Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-ksbt-33eq-93c9
Summary
Arbitrary File Write in Libcontainer
Libcontainer 1.6.0, as used in Docker Engine, allows local users to escape containerization ("mount namespace breakout") and write to arbitrary file on the host system via a symlink attack in an image when respawning a container.
Aliases
0
alias CVE-2015-3629
1
alias GHSA-g44j-7vp3-68cv
Fixed_packages
0
url pkg:deb/debian/docker.io@1.6.1%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/docker.io@1.6.1%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/docker.io@1.6.1%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/docker.io@20.10.5%2Bdfsg1-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/docker.io@20.10.5%2Bdfsg1-1%2Bdeb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1sky-21r5-3qcu
1
vulnerability VCID-6tg9-3vhh-muae
2
vulnerability VCID-8e1u-z6kg-ryhc
3
vulnerability VCID-avqu-wswg-c3ga
4
vulnerability VCID-b2qe-8u58-2qck
5
vulnerability VCID-bzeb-kj67-vfds
6
vulnerability VCID-e82r-vc77-f7bz
7
vulnerability VCID-njcw-wc13-dqcz
8
vulnerability VCID-quyf-eq2s-dbda
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/docker.io@20.10.5%252Bdfsg1-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/docker.io@20.10.24%2Bdfsg1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/docker.io@20.10.24%2Bdfsg1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1sky-21r5-3qcu
1
vulnerability VCID-6tg9-3vhh-muae
2
vulnerability VCID-8e1u-z6kg-ryhc
3
vulnerability VCID-b2qe-8u58-2qck
4
vulnerability VCID-njcw-wc13-dqcz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/docker.io@20.10.24%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/docker.io@26.1.5%2Bdfsg1-9?distro=trixie
purl pkg:deb/debian/docker.io@26.1.5%2Bdfsg1-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/docker.io@26.1.5%252Bdfsg1-9%3Fdistro=trixie
4
url pkg:deb/debian/docker.io@28.5.2%2Bdfsg3-2?distro=trixie
purl pkg:deb/debian/docker.io@28.5.2%2Bdfsg3-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/docker.io@28.5.2%252Bdfsg3-2%3Fdistro=trixie
5
url pkg:golang/github.com/docker/docker@1.6.1
purl pkg:golang/github.com/docker/docker@1.6.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/github.com/docker/docker@1.6.1
Affected_packages
0
url pkg:rpm/redhat/docker@1.6.2-14?arch=el7
purl pkg:rpm/redhat/docker@1.6.2-14?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4mf3-mmz6-2kfs
1
vulnerability VCID-6gxe-db4h-93ex
2
vulnerability VCID-ksbt-33eq-93c9
3
vulnerability VCID-nkhu-t2nh-s7b2
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/docker@1.6.2-14%3Farch=el7
References
0
reference_url http://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html
1
reference_url http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3629.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3629.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3629
reference_id
reference_type
scores
0
value 0.00178
scoring_system epss
scoring_elements 0.39476
published_at 2026-04-16T12:55:00Z
1
value 0.00178
scoring_system epss
scoring_elements 0.39425
published_at 2026-04-13T12:55:00Z
2
value 0.00178
scoring_system epss
scoring_elements 0.39442
published_at 2026-04-12T12:55:00Z
3
value 0.00178
scoring_system epss
scoring_elements 0.3948
published_at 2026-04-11T12:55:00Z
4
value 0.00178
scoring_system epss
scoring_elements 0.39469
published_at 2026-04-09T12:55:00Z
5
value 0.00178
scoring_system epss
scoring_elements 0.39454
published_at 2026-04-08T12:55:00Z
6
value 0.00178
scoring_system epss
scoring_elements 0.3946
published_at 2026-04-02T12:55:00Z
7
value 0.00178
scoring_system epss
scoring_elements 0.3917
published_at 2026-04-24T12:55:00Z
8
value 0.00178
scoring_system epss
scoring_elements 0.39362
published_at 2026-04-21T12:55:00Z
9
value 0.00178
scoring_system epss
scoring_elements 0.39448
published_at 2026-04-18T12:55:00Z
10
value 0.00178
scoring_system epss
scoring_elements 0.39299
published_at 2026-04-01T12:55:00Z
11
value 0.00178
scoring_system epss
scoring_elements 0.39398
published_at 2026-04-07T12:55:00Z
12
value 0.00178
scoring_system epss
scoring_elements 0.39484
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3629
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3629
5
reference_url http://seclists.org/fulldisclosure/2015/May/28
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://seclists.org/fulldisclosure/2015/May/28
6
reference_url https://github.com/docker/docker/commit/d5ebb60bddbabea0439213501f4f6ed494b23cba
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/docker/docker/commit/d5ebb60bddbabea0439213501f4f6ed494b23cba
7
reference_url https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ
8
reference_url https://groups.google.com/forum/#!searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/#!searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-3629
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2015-3629
10
reference_url https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3629
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3629
11
reference_url http://www.securityfocus.com/bid/74558
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/74558
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1219058
reference_id 1219058
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1219058
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784726
reference_id 784726
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784726
Weaknesses
0
cwe_id 59
name Improper Link Resolution Before File Access ('Link Following')
description The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
1
cwe_id 22
name Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
description The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Exploits
Severity_range_score7.0 - 8.9
Exploitability0.5
Weighted_severity8.0
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-ksbt-33eq-93c9