
CVE-2020-29575
https://notcve.org/view.php?id=CVE-2020-29575
08 Dec 2020 — The official elixir Docker images before 1.8.0-alpine (Alpine specific) contain a blank password for a root user. Systems using the elixir Linux Docker container deployed by affected versions of the Docker image may allow a remote attacker to achieve root access with a blank password. Las imágenes oficiales de Docker elixir versiones anteriores a 1.8.0-alpine (específicas de Alpine), contienen una contraseña en blanco para un usuario root. Los sistemas que utilizan el contenedor de Docker Linux elixir ... • https://github.com/koharin/koharin2/blob/main/CVE-2020-29575 •

CVE-2020-29580
https://notcve.org/view.php?id=CVE-2020-29580
08 Dec 2020 — The official storm Docker images before 1.2.1 contain a blank password for a root user. Systems using the Storm Docker container deployed by affected versions of the Docker image may allow an remote attacker to achieve root access with a blank password. Las imágenes oficiales de Docker Storm versiones anteriores a 1.2.1, contienen una contraseña en blanco para un usuario root. Los sistemas que utilizan el contenedor Docker Storm implementado por las versiones afectadas de la imagen de Docker pueden per... • https://github.com/koharin/koharin2/blob/main/CVE-2020-29580 •

CVE-2020-29601
https://notcve.org/view.php?id=CVE-2020-29601
08 Dec 2020 — The official notary docker images before signer-0.6.1-1 contain a blank password for a root user. System using the notary docker container deployed by affected versions of the docker image may allow an remote attacker to achieve root access with a blank password. Las imágenes oficiales de docker notary versiones anteriores a signer-0.6.1-1, contienen una contraseña en blanco para un usuario root. El sistema que utiliza el contenedor de docker notary implementado por las versiones afectadas de la imagen... • https://github.com/koharin/koharin2/blob/main/CVE-2020-29601 •

CVE-2020-29581
https://notcve.org/view.php?id=CVE-2020-29581
08 Dec 2020 — The official spiped docker images before 1.5-alpine contain a blank password for a root user. Systems using the spiped docker container deployed by affected versions of the docker image may allow an remote attacker to achieve root access with a blank password. Las imágenes oficiales de docker spiped versiones anteriores a 1.5-alpine, contienen una contraseña en blanco para un usuario root. Los sistemas que utilizan el contenedor de docker spiped implementado por las versiones afectadas de la imagen de ... • https://github.com/koharin/koharin2/blob/main/CVE-2020-29581 •

CVE-2020-29389
https://notcve.org/view.php?id=CVE-2020-29389
02 Dec 2020 — The official Crux Linux Docker images 3.0 through 3.4 contain a blank password for a root user. System using the Crux Linux Docker container deployed by affected versions of the Docker image may allow an attacker to achieve root access with a blank password. Las imágenes oficiales de Crux Linux Docker versiones 3.0 hasta 3.4, contienen una contraseña en blanco para un usuario root. Un sistema que usa el contenedor Crux Linux Docker implementado para las versiones afectadas de la imagen de Docker puede ... • https://github.com/koharin/koharin2/blob/main/CVE-2020-29389 • CWE-306: Missing Authentication for Critical Function •

CVE-2020-15360
https://notcve.org/view.php?id=CVE-2020-15360
27 Jun 2020 — com.docker.vmnetd in Docker Desktop 2.3.0.3 allows privilege escalation because of a lack of client verification. com.docker.vmnetd en Docker Desktop versión 2.3.0.3, permite una escalada de privilegios debido a una falta de verificación del cliente • https://docs.docker.com/docker-for-windows/release-notes • CWE-862: Missing Authorization •

CVE-2020-14298 – docker: Security regression of CVE-2019-5736 due to inclusion of vulnerable runc
https://notcve.org/view.php?id=CVE-2020-14298
23 Jun 2020 — The version of docker as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 advisory included an incorrect version of runc missing the fix for CVE-2019-5736, which was previously fixed via RHSA-2019:0304. This issue could allow a malicious or compromised container to compromise the container host and other containers running on the same host. This issue only affects docker version 1.13.1-108.git4ef4b30.el7, shipped in Red Hat Enterprise Linux 7 Extras. Both earlier and later versions are not ... • https://access.redhat.com/errata/RHBA-2020:0427 • CWE-271: Privilege Dropping / Lowering Errors CWE-273: Improper Check for Dropped Privileges •

CVE-2020-14300 – docker: Security regression of CVE-2016-9962 due to inclusion of vulnerable runc
https://notcve.org/view.php?id=CVE-2020-14300
23 Jun 2020 — The docker packages version docker-1.13.1-108.git4ef4b30.el7 as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 (https://access.redhat.com/errata/RHBA-2020:0053) included an incorrect version of runc that was missing multiple bug and security fixes. One of the fixes regressed in that update was the fix for CVE-2016-9962, that was previously corrected in the docker packages in Red Hat Enterprise Linux 7 Extras via RHSA-2017:0116 (https://access.redhat.com/errata/RHSA-2017:0116). The CVE-202... • https://access.redhat.com/errata/RHBA-2020:0427 • CWE-271: Privilege Dropping / Lowering Errors CWE-273: Improper Check for Dropped Privileges •

CVE-2020-11492
https://notcve.org/view.php?id=CVE-2020-11492
05 Jun 2020 — An issue was discovered in Docker Desktop through 2.2.0.5 on Windows. If a local attacker sets up their own named pipe prior to starting Docker with the same name, this attacker can intercept a connection attempt from Docker Service (which runs as SYSTEM), and then impersonate their privileges. Se detectó un problema en Docker Desktop versiones hasta 2.2.0.5 en Windows. Si un atacante local configura su propia tubería nombrada antes de iniciar Docker con el mismo nombre, este atacante puede interceptar un i... • https://github.com/CrackerCat/CVE-2020-11492 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVE-2020-13401 – Debian Security Advisory 4716-1
https://notcve.org/view.php?id=CVE-2020-13401
02 Jun 2020 — An issue was discovered in Docker Engine before 19.03.11. An attacker in a container, with the CAP_NET_RAW capability, can craft IPv6 router advertisements, and consequently spoof external IPv6 hosts, obtain sensitive information, or cause a denial of service. Se detectó un problema en Docker Engine versiones anteriores a 19.03.11. Un atacante en un contenedor, con la capacidad CAP_NET_RAW, puede diseñar anuncios de router IPv6, y en consecuencia falsificar hosts IPv6 externos, obtener información confidenc... • https://github.com/arax-zaeimi/Docker-Container-CVE-2020-13401 • CWE-20: Improper Input Validation •