The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.
In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag.
Base Score: 4.6
Impact Score: 6.4
Exploitability Score: 3.9
Base Score: 8.4
Impact Score: 5.9
Exploitability Score: 2.5
|154519||NewStart CGSL CORE 5.05 / MAIN 5.05 : docker-ce Multiple Vulnerabilities (NS-SA-2021-0138)||Nessus||NewStart CGSL Local Security Checks|
|143962||NewStart CGSL CORE 5.04 / MAIN 5.04 : docker-ce Multiple Vulnerabilities (NS-SA-2020-0082)||Nessus||NewStart CGSL Local Security Checks|
|136552||Photon OS 1.0: Docker PHSA-2020-1.0-0292||Nessus||PhotonOS Local Security Checks|
|136345||Photon OS 3.0: Docker PHSA-2020-3.0-0085||Nessus||PhotonOS Local Security Checks|
|136331||Photon OS 2.0: Docker PHSA-2020-2.0-0235||Nessus||PhotonOS Local Security Checks|
|130609||Amazon Linux AMI : docker (ALAS-2019-1316)||Nessus||Amazon Linux Local Security Checks|
|128622||Debian DSA-4521-1 : docker.io - security update||Nessus||Debian Local Security Checks|