Docker before 1.3.3 does not properly validate image IDs, which allows remote attackers to conduct path traversal attacks and spoof repositories via a crafted image in a (1) "docker load" operation or (2) "registry communications."
{ "nvd_published_at": null, "github_reviewed_at": "2021-05-20T21:02:14Z", "severity": "MODERATE", "github_reviewed": true, "cwe_ids": [ "CWE-59" ] }