Total vulnerabilities in the database
Docker before 1.3.3 does not properly validate image IDs, which allows remote attackers to conduct path traversal attacks and spoof repositories via a crafted image in a (1) "docker load" operation or (2) "registry communications."
Software | From | Fixed in |
---|---|---|
docker / docker | - | 1.3.2.x |
![]() |
- | 1.3.2 |