Vulnerabilities
Vulnerable Software
Boot2docker:  Security Vulnerabilities
The Docker daemon managed by boot2docker 1.2 and earlier improperly enables unauthenticated TCP connections by default, which makes it easier for remote attackers to gain privileges or execute arbitrary code from children containers.
CVSS Score
8.8
EPSS Score
0.024
Published
2018-02-06
boot2docker 1.2 and earlier allows attackers to conduct cross-site request forgery (CSRF) attacks by leveraging Docker daemons enabling TCP connections without TLS authentication.
CVSS Score
8.8
EPSS Score
0.001
Published
2018-02-06


Contact Us

Shodan ® - All rights reserved