Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:golang/github.com/docker/docker@1.3.3
purl pkg:golang/github.com/docker/docker@1.3.3
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (2)
Vulnerability Summary Aliases
VCID-8uuk-1592-syg2 Path Traversal in Docker Path traversal vulnerability in Docker before 1.3.3 allows remote attackers to write to arbitrary files and bypass a container protection mechanism via a full pathname in a symlink in an (1) image or (2) build in a Dockerfile. CVE-2014-9356
GHSA-vj3f-3286-r4pf
VCID-cey6-s9jk-s7cf Arbitrary Code Execution Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction. CVE-2014-9357
GHSA-997c-fj8j-rq5h