Lucene search

K

11 matches found

CVE
CVE
added 2025/04/28 8:15 p.m.87 views

CVE-2025-3224

A vulnerability in the update process of Docker Desktop for Windows versions prior to 4.41.0 could allow a local, low-privileged attacker to escalate privileges to SYSTEM. During an update, Docker Desktop attempts to delete files and subdirectories under the path C:\ProgramData\Docker\config with h...

7.8CVSS6.8AI score0.0002EPSS
CVE
CVE
added 2020/03/18 7:15 p.m.72 views

CVE-2020-10665

Docker Desktop allows local privilege escalation to NT AUTHORITY\SYSTEM because it mishandles the collection of diagnostics with Administrator privileges, leading to arbitrary DACL permissions overwrites and arbitrary file writes. This affects Docker Desktop Enterprise before 2.1.0.9, Docker Deskto...

7.2CVSS7AI score0.00636EPSS
CVE
CVE
added 2023/04/27 8:15 p.m.72 views

CVE-2022-37326

Docker Desktop for Windows before 4.6.0 allows attackers to delete (or create) any file through the dockerBackendV2 windowscontainers/start API by controlling the pidfile field inside the DaemonJSON field in the WindowsContainerStartRequest class. This can indirectly lead to privilege escalation.

7.8CVSS7.6AI score0.0004EPSS
CVE
CVE
added 2024/07/09 6:15 p.m.57 views

CVE-2024-6222

In Docker Desktop before v4.29.0, an attacker who has gained access to the Docker Desktop VM through a container breakout can further escape to the host by passing extensions and dashboard related IPC messages. Docker Desktop v4.29.0 https://docs.docker.com/desktop/release-notes/#4290 fixes the iss...

7.3CVSS6.8AI score0.00526EPSS
CVE
CVE
added 2023/04/27 8:15 p.m.56 views

CVE-2022-31647

Docker Desktop before 4.6.0 on Windows allows attackers to delete any file through the hyperv/destroy dockerBackendV2 API via a symlink in the DataFolder parameter, a different vulnerability than CVE-2022-26659.

7.1CVSS6.7AI score0.00067EPSS
CVE
CVE
added 2024/09/12 6:15 p.m.50 views

CVE-2024-8695

A remote code execution (RCE) vulnerability via crafted extension description/changelog could be abused by a malicious extension in Docker Desktop before 4.34.2.

9.8CVSS9.8AI score0.00791EPSS
CVE
CVE
added 2023/04/27 8:15 p.m.48 views

CVE-2022-34292

Docker Desktop for Windows before 4.6.0 allows attackers to overwrite any file through a symlink attack on the hyperv/create dockerBackendV2 API by controlling the DataFolder parameter for DockerDesktop.vhdx, a similar issue to CVE-2022-31647.

7.1CVSS6.9AI score0.00056EPSS
CVE
CVE
added 2024/09/12 6:15 p.m.45 views

CVE-2024-8696

A remote code execution (RCE) vulnerability via crafted extension publisher-url/additional-urls could be abused by a malicious extension in Docker Desktop before 4.34.2.

9.8CVSS9.8AI score0.00791EPSS
CVE
CVE
added 2024/07/09 5:15 p.m.43 views

CVE-2024-5652

In Docker Desktop on Windows before v4.31.0 allows a user in the docker-users group to cause a Windows Denial-of-Service through the exec-path Docker daemon config option in Windows containers mode.

6.1CVSS5.8AI score0.00052EPSS
CVE
CVE
added 2021/08/12 2:15 p.m.39 views

CVE-2021-37841

Docker Desktop before 3.6.0 suffers from incorrect access control. If a low-privileged account is able to access the server running the Windows containers, it can lead to a full container compromise in both process isolation and Hyper-V isolation modes. This security issue leads an attacker with lo...

7.8CVSS7.8AI score0.00088EPSS
CVE
CVE
added 2023/04/27 8:15 p.m.37 views

CVE-2022-38730

Docker Desktop for Windows before 4.6 allows attackers to overwrite any file through the windowscontainers/start dockerBackendV2 API by controlling the data-root field inside the DaemonJSON field in the WindowsContainerStartRequest class. This allows exploiting a symlink vulnerability in ..\dataRoo...

6.3CVSS6.2AI score0.00031EPSS