Known Vulnerabilities for products from Docker
Listed below are 20 of the newest known vulnerabilities associated with the vendor "Docker".
These CVEs are retrieved based on exact matches on listed vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed vendor information are still displayed.
Data on known vulnerable products is also displayed based on information from known CPEs, each product links to its respective vulnerability page.
Known Vulnerabilities
| CVE | Shortened Description | Severity | Publish Date | Last Modified |
|---|---|---|---|---|
| CVE-2026-34450 | Not Provided | 2026-03-31 | 2026-04-01 | |
| CVE-2026-34397 | Not Provided | 2026-04-01 | 2026-04-01 | |
| CVE-2026-34381 | Not Provided | 2026-03-31 | 2026-04-01 | |
| CVE-2026-34205 | Not Provided | 2026-03-27 | 2026-04-01 | |
| CVE-2026-34042 | Not Provided | 2026-03-31 | 2026-03-31 | |
| CVE-2026-33997 | Not Provided | 2026-03-31 | 2026-03-31 | |
| CVE-2026-33990 | Not Provided | 2026-04-01 | 2026-04-01 | |
| CVE-2026-33747 | Not Provided | 2026-03-27 | 2026-03-27 | |
| CVE-2026-33744 | Not Provided | 2026-03-27 | 2026-03-27 | |
| CVE-2026-2287 | Not Provided | 2026-03-30 | 2026-04-01 | |
| CVE-2022-23774 | Docker Desktop before 4.4.4 on Windows allows attackers to move arbitrary files. | 5.3 - MEDIUM | 2022-02-01 | 2022-02-04 |
| CVE-2021-41092 | Docker CLI is the command line interface for the docker container runtime. A bug was found in the Docker CLI where running `d... | 7.5 - HIGH | 2021-10-04 | 2023-11-07 |
| CVE-2021-37841 | Docker Desktop before 3.6.0 suffers from incorrect access control. If a low-privileged account is able to access the server r... | 7.8 - HIGH | 2021-08-12 | 2022-07-12 |
| CVE-2021-29742 | IBM Security Verify Access Docker 10.0.0 could allow a user to impersonate another user on the system. IBM X-Force ID: 201483... | 8 - HIGH | 2021-07-15 | 2021-09-29 |
| CVE-2021-29699 | IBM Security Verify Access Docker 10.0.0 could allow a remote priviled user to upload arbitrary files with a dangerous file t... | 6.8 - MEDIUM | 2021-07-15 | 2021-09-29 |
| CVE-2021-21285 | In Docker before versions 9.03.15, 20.10.3 there is a vulnerability in which pulling an intentionally malformed Docker image ... | 6.5 - MEDIUM | 2021-02-02 | 2022-10-25 |
| CVE-2021-21284 | In Docker before versions 9.03.15, 20.10.3 there is a vulnerability involving the --userns-remap option in which access to re... | 6.8 - MEDIUM | 2021-02-02 | 2022-04-29 |
| CVE-2021-20537 | IBM Security Verify Access Docker 10.0.0 contains hard-coded credentials, such as a password or cryptographic key, which it u... | 6.5 - MEDIUM | 2021-07-15 | 2021-09-29 |
| CVE-2021-20534 | IBM Security Verify Access Docker 10.0.0 could allow a remote attacker to conduct phishing attacks, using an open redirect at... | 3.5 - LOW | 2021-07-15 | 2021-09-29 |
| CVE-2021-20533 | IBM Security Verify Access Docker 10.0.0 could allow a remote authenticated attacker to execute arbitrary commands on the sys... | 7.2 - HIGH | 2021-07-15 | 2021-09-29 |
Known software with vulnerabilities from Docker
| Type | Vendor | Product | Version |
|---|---|---|---|
| Application | Docker | Composer | - |
| Application | Docker | Credential Helpers | 0.1.0 |
| Application | Docker | Credential-helpers | 0.1.0 |
| Application | Docker | Crux Linux Docker Image | 3.0 |
| Application | Docker | Cs Engine | - |
| Application | Docker | Desktop | - |
| Application | Docker | Docker | - |
| Application | Docker | Docker Desktop | 2.1.0.1 |
| Application | Docker | Docker Enterprise | 2.0.0 |
| Application | Docker | Docker-py | 0.5.3 |
| Application | Docker | Docs | - |
| Application | Docker | Engine | 0.0.3 |
| Application | Docker | Notary | 0.1 |
| Application | Docker | Notary Docker Image | 0.2.0 |
| Application | Docker | Spiped | - |
| Application | Docker | Spiped Alpine Docker Image | - |
| Application | Docker | Storm Docker Image | 0.9 |