Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-cey6-s9jk-s7cf
Summary
Arbitrary Code Execution
Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction.
Aliases
0
alias CVE-2014-9357
1
alias GHSA-997c-fj8j-rq5h
Fixed_packages
0
url pkg:deb/debian/docker.io@1.3.3~dfsg1-1?distro=trixie
purl pkg:deb/debian/docker.io@1.3.3~dfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/docker.io@1.3.3~dfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/docker.io@20.10.5%2Bdfsg1-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/docker.io@20.10.5%2Bdfsg1-1%2Bdeb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1sky-21r5-3qcu
1
vulnerability VCID-6tg9-3vhh-muae
2
vulnerability VCID-8e1u-z6kg-ryhc
3
vulnerability VCID-avqu-wswg-c3ga
4
vulnerability VCID-b2qe-8u58-2qck
5
vulnerability VCID-bzeb-kj67-vfds
6
vulnerability VCID-e82r-vc77-f7bz
7
vulnerability VCID-njcw-wc13-dqcz
8
vulnerability VCID-quyf-eq2s-dbda
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/docker.io@20.10.5%252Bdfsg1-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/docker.io@20.10.24%2Bdfsg1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/docker.io@20.10.24%2Bdfsg1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1sky-21r5-3qcu
1
vulnerability VCID-6tg9-3vhh-muae
2
vulnerability VCID-8e1u-z6kg-ryhc
3
vulnerability VCID-b2qe-8u58-2qck
4
vulnerability VCID-njcw-wc13-dqcz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/docker.io@20.10.24%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/docker.io@26.1.5%2Bdfsg1-9?distro=trixie
purl pkg:deb/debian/docker.io@26.1.5%2Bdfsg1-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/docker.io@26.1.5%252Bdfsg1-9%3Fdistro=trixie
4
url pkg:deb/debian/docker.io@28.5.2%2Bdfsg3-2?distro=trixie
purl pkg:deb/debian/docker.io@28.5.2%2Bdfsg3-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/docker.io@28.5.2%252Bdfsg3-2%3Fdistro=trixie
5
url pkg:golang/github.com/docker/docker@1.3.3
purl pkg:golang/github.com/docker/docker@1.3.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/github.com/docker/docker@1.3.3
Affected_packages
0
url pkg:rpm/redhat/docker@1.4.1-37?arch=el7
purl pkg:rpm/redhat/docker@1.4.1-37?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8uuk-1592-syg2
1
vulnerability VCID-cey6-s9jk-s7cf
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/docker@1.4.1-37%3Farch=el7
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9357.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9357.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9357
reference_id
reference_type
scores
0
value 0.36182
scoring_system epss
scoring_elements 0.97095
published_at 2026-04-09T12:55:00Z
1
value 0.36182
scoring_system epss
scoring_elements 0.97118
published_at 2026-04-24T12:55:00Z
2
value 0.36182
scoring_system epss
scoring_elements 0.97117
published_at 2026-04-21T12:55:00Z
3
value 0.36182
scoring_system epss
scoring_elements 0.97112
published_at 2026-04-18T12:55:00Z
4
value 0.36182
scoring_system epss
scoring_elements 0.97109
published_at 2026-04-16T12:55:00Z
5
value 0.36182
scoring_system epss
scoring_elements 0.971
published_at 2026-04-13T12:55:00Z
6
value 0.36182
scoring_system epss
scoring_elements 0.97072
published_at 2026-04-01T12:55:00Z
7
value 0.36182
scoring_system epss
scoring_elements 0.9708
published_at 2026-04-02T12:55:00Z
8
value 0.36182
scoring_system epss
scoring_elements 0.97084
published_at 2026-04-04T12:55:00Z
9
value 0.36182
scoring_system epss
scoring_elements 0.97085
published_at 2026-04-07T12:55:00Z
10
value 0.36182
scoring_system epss
scoring_elements 0.97099
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9357
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9357
3
reference_url https://github.com/docker/docker/compare/aef842e7dfb534aba22c3c911de525ce9ac12b72...313a1b7620910e47d888f8b0a6a5eb06ad9c1ff2
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/docker/docker/compare/aef842e7dfb534aba22c3c911de525ce9ac12b72...313a1b7620910e47d888f8b0a6a5eb06ad9c1ff2
4
reference_url https://github.com/moby/moby/blob/master/CHANGELOG.md#133-2014-12-11
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/moby/moby/blob/master/CHANGELOG.md#133-2014-12-11
5
reference_url https://groups.google.com/forum/#%21msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/#%21msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ
6
reference_url https://groups.google.com/forum/#!msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/#!msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-9357
reference_id
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-9357
8
reference_url https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9357
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9357
9
reference_url http://www.securityfocus.com/archive/1/534215/100/0/threaded
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/archive/1/534215/100/0/threaded
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1172782
reference_id 1172782
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1172782
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=772909
reference_id 772909
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=772909
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:docker:docker:1.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:docker:docker:1.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:docker:docker:1.3.2:*:*:*:*:*:*:*
13
reference_url https://access.redhat.com/errata/RHSA-2015:0623
reference_id RHSA-2015:0623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0623
Weaknesses
0
cwe_id 285
name Improper Authorization
description The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
1
cwe_id 264
name Permissions, Privileges, and Access Controls
description Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Exploits
Severity_range_score7.0 - 10.0
Exploitability0.5
Weighted_severity9.0
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-cey6-s9jk-s7cf