Search for packages
| purl | pkg:golang/github.com/docker/docker@1.3.2 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-f31s-pxtj-6uej | Access Restriction Bypass in Docker Docker 1.3.0 through 1.3.1 allows remote attackers to modify the default run profile of image containers and possibly bypass the container by applying unspecified security options to an image. |
CVE-2014-6408
GHSA-44gg-pmqr-4669 |
| VCID-gsez-t7u3-dubr | Directory Traversal in Docker Docker before 1.3.3 does not properly validate image IDs, which allows remote attackers to conduct path traversal attacks and spoof repositories via a crafted image in a (1) "docker load" operation or (2) "registry communications." |
CVE-2014-9358
GHSA-qmmc-jppf-32wv |
| VCID-smxj-2zhy-yycc | Arbitrary Code Execution in Docker Docker before 1.3.2 allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation. |
CVE-2014-6407
GHSA-5qgp-p5jc-w2rm |
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T13:06:36.144042+00:00 | GithubOSV Importer | Fixing | VCID-smxj-2zhy-yycc | https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-5qgp-p5jc-w2rm/GHSA-5qgp-p5jc-w2rm.json | 38.0.0 |
| 2026-04-01T13:06:22.079740+00:00 | GithubOSV Importer | Fixing | VCID-f31s-pxtj-6uej | https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-44gg-pmqr-4669/GHSA-44gg-pmqr-4669.json | 38.0.0 |
| 2026-04-01T13:06:08.231585+00:00 | GithubOSV Importer | Fixing | VCID-gsez-t7u3-dubr | https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-qmmc-jppf-32wv/GHSA-qmmc-jppf-32wv.json | 38.0.0 |