docker vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the docker package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Resource Exhaustion

<0:20.10.13-3.amzn1
  • M
Incorrect Default Permissions

<0:20.10.13-2.1.amzn1
  • M
Directory Traversal

<0:20.10.7-2.69.amzn1
  • M
Resource Exhaustion

<0:20.10.7-2.69.amzn1
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:20.10.7-5.76.amzn1
  • M
Information Exposure

<0:20.10.7-3.71.amzn1
  • M
Improper Preservation of Permissions

<0:20.10.7-3.71.amzn1
  • M
Improper Preservation of Permissions

<0:20.10.7-3.71.amzn1
  • H
Improper Input Validation

<0:19.03.6ce-4.58.amzn1
  • M
Information Exposure Through Log Files

<0:18.09.9ce-2.52.amzn1
  • M
OS Command Injection

<0:18.09.9ce-2.52.amzn1
  • M
Race Condition

<0:18.06.1ce-10.32.amzn1
  • H
OS Command Injection

<0:18.06.1ce-7.25.amzn1
  • M
CVE-2018-10892

<0:18.06.1ce-2.16.amzn1
  • M
Improper Input Validation

<0:17.09.1ce-1.111.amzn1
  • H
Race Condition

<0:1.12.6-1.17.amzn1
  • M
HTTP Request Smuggling

<0:1.6.2-1.3.amzn1
  • M
HTTP Request Smuggling

<0:1.6.2-1.3.amzn1
  • M
HTTP Request Smuggling

<0:1.6.2-1.3.amzn1
  • C
Access Restriction Bypass

<0:1.6.0-1.3.amzn1
  • C
Access Restriction Bypass

<0:1.6.0-1.3.amzn1
  • C
Link Following

<0:1.6.0-1.3.amzn1
  • C
Link Following

<0:1.6.0-1.3.amzn1
  • C
Access Restriction Bypass

<0:1.3.3-1.0.amzn1
  • C
Improper Input Validation

<0:1.3.3-1.0.amzn1
  • C
Directory Traversal

<0:1.3.3-1.0.amzn1
  • C
Link Following

<0:1.3.2-1.0.amzn1
  • C
Access Restriction Bypass

<0:1.3.2-1.0.amzn1