Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

docker

About This Vendor

docker is a technology vendor producing software and infrastructure products. As a software provider, docker's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of docker's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 105 known vulnerabilities from docker. This includes 20 critical-severity issues and 48 high-severity issues that represent significant risk. These vulnerabilities affect 60 distinct products across docker's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2014 through 2026, indicating decades of continuous security attention and research. Organizations deploying docker products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2014-3499 2014-07-11 2025-04-12 - 7.2 Unknown
CVE-2014-5277 2014-11-17 2025-04-12 - 5.0 Likely
CVE-2014-6407 2014-12-12 2025-04-12 - 7.5 Likely
CVE-2014-6408 2014-12-12 2025-04-12 - 5.0 Likely
CVE-2014-9357 2014-12-16 2025-04-12 - 10.0 Likely
CVE-2014-9358 2014-12-16 2025-04-12 - 6.4 Likely
CVE-2015-3627 2015-05-18 2025-04-12 - 7.2 Unknown
CVE-2015-3629 2015-05-18 2025-04-12 7.8 7.2 Unknown
CVE-2015-3630 2015-05-18 2025-04-12 - 7.2 Unknown
CVE-2015-3631 2015-05-18 2025-04-12 - 3.6 Unknown
CVE-2016-3697 2016-06-01 2025-04-12 7.8 2.1 Unknown
CVE-2016-8867 2016-10-28 2025-04-12 7.5 5.0 Likely
CVE-2016-6595 2017-01-04 2025-04-12 6.5 4.0 Likely
CVE-2016-9962 2017-01-31 2025-04-20 6.4 4.4 Unknown
CVE-2017-11468 2017-07-20 2025-04-20 7.5 5.0 Likely
CVE-2014-0047 2017-10-06 2025-04-20 7.8 4.6 Unknown
CVE-2017-14992 2017-11-01 2025-04-20 6.5 4.3 Likely
CVE-2014-5282 2018-02-06 2024-11-21 8.1 5.5 Likely
CVE-2015-9258 2018-03-31 2024-11-21 7.5 5.0 Likely
CVE-2015-9259 2018-03-31 2024-11-21 9.8 7.5 Likely
CVE-2018-10892 2018-07-06 2024-11-21 5.3 5.0 Likely
CVE-2018-15514 2018-09-01 2024-11-21 8.8 6.5 Likely
CVE-2018-20699 2019-01-12 2024-11-21 4.9 4.0 Likely
CVE-2019-5736 2019-02-11 2024-11-21 8.6 9.3 Likely
CVE-2018-15664 2019-05-23 2024-11-21 7.5 6.2 Unknown
CVE-2019-13509 2019-07-18 2024-11-21 7.5 5.0 Likely
CVE-2019-1020014 2019-07-29 2024-11-21 5.5 2.1 Unknown
CVE-2019-14271 2019-07-29 2024-11-21 9.8 7.5 Likely
CVE-2019-13139 2019-08-22 2024-11-21 8.4 4.6 Unknown
CVE-2019-15752 2019-08-28 2025-11-06 7.8 9.3 Likely
CVE-2019-16884 2019-09-25 2024-11-21 7.5 5.0 Likely
CVE-2014-9356 2019-12-02 2024-11-21 8.6 8.5 Likely
CVE-2014-8178 2019-12-17 2024-11-21 5.5 1.9 Unknown
CVE-2014-8179 2019-12-17 2024-11-21 7.5 5.0 Likely
CVE-2014-0048 2020-01-02 2024-11-21 9.8 7.5 Likely
CVE-2014-5278 2020-02-07 2024-11-21 5.3 4.3 Likely
CVE-2020-10665 2020-03-18 2024-11-21 6.7 7.2 Unknown
CVE-2020-13401 2020-06-02 2024-11-21 6.0 6.0 Unknown
CVE-2020-11492 2020-06-05 2024-11-21 7.8 7.2 Unknown
CVE-2020-15360 2020-06-27 2024-11-21 7.8 4.6 Unknown
CVE-2020-14298 2020-07-13 2024-11-21 8.8 4.6 Unknown
CVE-2020-14300 2020-07-13 2024-11-21 8.8 4.6 Unknown
CVE-2020-29389 2020-12-02 2024-11-21 9.8 10.0 Likely
CVE-2020-29575 2020-12-08 2024-11-21 9.8 10.0 Likely
CVE-2020-29580 2020-12-08 2024-11-21 9.8 10.0 Likely
CVE-2020-29581 2020-12-08 2024-11-21 9.8 10.0 Likely
CVE-2020-29601 2020-12-08 2024-11-21 9.8 10.0 Likely
CVE-2020-29591 2020-12-11 2024-11-21 9.8 10.0 Likely
CVE-2020-35467 2020-12-15 2024-11-21 9.8 10.0 Likely
CVE-2020-35185 2020-12-17 2024-11-21 9.8 10.0 Likely
CVE-2020-35184 2020-12-17 2024-11-21 9.8 10.0 Likely
CVE-2020-35186 2020-12-17 2024-11-21 9.8 10.0 Likely
CVE-2020-35195 2020-12-17 2024-11-21 9.8 10.0 Likely
CVE-2020-35196 2020-12-17 2024-11-21 9.8 10.0 Likely
CVE-2020-35197 2020-12-17 2024-11-21 9.8 10.0 Likely
CVE-2020-27534 2020-12-30 2024-11-21 5.3 5.0 Likely
CVE-2021-3162 2021-01-15 2024-11-21 7.8 4.6 Unknown
CVE-2021-21284 2021-02-02 2024-11-21 6.8 2.7 Unknown
CVE-2021-21285 2021-02-02 2024-11-21 6.5 4.3 Likely
CVE-2021-20496 2021-07-15 2024-11-21 4.9 4.0 Likely
CVE-2021-20497 2021-07-15 2024-11-21 7.5 5.0 Likely
CVE-2021-20498 2021-07-15 2024-11-21 5.3 5.0 Likely
CVE-2021-20499 2021-07-15 2024-11-21 2.7 4.0 Likely
CVE-2021-20500 2021-07-15 2024-11-21 4.4 2.1 Unknown
CVE-2021-20510 2021-07-15 2024-11-21 4.4 2.1 Unknown
CVE-2021-20511 2021-07-15 2024-11-21 4.9 6.8 Likely
CVE-2021-20523 2021-07-15 2024-11-21 2.7 4.0 Likely
CVE-2021-20524 2021-07-15 2024-11-21 4.8 3.5 Unknown
CVE-2021-20533 2021-07-15 2024-11-21 7.2 6.5 Likely
CVE-2021-20534 2021-07-15 2024-11-21 3.5 4.9 Unknown
CVE-2021-20537 2021-07-15 2024-11-21 6.5 4.0 Likely
CVE-2021-29699 2021-07-15 2024-11-21 6.8 6.0 Unknown
CVE-2021-29742 2021-07-15 2024-11-21 8.0 5.2 Unknown
CVE-2021-37841 2021-08-12 2024-11-21 7.8 4.6 Unknown
CVE-2021-41092 2021-10-04 2024-11-21 5.4 5.0 Likely
CVE-2021-45449 2022-01-12 2024-11-21 5.5 2.1 Unknown
CVE-2022-23774 2022-02-01 2024-11-21 5.3 5.0 Likely
CVE-2022-25365 2022-02-19 2024-11-21 7.8 4.6 Unknown
CVE-2022-26659 2022-03-25 2024-11-21 7.1 3.6 Unknown
CVE-2021-44719 2022-05-25 2024-11-21 8.4 6.6 Unknown
CVE-2022-34882 2022-09-06 2026-02-25 9.0 - -
CVE-2022-34883 2022-09-06 2026-02-25 7.2 - -
CVE-2023-0628 2023-03-13 2024-11-21 6.1 - -
CVE-2023-0629 2023-03-13 2024-11-21 7.1 - -
CVE-2023-1802 2023-04-06 2024-11-21 5.9 - -
CVE-2022-31647 2023-04-27 2025-01-31 7.1 - -
CVE-2022-34292 2023-04-27 2025-01-31 7.1 - -
CVE-2022-37326 2023-04-27 2025-01-31 7.8 - -
CVE-2022-38730 2023-04-27 2025-01-31 6.3 - -
CVE-2023-0625 2023-09-25 2024-11-21 8.0 - -
CVE-2023-0626 2023-09-25 2024-11-21 8.0 - -
CVE-2023-0627 2023-09-25 2024-11-21 6.7 - -
CVE-2023-0633 2023-09-25 2024-11-21 7.2 - -
CVE-2023-5165 2023-09-25 2024-11-21 7.1 - -
CVE-2023-5166 2023-09-25 2024-11-21 8.0 - -
CVE-2023-40453 2023-11-07 2024-11-21 6.5 - -
CVE-2024-5652 2024-07-09 2025-03-19 6.1 - -
CVE-2024-6222 2024-07-09 2024-11-21 7.0 - -
CVE-2024-8695 2024-09-12 2024-09-13 9.8 - -
CVE-2024-8696 2024-09-12 2024-09-13 9.8 - -
CVE-2025-3224 2025-04-28 2025-05-10 7.8 - -
CVE-2025-64443 2025-12-03 2026-03-10 9.6 - -
CVE-2025-13743 2025-12-09 2026-01-30 7.5 - -
CVE-2026-2664 2026-02-24 2026-02-27 7.8 - -
CVE-2025-15558 2026-03-04 2026-03-09 8.0 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for docker by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with docker's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.