Lucene search

K

6 matches found

CVE
CVE
added 2018/07/06 4:29 p.m.4910 views

CVE-2018-10892

The default OCI linux spec in oci/defaults{_linux}.go in Docker/Moby from 1.11 to current does not block /proc/acpi pathnames. The flaw allows an attacker to modify host's hardware like enabling/disabling bluetooth or turning up/down keyboard brightness.

6.3CVSS5.3AI score0.00189EPSS
CVE
CVE
added 2021/02/02 6:15 p.m.262 views

CVE-2021-21284

In Docker before versions 9.03.15, 20.10.3 there is a vulnerability involving the --userns-remap option in which access to remapped root allows privilege escalation to real root. When using "--userns-remap", if the root user in the remapped namespace has access to the host filesystem they can modif...

6.8CVSS6.9AI score0.00032EPSS
CVE
CVE
added 2021/02/02 6:15 p.m.256 views

CVE-2021-21285

In Docker before versions 9.03.15, 20.10.3 there is a vulnerability in which pulling an intentionally malformed Docker image manifest crashes the dockerd daemon. Versions 20.10.3 and 19.03.15 contain patches that prevent the daemon from crashing.

6.5CVSS6.6AI score0.00142EPSS
CVE
CVE
added 2017/11/01 5:29 p.m.107 views

CVE-2017-14992

Lack of content verification in Docker-CE (Also known as Moby) versions 1.12.6-0, 1.10.3, 17.03.0, 17.03.1, 17.03.2, 17.06.0, 17.06.1, 17.06.2, 17.09.0, and earlier allows a remote attacker to cause a Denial of Service via a crafted image layer payload, aka gzip bombing.

6.5CVSS5.5AI score0.00312EPSS
CVE
CVE
added 2017/01/31 10:59 p.m.93 views

CVE-2016-9962

RunC allowed additional container processes via 'runc exec' to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to container escapes or modi...

6.4CVSS6.6AI score0.00208EPSS
CVE
CVE
added 2014/12/16 6:59 p.m.64 views

CVE-2014-9358

Docker before 1.3.3 does not properly validate image IDs, which allows remote attackers to conduct path traversal attacks and spoof repositories via a crafted image in a (1) "docker load" operation or (2) "registry communications."

6.4CVSS8.1AI score0.00259EPSS