Docker

Desktop

21 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.69%
  • Veröffentlicht 12.09.2024 18:15:11
  • Zuletzt bearbeitet 13.09.2024 16:01:22

A remote code execution (RCE) vulnerability via crafted extension publisher-url/additional-urls could be abused by a malicious extension in Docker Desktop before 4.34.2.

  • EPSS 2.69%
  • Veröffentlicht 12.09.2024 18:15:11
  • Zuletzt bearbeitet 13.09.2024 16:01:31

A remote code execution (RCE) vulnerability via crafted extension description/changelog could be abused by a malicious extension in Docker Desktop before 4.34.2.

  • EPSS 2.05%
  • Veröffentlicht 09.07.2024 18:15:12
  • Zuletzt bearbeitet 21.11.2024 09:49:13

In Docker Desktop before v4.29.0, an attacker who has gained access to the Docker Desktop VM through a container breakout can further escape to the host by passing extensions and dashboard related IPC messages. Docker Desktop v4.29.0 https://docs.d...

  • EPSS 0.05%
  • Veröffentlicht 09.07.2024 17:15:48
  • Zuletzt bearbeitet 19.03.2025 16:15:28

In Docker Desktop on Windows before v4.31.0 allows a user in the docker-users group to cause a Windows Denial-of-Service through the exec-path Docker daemon config option in Windows containers mode.

  • EPSS 0.03%
  • Veröffentlicht 27.04.2023 20:15:40
  • Zuletzt bearbeitet 31.01.2025 20:15:29

Docker Desktop for Windows before 4.6 allows attackers to overwrite any file through the windowscontainers/start dockerBackendV2 API by controlling the data-root field inside the DaemonJSON field in the WindowsContainerStartRequest class. This allows...

  • EPSS 0.03%
  • Veröffentlicht 27.04.2023 20:15:40
  • Zuletzt bearbeitet 31.01.2025 20:15:29

Docker Desktop for Windows before 4.6.0 allows attackers to delete (or create) any file through the dockerBackendV2 windowscontainers/start API by controlling the pidfile field inside the DaemonJSON field in the WindowsContainerStartRequest class. Th...

  • EPSS 0.06%
  • Veröffentlicht 27.04.2023 20:15:40
  • Zuletzt bearbeitet 31.01.2025 20:15:29

Docker Desktop for Windows before 4.6.0 allows attackers to overwrite any file through a symlink attack on the hyperv/create dockerBackendV2 API by controlling the DataFolder parameter for DockerDesktop.vhdx, a similar issue to CVE-2022-31647.

  • EPSS 0.06%
  • Veröffentlicht 27.04.2023 20:15:39
  • Zuletzt bearbeitet 31.01.2025 20:15:28

Docker Desktop before 4.6.0 on Windows allows attackers to delete any file through the hyperv/destroy dockerBackendV2 API via a symlink in the DataFolder parameter, a different vulnerability than CVE-2022-26659.

Exploit
  • EPSS 0.06%
  • Veröffentlicht 06.04.2023 09:15:07
  • Zuletzt bearbeitet 21.11.2024 07:39:56

In Docker Desktop 4.17.x the Artifactory Integration falls back to sending registry credentials over plain HTTP if the HTTPS health check has failed. A targeted network sniffing attack can lead to a disclosure of sensitive information. Only users who...

  • EPSS 0.09%
  • Veröffentlicht 12.08.2021 14:15:07
  • Zuletzt bearbeitet 21.11.2024 06:15:57

Docker Desktop before 3.6.0 suffers from incorrect access control. If a low-privileged account is able to access the server running the Windows containers, it can lead to a full container compromise in both process isolation and Hyper-V isolation mod...