An issue was found in Docker before 1.6.0. Some programs and scripts in Docker are downloaded via HTTP and then executed or used in unsafe ways.
References
Configurations
History
21 Nov 2024, 02:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2015/03/24/18 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2015/03/24/22 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2015/03/24/23 - Mailing List, Third Party Advisory | |
References | () https://access.redhat.com/security/cve/cve-2014-0048 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-0048 - Issue Tracking, Third Party Advisory | |
References | () https://bugzilla.suse.com/show_bug.cgi?id=CVE-2014-0048 - Issue Tracking, Third Party Advisory | |
References | () https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E - Issue Tracking, Mailing List | |
References | () https://security-tracker.debian.org/tracker/CVE-2014-0048 - Third Party Advisory |
Information
Published : 2020-01-02 17:15
Updated : 2024-11-21 02:01
NVD link : CVE-2014-0048
Mitre link : CVE-2014-0048
CVE.ORG link : CVE-2014-0048
JSON object : View
Products Affected
docker
- docker
apache
- geode
CWE
CWE-20
Improper Input Validation