Page 5 of 88 results (0.005 seconds)

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

Docker Desktop before 4.5.1 on Windows allows attackers to move arbitrary files. NOTE: this issue exists because of an incomplete fix for CVE-2022-23774. Docker Desktop versiones anteriores a 4.5.1 en Windows, permite a atacantes mover archivos arbitrarios. NOTA: este problema se presenta debido a una corrección incompleta de CVE-2022-23774 • https://github.com/followboy1999/CVE-2022-25365 https://docs.docker.com/desktop/windows/release-notes https://security.netapp.com/advisory/ntap-20220331-0001 •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 0

Docker Desktop before 4.4.4 on Windows allows attackers to move arbitrary files. Docker Desktop versiones anteriores a 4.4.4 en Windows, permite a atacantes mover archivos arbitrarios This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Docker Desktop. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Docker Desktop Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. • https://docs.docker.com/docker-for-windows/release-notes •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

Docker Desktop version 4.3.0 and 4.3.1 has a bug that may log sensitive information (access token or password) on the user's machine during login. This only affects users if they are on Docker Desktop 4.3.0, 4.3.1 and the user has logged in while on 4.3.0, 4.3.1. Gaining access to this data would require having access to the user’s local files. Docker Desktop versiones 4.3.0 y 4.3.1, presenta un bug que puede registrar información confidencial (token de acceso o contraseña) en la máquina del usuario durante el inicio de sesión. Esto sólo afecta a usuarios si están en Docker Desktop versiones 4.3.0, 4.3.1 y el usuario ha iniciado la sesión mientras está en versiones 4.3.0, 4.3.1. • https://docs.docker.com/desktop/windows/release-notes • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 8.0EPSS: 0%CPEs: 2EXPL: 0

IBM Security Verify Access Docker 10.0.0 could allow a user to impersonate another user on the system. IBM X-Force ID: 201483. IBM Security Verify Access Docker versión 10.0.0, podría permitir a un usuario hacerse pasar por otro en el sistema. IBM X-Force ID: 201483 • https://exchange.xforce.ibmcloud.com/vulnerabilities/201483 https://www.ibm.com/support/pages/node/6471895 •

CVSS: 6.8EPSS: 0%CPEs: 2EXPL: 0

IBM Security Verify Access Docker 10.0.0 could allow a remote priviled user to upload arbitrary files with a dangerous file type that could be excuted by an user. IBM X-Force ID: 200600. IBM Security Verify Access Docker versión 10.0.0, podría permitir a un usuario privilegiado remotos cargar archivos arbitrarios con un tipo de archivo peligroso que podría ser ejecutado por un usuario. IBM X-Force ID: 200600 • https://exchange.xforce.ibmcloud.com/vulnerabilities/200600 https://www.ibm.com/support/pages/node/6471895 • CWE-434: Unrestricted Upload of File with Dangerous Type •