:29 UTC

HandleRequestAsync in Docker for Windows before 18.06.0-ce-rc3-win68 (edge) and before 18.06.0-ce-win72 (stable) deserialized requests over the \\.\pipe\dockerBackend named pipe without verifying the validity of the deserialized .NET objects. This would allow a malicious user in the "docker-users" group (who may not otherwise have administrator access) to escalate to administrator privileges.

CVE-2018-10892 docker vulnerability CVSS: 5.0 06 Jul 2018, 16:29 UTC

The default OCI linux spec in oci/defaults{_linux}.go in Docker/Moby from 1.11 to current does not block /proc/acpi pathnames. The flaw allows an attacker to modify host's hardware like enabling/disabling bluetooth or turning up/down keyboard brightness.

CVE-2014-5282 docker vulnerability CVSS: 5.5 06 Feb 2018, 16:29 UTC

Docker before 1.3 does not properly validate image IDs, which allows remote attackers to redirect to another image through the loading of untrusted images via 'docker load'.

CVE-2017-14992 docker vulnerability CVSS: 4.3 01 Nov 2017, 17:29 UTC

Lack of content verification in Docker-CE (Also known as Moby) versions 1.12.6-0, 1.10.3, 17.03.0, 17.03.1, 17.03.2, 17.06.0, 17.06.1, 17.06.2, 17.09.0, and earlier allows a remote attacker to cause a Denial of Service via a crafted image layer payload, aka gzip bombing.

CVE-2014-0047 docker vulnerability CVSS: 4.6 06 Oct 2017, 15:29 UTC

Docker before 1.5 allows local users to have unspecified impact via vectors involving unsafe /tmp usage.

CVE-2016-9962 docker vulnerability CVSS: 4.4 31 Jan 2017, 22:59 UTC

RunC allowed additional container processes via 'runc exec' to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to container escapes or modification of runC state before the process is fully placed inside the container.

CVE-2016-6595 docker vulnerability CVSS: 4.0 04 Jan 2017, 20:59 UTC

The SwarmKit toolkit 1.12.0 for Docker allows remote authenticated users to cause a denial of service (prevention of cluster joins) via a long sequence of join and quit actions. NOTE: the vendor disputes this issue, stating that this sequence is not "removing the state that is left by old nodes. At some point the manager obviously stops being able to accept new nodes, since it runs out of memory. Given that both for Docker swarm and for Docker Swarmkit nodes are *required* to provide a secret token (it's actually the only mode of operation), this means that no adversary can simply join nodes and exhaust manager resources. We can't do anything about a manager running out of memory and not being able to add new legitimate nodes to the system. This is merely a resource provisioning issue, and definitely not a CVE worthy vulnerability.

CVE-2016-8867 docker vulnerability CVSS: 5.0 28 Oct 2016, 15:59 UTC

Docker Engine 1.12.2 enabled ambient capabilities with misconfigured capability policies. This allowed malicious images to bypass user permissions to access files within the container filesystem or mounted volumes.

CVE-2016-3697 docker vulnerability CVSS: 2.1 01 Jun 2016, 20:59 UTC

libcontainer/user/user.go in runC before 0.1.0, as used in Docker before 1.11.2, improperly treats a numeric UID as a potential username, which allows local users to gain privileges via a numeric username in the password file in a container.

CVE-2015-3631 docker vulnerability CVSS: 3.6 18 May 2015, 15:59 UTC

Docker Engine before 1.6.1 allows local users to set arbitrary Linux Security Modules (LSM) and docker_t policies via an image that allows volumes to override files in /proc.

CVE-2015-3630 docker vulnerability CVSS: 7.2 18 May 2015, 15:59 UTC

Docker Engine before 1.6.1 uses weak permissions for (1) /proc/asound, (2) /proc/timer_stats, (3) /proc/latency_stats, and (4) /proc/fs, which allows local users to modify the host, obtain sensitive information, and perform protocol downgrade attacks via a crafted image.

CVE-2015-3629 docker vulnerability CVSS: 7.2 18 May 2015, 15:59 UTC

Libcontainer 1.6.0, as used in Docker Engine, allows local users to escape containerization ("mount namespace breakout") and write to arbitrary file on the host system via a symlink attack in an image when respawning a container.

CVE-2015-3627 docker vulnerability CVSS: 7.2 18 May 2015, 15:59 UTC

Libcontainer and Docker Engine before 1.6.1 opens the file-descriptor passed to the pid-1 process before performing the chroot, which allows local users to gain privileges via a symlink attack in an image.

CVE-2014-9358 docker vulnerability CVSS: 6.4 16 Dec 2014, 18:59 UTC

Docker before 1.3.3 does not properly validate image IDs, which allows remote attackers to conduct path traversal attacks and spoof repositories via a crafted image in a (1) "docker load" operation or (2) "registry communications."

CVE-2014-9357 docker vulnerability CVSS: 10.0 16 Dec 2014, 18:59 UTC

Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction.

CVE-2014-6408 docker vulnerability CVSS: 5.0 12 Dec 2014, 15:59 UTC

Docker 1.3.0 through 1.3.1 allows remote attackers to modify the default run profile of image containers and possibly bypass the container by applying unspecified security options to an image.

CVE-2014-6407 docker vulnerability CVSS: 7.5 12 Dec 2014, 15:59 UTC

Docker before 1.3.2 allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation.

CVE-2014-5277 docker vulnerability CVSS: 5.0 17 Nov 2014, 16:59 UTC

Docker before 1.3.1 and docker-py before 0.5.3 fall back to HTTP when the HTTPS connection to the registry fails, which allows man-in-the-middle attackers to conduct downgrade attacks and obtain authentication and image data by leveraging a network position between the client and the registry to block HTTPS traffic.

CVE-2014-3499 docker vulnerability CVSS: 7.2 11 Jul 2014, 14:55 UTC

Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.