The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Docker Community Edition

Go: three vulnerabilities
An attacker can use several vulnerabilities of Go...
CVE-2018-16873, CVE-2018-16874, CVE-2018-16875, openSUSE-SU-2018:4181-1, openSUSE-SU-2018:4255-1, openSUSE-SU-2018:4306-1, openSUSE-SU-2019:0170-1, openSUSE-SU-2019:0189-1, openSUSE-SU-2019:0208-1, openSUSE-SU-2019:0295-1, openSUSE-SU-2019:1079-1, openSUSE-SU-2019:1444-1, openSUSE-SU-2019:1499-1, openSUSE-SU-2019:1506-1, openSUSE-SU-2019:1703-1, openSUSE-SU-2020:0554-1, SUSE-SU-2018:4297-1, SUSE-SU-2019:0048-1, SUSE-SU-2019:0048-2, SUSE-SU-2019:0286-1, SUSE-SU-2019:0495-1, SUSE-SU-2019:0573-1, SUSE-SU-2019:1234-1, SUSE-SU-2019:1234-2, SUSE-SU-2019:1264-1, VIGILANCE-VUL-28056
Docker Moby: privilege escalation via System Root CA Signed Certificate
An attacker can bypass restrictions via System Root CA Signed Certificate of Docker Moby, in order to escalate his privileges...
CVE-2018-12608, VIGILANCE-VUL-27199
Docker for Windows: privilege escalation via DockerBackend Named Pipe
An attacker can bypass restrictions via DockerBackend Named Pipe of Docker for Windows, in order to escalate his privileges...
CVE-2018-15514, VIGILANCE-VUL-27131
Windows Host Compute Service Shim: code execution via Container Image
An attacker can use a vulnerability via Container Image of Windows Host Compute Service Shim, in order to run code...
CVE-2018-8115, VIGILANCE-VUL-27122
Docker Moby: privilege escalation via /proc/acpi
An attacker can bypass restrictions via /proc/acpi of Docker Moby, in order to escalate his privileges...
1598581, CVE-2018-10892, FEDORA-2018-160b3d2f6c, FEDORA-2018-28f30efaf6, FEDORA-2018-6243646704, FEDORA-2018-9695e9b0ed, FEDORA-2019-723711c645, FEDORA-2019-901feba171, FEDORA-2019-a034423db8, FEDORA-2019-f5b57646b7, openSUSE-SU-2019:2021-1, RHSA-2018:2482-01, SUSE-SU-2019:2117-1, SUSE-SU-2019:2119-1, VIGILANCE-VUL-26655
Docker Moby: data loss via writes into /proc/scsi
An attacker can send commands to /proc/scsi via Docker Moby, in order to make stored data unreachable...
CVE-2017-16539, openSUSE-SU-2018:0406-1, VIGILANCE-VUL-25246
Docker Moby: denial of service via gzip decompression
An attacker can consume all disk storage via the unlimited decompression of a Gzip file by Docker Moby, in order to trigger a denial of service...
35075, CVE-2017-14992, FEDORA-2017-15efa72a0c, FEDORA-2017-3976710f1e, openSUSE-SU-2018:0406-1, VIGILANCE-VUL-24719
Docker Engine: privilege escalation via file descriptors
An attacker, inside a guest system, can use file descriptor inherited via the debug support of Docker Engine, in order to escalate his privileges on the host system...
CVE-2016-9962, FEDORA-2017-0200646669, FEDORA-2017-20cdb2063a, FEDORA-2017-c2c2d1be16, FEDORA-2017-dbc2b618eb, FEDORA-2017-fcd02e2c2d, openSUSE-SU-2017:1966-1, RHSA-2017:0116-01, RHSA-2017:0123-01, RHSA-2017:0127-01, SUSE-SU-2019:0573-1, SUSE-SU-2019:1264-1, VIGILANCE-VUL-21551
Docker Engine: privilege escalation via Ambient Capability
An attacker can bypass restrictions via Ambient Capability of Docker Engine, in order to escalate his privileges...
CVE-2016-8867, openSUSE-SU-2016:3009-1, VIGILANCE-VUL-20977
Docker: information disclosure via /proc/timer_list
An attacker can read /proc/timer_list via Docker, in order to obtain sensitive information...
VIGILANCE-VUL-20435
Our database contains other pages. You can request a free trial to read them.

Display information about Docker Community Edition: