Search for packages
| purl | pkg:rpm/redhat/docker@1.4.1-37?arch=el7 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 4.5 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-8uuk-1592-syg2
Aliases: CVE-2014-9356 GHSA-vj3f-3286-r4pf |
Path Traversal in Docker Path traversal vulnerability in Docker before 1.3.3 allows remote attackers to write to arbitrary files and bypass a container protection mechanism via a full pathname in a symlink in an (1) image or (2) build in a Dockerfile. | There are no reported fixed by versions. |
|
VCID-cey6-s9jk-s7cf
Aliases: CVE-2014-9357 GHSA-997c-fj8j-rq5h |
Arbitrary Code Execution Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction. | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T14:45:06.507807+00:00 | RedHat Importer | Affected by | VCID-cey6-s9jk-s7cf | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9357.json | 38.0.0 |
| 2026-04-01T14:45:06.486926+00:00 | RedHat Importer | Affected by | VCID-8uuk-1592-syg2 | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9356.json | 38.0.0 |