Search for packages
| purl | pkg:rpm/redhat/docker@1.3.2-4?arch=el7 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-gsez-t7u3-dubr
Aliases: CVE-2014-9358 GHSA-qmmc-jppf-32wv |
Directory Traversal in Docker Docker before 1.3.3 does not properly validate image IDs, which allows remote attackers to conduct path traversal attacks and spoof repositories via a crafted image in a (1) "docker load" operation or (2) "registry communications." | There are no reported fixed by versions. |
|
VCID-smxj-2zhy-yycc
Aliases: CVE-2014-6407 GHSA-5qgp-p5jc-w2rm |
Arbitrary Code Execution in Docker Docker before 1.3.2 allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation. | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T14:45:16.409742+00:00 | RedHat Importer | Affected by | VCID-smxj-2zhy-yycc | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6407.json | 38.0.0 |
| 2026-04-01T14:45:06.528818+00:00 | RedHat Importer | Affected by | VCID-gsez-t7u3-dubr | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9358.json | 38.0.0 |