Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:golang/github.com/docker/docker@1.3.2
purl pkg:golang/github.com/docker/docker@1.3.2
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (3)
Vulnerability Summary Aliases
VCID-f31s-pxtj-6uej Access Restriction Bypass in Docker Docker 1.3.0 through 1.3.1 allows remote attackers to modify the default run profile of image containers and possibly bypass the container by applying unspecified security options to an image. CVE-2014-6408
GHSA-44gg-pmqr-4669
VCID-gsez-t7u3-dubr Directory Traversal in Docker Docker before 1.3.3 does not properly validate image IDs, which allows remote attackers to conduct path traversal attacks and spoof repositories via a crafted image in a (1) "docker load" operation or (2) "registry communications." CVE-2014-9358
GHSA-qmmc-jppf-32wv
VCID-smxj-2zhy-yycc Arbitrary Code Execution in Docker Docker before 1.3.2 allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation. CVE-2014-6407
GHSA-5qgp-p5jc-w2rm