Количество 16
Количество 16
CVE-2018-15664
In Docker through 18.06.1-ce-rc2, the API endpoints behind the 'docker cp' command are vulnerable to a symlink-exchange attack with Directory Traversal, giving attackers arbitrary read-write access to the host filesystem with root privileges, because daemon/archive.go does not do archive operations on a frozen filesystem (or from within a chroot).
CVE-2018-15664
In Docker through 18.06.1-ce-rc2, the API endpoints behind the 'docker cp' command are vulnerable to a symlink-exchange attack with Directory Traversal, giving attackers arbitrary read-write access to the host filesystem with root privileges, because daemon/archive.go does not do archive operations on a frozen filesystem (or from within a chroot).
CVE-2018-15664
In Docker through 18.06.1-ce-rc2, the API endpoints behind the 'docker cp' command are vulnerable to a symlink-exchange attack with Directory Traversal, giving attackers arbitrary read-write access to the host filesystem with root privileges, because daemon/archive.go does not do archive operations on a frozen filesystem (or from within a chroot).
CVE-2018-15664
Docker Elevation of Privilege Vulnerability
CVE-2018-15664
In Docker through 18.06.1-ce-rc2, the API endpoints behind the 'docker ...
openSUSE-SU-2019:1621-1
Security update for docker
SUSE-SU-2019:1562-1
Security update for docker
SUSE-SU-2019:1514-1
Security update for docker
GHSA-pv79-5r2c-jrpq
In Docker through 18.06.1-ce-rc2, the API endpoints behind the 'docker cp' command are vulnerable to a symlink-exchange attack with Directory Traversal, giving attackers arbitrary read-write access to the host filesystem with root privileges, because daemon/archive.go does not do archive operations on a frozen filesystem (or from within a chroot).
ELSA-2019-4680
ELSA-2019-4680: docker-engine security update (MODERATE)
BDU:2019-02690
Уязвимость компонента daemon/archive.go средства автоматизации развёртывания и управления приложениями в средах с поддержкой контейнеризации Docker, позволяющая нарушителю повысить свои привилегии и получить доступ на чтение и запись файлов
ELSA-2019-4827
ELSA-2019-4827: docker-engine docker-cli security update (IMPORTANT)
openSUSE-SU-2019:2044-1
Security update for podman, slirp4netns and libcontainers-common
SUSE-SU-2019:2223-1
Security update for podman, slirp4netns and libcontainers-common
SUSE-SU-2025:03545-1
Security update for docker-stable
SUSE-SU-2025:03540-1
Security update for docker-stable
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2018-15664 In Docker through 18.06.1-ce-rc2, the API endpoints behind the 'docker cp' command are vulnerable to a symlink-exchange attack with Directory Traversal, giving attackers arbitrary read-write access to the host filesystem with root privileges, because daemon/archive.go does not do archive operations on a frozen filesystem (or from within a chroot). | CVSS3: 7.5 | 6% Низкий | больше 6 лет назад | |
CVE-2018-15664 In Docker through 18.06.1-ce-rc2, the API endpoints behind the 'docker cp' command are vulnerable to a symlink-exchange attack with Directory Traversal, giving attackers arbitrary read-write access to the host filesystem with root privileges, because daemon/archive.go does not do archive operations on a frozen filesystem (or from within a chroot). | CVSS3: 7.5 | 6% Низкий | больше 6 лет назад | |
CVE-2018-15664 In Docker through 18.06.1-ce-rc2, the API endpoints behind the 'docker cp' command are vulnerable to a symlink-exchange attack with Directory Traversal, giving attackers arbitrary read-write access to the host filesystem with root privileges, because daemon/archive.go does not do archive operations on a frozen filesystem (or from within a chroot). | CVSS3: 7.5 | 6% Низкий | больше 6 лет назад | |
CVE-2018-15664 Docker Elevation of Privilege Vulnerability | 6% Низкий | больше 6 лет назад | ||
CVE-2018-15664 In Docker through 18.06.1-ce-rc2, the API endpoints behind the 'docker ... | CVSS3: 7.5 | 6% Низкий | больше 6 лет назад | |
openSUSE-SU-2019:1621-1 Security update for docker | 6% Низкий | больше 6 лет назад | ||
SUSE-SU-2019:1562-1 Security update for docker | 6% Низкий | больше 6 лет назад | ||
SUSE-SU-2019:1514-1 Security update for docker | 6% Низкий | больше 6 лет назад | ||
GHSA-pv79-5r2c-jrpq In Docker through 18.06.1-ce-rc2, the API endpoints behind the 'docker cp' command are vulnerable to a symlink-exchange attack with Directory Traversal, giving attackers arbitrary read-write access to the host filesystem with root privileges, because daemon/archive.go does not do archive operations on a frozen filesystem (or from within a chroot). | CVSS3: 7.5 | 6% Низкий | больше 3 лет назад | |
ELSA-2019-4680 ELSA-2019-4680: docker-engine security update (MODERATE) | больше 6 лет назад | |||
BDU:2019-02690 Уязвимость компонента daemon/archive.go средства автоматизации развёртывания и управления приложениями в средах с поддержкой контейнеризации Docker, позволяющая нарушителю повысить свои привилегии и получить доступ на чтение и запись файлов | CVSS3: 7.5 | 6% Низкий | больше 6 лет назад | |
ELSA-2019-4827 ELSA-2019-4827: docker-engine docker-cli security update (IMPORTANT) | около 6 лет назад | |||
openSUSE-SU-2019:2044-1 Security update for podman, slirp4netns and libcontainers-common | больше 6 лет назад | |||
SUSE-SU-2019:2223-1 Security update for podman, slirp4netns and libcontainers-common | больше 6 лет назад | |||
SUSE-SU-2025:03545-1 Security update for docker-stable | 4 месяца назад | |||
SUSE-SU-2025:03540-1 Security update for docker-stable | 4 месяца назад |
Уязвимостей на страницу