docker vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the docker package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • C
CVE-2024-41110

<26.1.5_ce-150000.212.1
  • H
CVE-2023-47108

<26.1.5_ce-150000.212.1
  • H
Allocation of Resources Without Limits or Throttling

<26.1.5_ce-150000.212.1
  • C
CVE-2024-41110

<25.0.6_ce-150000.207.1
  • M
CVE-2024-28180

<25.0.6_ce-150000.207.1
  • H
Improper Validation of Integrity Check Value

<25.0.6_ce-150000.207.1
  • H
CVE-2024-24786

<25.0.6_ce-150000.207.1
  • M
Incorrect Authorization

<25.0.6_ce-150000.207.1
  • M
Directory Traversal

<25.0.6_ce-150000.207.1
  • H
Race Condition

<25.0.6_ce-150000.207.1
  • H
Link Following

<25.0.6_ce-150000.207.1
  • M
Incorrect Authorization

<24.0.7_ce-150000.193.1
  • M
Directory Traversal

<24.0.7_ce-150000.193.1
  • H
Race Condition

<24.0.7_ce-150000.193.1
  • M
Information Exposure

<24.0.7_ce-150000.190.4
  • M
CVE-2020-8694

<24.0.7_ce-150000.190.4
  • M
Information Exposure

<24.0.7_ce-150000.190.4
  • M
Unprotected Alternate Channel

<24.0.5_ce-150000.185.1
  • M
Missing Encryption of Sensitive Data

<24.0.5_ce-150000.185.1
  • H
Unprotected Alternate Channel

<24.0.5_ce-150000.185.1
  • M
CVE-2022-36109

<20.10.23_ce-150000.175.1
  • M
Resource Exhaustion

<20.10.17_ce-150000.166.1
  • L
Incorrect Default Permissions

<20.10.17_ce-150000.166.1
  • H
CVE-2022-27191

<20.10.14_ce-150000.163.1
  • M
Incorrect Permission Assignment for Critical Resource

<20.10.14_ce-150000.163.1
  • M
CVE-2022-23648

<20.10.14_ce-150000.163.1
  • H
CVE-2021-43565

<20.10.14_ce-150000.163.1
  • M
Improper Input Validation

<19.03.11_ce-6.34.2
  • M
Improper Check for Unusual or Exceptional Conditions

<19.03.15_ce-6.43.3
  • L
Directory Traversal

<19.03.15_ce-6.43.3
  • H
Incorrect Resource Transfer Between Spheres

<19.03.15_ce-6.43.3
  • H
Race Condition

<20.10.6_ce-6.49.3
  • M
Exposure of Resource to Wrong Sphere

<20.10.6_ce-6.49.3
  • M
Improper Check for Unusual or Exceptional Conditions

<20.10.6_ce-6.49.3
  • L
Directory Traversal

<20.10.6_ce-6.49.3
  • M
Directory Traversal

<20.10.9_ce-156.1
  • M
Information Exposure

<20.10.9_ce-156.1
  • M
Improper Preservation of Permissions

<20.10.9_ce-156.1
  • M
Improper Preservation of Permissions

<20.10.9_ce-156.1
  • L
Incorrect Permission Assignment for Critical Resource

<20.10.9_ce-156.1
  • H
Race Condition

<20.10.9_ce-156.1