Vulnerabilities (CVE)

Filtered by vendor Docker Subscribe
Total 105 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-20500 2 Docker, Ibm 2 Docker, Security Verify Access 2024-11-21 2.1 LOW 4.4 MEDIUM
IBM Security Verify Access Docker 10.0.0 could reveal highly sensitive information to a local privileged user. IBM X-Force ID: 197980.
CVE-2021-20499 2 Docker, Ibm 2 Docker, Security Verify Access 2024-11-21 4.0 MEDIUM 2.7 LOW
IBM Security Verify Access Docker 10.0.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 197973
CVE-2021-20498 2 Docker, Ibm 2 Docker, Security Verify Access 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
IBM Security Verify Access Docker 10.0.0 reveals version information in HTTP requests that could be used in further attacks against the system. IBM X-Force ID: 197972.
CVE-2021-20497 2 Docker, Ibm 2 Docker, Security Verify Access 2024-11-21 5.0 MEDIUM 7.5 HIGH
IBM Security Verify Access Docker 10.0.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 197969
CVE-2021-20496 2 Docker, Ibm 2 Docker, Security Verify Access 2024-11-21 4.0 MEDIUM 4.9 MEDIUM
IBM Security Verify Access Docker 10.0.0 could allow an authenticated user to bypass input due to improper input validation. IBM X-Force ID: 197966.
CVE-2020-35467 1 Docker 1 Docs 2024-11-21 10.0 HIGH 9.8 CRITICAL
The Docker Docs Docker image through 2020-12-14 contains a blank password for the root user. Systems deployed using affected versions of the Docker Docs container may allow a remote attacker to achieve root access with a blank password.
CVE-2020-35197 1 Docker 1 Memcached Docker Image 2024-11-21 10.0 HIGH 9.8 CRITICAL
The official memcached docker images before 1.5.11-alpine (Alpine specific) contain a blank password for a root user. System using the memcached docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.
CVE-2020-35196 1 Docker 1 Rabbitmq Docker Image 2024-11-21 10.0 HIGH 9.8 CRITICAL
The official rabbitmq docker images before 3.7.13-beta.1-management-alpine (Alpine specific) contain a blank password for a root user. System using the rabbitmq docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.
CVE-2020-35195 1 Docker 1 Haproxy Docker Image 2024-11-21 10.0 HIGH 9.8 CRITICAL
The official haproxy docker images before 1.8.18-alpine (Alpine specific) contain a blank password for a root user. System using the haproxy docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.
CVE-2020-35186 1 Docker 1 Adminer 2024-11-21 10.0 HIGH 9.8 CRITICAL
The official adminer docker images before 4.7.0-fastcgi contain a blank password for a root user. System using the adminer docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.
CVE-2020-35185 1 Docker 1 Ghost Alpine Docker Image 2024-11-21 10.0 HIGH 9.8 CRITICAL
The official ghost docker images before 2.16.1-alpine (Alpine specific) contain a blank password for a root user. System using the ghost docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.
CVE-2020-35184 1 Docker 1 Composer Docker Image 2024-11-21 10.0 HIGH 9.8 CRITICAL
The official composer docker images before 1.8.3 contain a blank password for a root user. System using the composer docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.
CVE-2020-29601 1 Docker 1 Notary Docker Image 2024-11-21 10.0 HIGH 9.8 CRITICAL
The official notary docker images before signer-0.6.1-1 contain a blank password for a root user. System using the notary docker container deployed by affected versions of the docker image may allow an remote attacker to achieve root access with a blank password.
CVE-2020-29591 1 Docker 1 Registry 2024-11-21 10.0 HIGH 9.8 CRITICAL
Versions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.
CVE-2020-29581 1 Docker 1 Spiped Alpine Docker Image 2024-11-21 10.0 HIGH 9.8 CRITICAL
The official spiped docker images before 1.5-alpine contain a blank password for a root user. Systems using the spiped docker container deployed by affected versions of the docker image may allow an remote attacker to achieve root access with a blank password.
CVE-2020-29580 1 Docker 1 Storm Docker Image 2024-11-21 10.0 HIGH 9.8 CRITICAL
The official storm Docker images before 1.2.1 contain a blank password for a root user. Systems using the Storm Docker container deployed by affected versions of the Docker image may allow an remote attacker to achieve root access with a blank password.
CVE-2020-29575 1 Docker 1 Elixir Alpine Docker Image 2024-11-21 10.0 HIGH 9.8 CRITICAL
The official elixir Docker images before 1.8.0-alpine (Alpine specific) contain a blank password for a root user. Systems using the elixir Linux Docker container deployed by affected versions of the Docker image may allow a remote attacker to achieve root access with a blank password.
CVE-2020-29389 1 Docker 1 Crux Linux Docker Image 2024-11-21 10.0 HIGH 9.8 CRITICAL
The official Crux Linux Docker images 3.0 through 3.4 contain a blank password for a root user. System using the Crux Linux Docker container deployed by affected versions of the Docker image may allow an attacker to achieve root access with a blank password.
CVE-2020-27534 1 Docker 1 Docker 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
util/binfmt_misc/check.go in Builder in Docker Engine before 19.03.9 calls os.OpenFile with a potentially unsafe qemu-check temporary pathname, constructed with an empty first argument in an ioutil.TempDir call.
CVE-2020-15360 1 Docker 1 Docker Desktop 2024-11-21 4.6 MEDIUM 7.8 HIGH
com.docker.vmnetd in Docker Desktop 2.3.0.3 allows privilege escalation because of a lack of client verification.