Versions Packages Information History CVEs Related Badges Report

Packages for docker

244 package(s) known

docker

18.06.1 Potentially vulnerable (18.06.1-r0)

docker-bash-completion

18.06.1 Potentially vulnerable (18.06.1-r0)

docker-doc

18.06.1 Potentially vulnerable (18.06.1-r0)

docker-fish-completion

18.06.1 Potentially vulnerable (18.06.1-r0)

docker-openrc

18.06.1 Potentially vulnerable (18.06.1-r0)

docker-vim

18.06.1 Potentially vulnerable (18.06.1-r0)

docker-zsh-completion

18.06.1 Potentially vulnerable (18.06.1-r0)

docker

18.09.8 Potentially vulnerable (18.09.8-r0)

docker-bash-completion

18.09.8 Potentially vulnerable (18.09.8-r0)

docker-doc

18.09.8 Potentially vulnerable (18.09.8-r0)

docker-fish-completion

18.09.8 Potentially vulnerable (18.09.8-r0)

docker-openrc

18.09.8 Potentially vulnerable (18.09.8-r0)

docker-vim

18.09.8 Potentially vulnerable (18.09.8-r0)

docker-zsh-completion

18.09.8 Potentially vulnerable (18.09.8-r0)

docker

18.09.8 Potentially vulnerable (18.09.8-r0)

docker-bash-completion

18.09.8 Potentially vulnerable (18.09.8-r0)

docker-cli

18.09.8 Potentially vulnerable (18.09.8-r0)

docker-doc

18.09.8 Potentially vulnerable (18.09.8-r0)

docker-engine

18.09.8 Potentially vulnerable (18.09.8-r0)

docker-fish-completion

18.09.8 Potentially vulnerable (18.09.8-r0)

docker-openrc

18.09.8 Potentially vulnerable (18.09.8-r0)

docker-vim

18.09.8 Potentially vulnerable (18.09.8-r0)

docker-zsh-completion

18.09.8 Potentially vulnerable (18.09.8-r0)

docker

19.03.5 Potentially vulnerable (19.03.5-r1)

docker-bash-completion

19.03.5 Potentially vulnerable (19.03.5-r1)

docker-cli

19.03.5 Potentially vulnerable (19.03.5-r1)

docker-doc

19.03.5 Potentially vulnerable (19.03.5-r1)

docker-engine

19.03.5 Potentially vulnerable (19.03.5-r1)

docker-fish-completion

19.03.5 Potentially vulnerable (19.03.5-r1)

docker-openrc

19.03.5 Potentially vulnerable (19.03.5-r1)

docker-vim

19.03.5 Potentially vulnerable (19.03.5-r1)

docker-zsh-completion

19.03.5 Potentially vulnerable (19.03.5-r1)

docker

20.10.3 (20.10.3-r0)

docker-bash-completion

20.10.3 (20.10.3-r0)

docker-cli

20.10.3 (20.10.3-r0)

docker-doc

20.10.3 (20.10.3-r0)

docker-engine

20.10.3 (20.10.3-r0)

docker-fish-completion

20.10.3 (20.10.3-r0)

docker-openrc

20.10.3 (20.10.3-r0)

docker-zsh-completion

20.10.3 (20.10.3-r0)

docker

20.10.3 (20.10.3-r1)

docker-bash-completion

20.10.3 (20.10.3-r1)

docker-cli

20.10.3 (20.10.3-r1)

docker-doc

20.10.3 (20.10.3-r1)

docker-engine

20.10.3 (20.10.3-r1)

docker-fish-completion

20.10.3 (20.10.3-r1)

docker-openrc

20.10.3 (20.10.3-r1)

docker-zsh-completion

20.10.3 (20.10.3-r1)

docker

20.10.7 (20.10.7-r2)

docker-bash-completion

20.10.7 (20.10.7-r2)

docker-cli

20.10.7 (20.10.7-r2)

docker-doc

20.10.7 (20.10.7-r2)

docker-engine

20.10.7 (20.10.7-r2)

docker-fish-completion

20.10.7 (20.10.7-r2)

docker-openrc

20.10.7 (20.10.7-r2)

docker-zsh-completion

20.10.7 (20.10.7-r2)

docker

20.10.8 (20.10.8-r1)

docker-bash-completion

20.10.8 (20.10.8-r1)

docker-cli

20.10.8 (20.10.8-r1)

docker-doc

20.10.8 (20.10.8-r1)

docker-engine

20.10.8 (20.10.8-r1)

docker-fish-completion

20.10.8 (20.10.8-r1)

docker-openrc

20.10.8 (20.10.8-r1)

docker-zsh-completion

20.10.8 (20.10.8-r1)

docker

19.03.13ce Potentially vulnerable (19.03.13ce-1.62.amzn1)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0 and MIT and BSD and MPLv2.0 and WTFPL
  • Links(s):

docker

19.03.6ce Potentially vulnerable (19.03.6ce-2.56.amzn1)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0 and MIT and BSD and MPLv2.0 and WTFPL
  • Links(s):

docker

19.03.6ce Potentially vulnerable (19.03.6ce-3.57.amzn1)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0 and MIT and BSD and MPLv2.0 and WTFPL
  • Links(s):

docker

19.03.6ce Potentially vulnerable (19.03.6ce-4.58.amzn1)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0 and MIT and BSD and MPLv2.0 and WTFPL
  • Links(s):

docker

18.09.9ce Potentially vulnerable (18.09.9ce-1.51.amzn1)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0 and MIT and BSD and MPLv2.0 and WTFPL
  • Links(s):

docker

18.09.9ce Potentially vulnerable (18.09.9ce-2.52.amzn1)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0 and MIT and BSD and MPLv2.0 and WTFPL
  • Links(s):

docker

18.06.1ce Potentially vulnerable (18.06.1ce-4.19.amzn1)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0 and MIT and BSD and MPLv2.0 and WTFPL
  • Links(s):

docker

18.06.1ce Potentially vulnerable (18.06.1ce-3.17.amzn1)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0 and MIT and BSD and MPLv2.0 and WTFPL
  • Links(s):

docker

18.06.1ce Potentially vulnerable (18.06.1ce-6.24.amzn1)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0 and MIT and BSD and MPLv2.0 and WTFPL
  • Links(s):

docker

18.06.1ce Potentially vulnerable (18.06.1ce-7.25.amzn1)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0 and MIT and BSD and MPLv2.0 and WTFPL
  • Links(s):

docker

18.06.1ce Potentially vulnerable (18.06.1ce-2.16.amzn1)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0 and MIT and BSD and MPLv2.0 and WTFPL
  • Links(s):

docker

18.06.1ce Potentially vulnerable (18.06.1ce-8.28.amzn1)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0 and MIT and BSD and MPLv2.0 and WTFPL
  • Links(s):

docker

18.06.1ce Potentially vulnerable (18.06.1ce-5.22.amzn1)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0 and MIT and BSD and MPLv2.0 and WTFPL
  • Links(s):

docker

18.06.1ce Potentially vulnerable (18.06.1ce-10.32.amzn1)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0 and MIT and BSD and MPLv2.0 and WTFPL
  • Links(s):

docker

18.03.1ce Potentially vulnerable (18.03.1ce-2.141.amzn1)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0 and MIT and BSD and MPLv2.0 and WTFPL
  • Links(s):

docker

18.03.1ce Potentially vulnerable (18.03.1ce-5.0.amzn1)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0 and MIT and BSD and MPLv2.0 and WTFPL
  • Links(s):

docker

17.12.1ce Potentially vulnerable (17.12.1ce-1.135.amzn1)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0 and MIT and BSD and MPLv2.0 and WTFPL
  • Links(s):
Apertis v2020
v2020/development

docker.io

18.09.1 Potentially vulnerable (18.09.1+dfsg1-7.1+deb10u3+apertis1)
Apertis v2021
v2021/development

docker.io

18.09.1 Potentially vulnerable (18.09.1+dfsg1-7.1+deb10u2)
Apertis v2022 Development
v2022dev2/development

docker.io

20.10.4 (20.10.4+dfsg1-1apertis3)
Arch
community

docker

20.10.8 (1:20.10.8-1)

docker-bin

20.10.8 (20.10.8-2)

docker-git

r39078.b5ea9abf25 (1:r39078.b5ea9abf25-1)
Artix
galaxy

docker

20.10.8 (1:20.10.8-1)
  • Summary:
    Pack, ship and run any application as a lightweight container
  • License:
    • Apache
  • Links(s):

docker.io

18.09.7 Potentially vulnerable (18.09.7-0ubuntu1~18.04.4)

docker.io

18.09.7 Potentially vulnerable (18.09.7-0ubuntu1~18.04.4)

docker

20.10.7
CentOS 7
extras

docker

1.13.1 Potentially vulnerable (2:1.13.1-103.git7f2769b.el7.centos)
CentOS 7
extras

docker

1.13.1 Potentially vulnerable (2:1.13.1-108.git4ef4b30.el7.centos)
CentOS 7
extras

docker

1.13.1 Potentially vulnerable (2:1.13.1-109.gitcccb291.el7.centos)
CentOS 7
extras

docker

1.13.1 Potentially vulnerable (2:1.13.1-161.git64e9980.el7_8)
CentOS 7
extras

docker

1.13.1 Potentially vulnerable (2:1.13.1-162.git64e9980.el7.centos)
CentOS 7
extras

docker

1.13.1 Potentially vulnerable (2:1.13.1-203.git0be3e21.el7.centos)
CentOS 7
extras

docker

1.13.1 Potentially vulnerable (2:1.13.1-204.git0be3e21.el7)
CentOS 7
extras

docker

1.13.1 Potentially vulnerable (2:1.13.1-205.git7d71120.el7.centos)
CentOS 7
extras

docker

1.13.1 Potentially vulnerable (2:1.13.1-206.git7d71120.el7_9)
CentOS 7
extras

docker

1.13.1 Potentially vulnerable (2:1.13.1-208.git7d71120.el7_9)
Chakra
desktop

docker

18.09.9 Potentially vulnerable (18.09.9-2)

docker

19.03.8 Potentially vulnerable (19.03.8-1)
  • Summary:
    Pack, ship and run any application as a lightweight container
  • License:
    • Apache
  • Links(s):

[Deprecated] Docker CLI

99.0.0
CRUX 3.4
contrib

docker

18.09.6 Potentially vulnerable
CRUX 3.5
contrib

docker

19.03.14 Potentially vulnerable
CRUX 3.6
contrib

docker

20.10.8
Deepin
main

docker.io

18.09.1 Potentially vulnerable (18.09.1+dfsg1-7.1)

docker.io

18.09.1 Potentially vulnerable (18.09.1+dfsg1-7.1+deb10u3)

docker

20.10.8
Fedora 26
updates

docker

1.13.1 Potentially vulnerable (2:1.13.1-44.git584d391.fc26)
Fedora 26
release

docker

1.13.1 Potentially vulnerable (2:1.13.1-19.git27e468e.fc26)
Fedora 27
release

docker

1.13.1 Potentially vulnerable (2:1.13.1-26.gitb5e3294.fc27)
Fedora 27
updates

docker

1.13.1 Potentially vulnerable (2:1.13.1-60.git9cb56fd.fc27)
Fedora 28
release

docker

1.13.1 Potentially vulnerable (2:1.13.1-51.git4032bd5.fc28)
Fedora 28
updates

docker

1.13.1 Potentially vulnerable (2:1.13.1-65.git1185cfd.fc28)
Fedora 29
updates

docker

1.13.1 Potentially vulnerable (2:1.13.1-68.git47e2230.fc29)
Fedora 29
release

docker

1.13.1 Potentially vulnerable (2:1.13.1-62.git9cb56fd.fc29)
Fedora 30
release

docker

1.13.1 Potentially vulnerable (2:1.13.1-66.git1185cfd.fc30)
Fedora 30
updates

docker

1.13.1 Potentially vulnerable (2:1.13.1-68.git47e2230.fc30)

sysutils/docker

18.09.5 Potentially vulnerable (18.09.5_1)

docker

17.05.0-ce Potentially vulnerable
Funtoo 1.4
core-kit

app-emulation/docker

20.10.8
Funtoo 1.4
core-kit

app-emulation/docker

19.03.8 Potentially vulnerable (19.03.8-r2)

app-emulation/docker

20.10.8

app-emulation/docker

20.10.7

docker

19.03.15

docker

20.10.8
KaOS
apps

docker

20.10.8 (20.10.8-1)

app-emulation/docker

20.10.8

app-emulation/docker

20.10.7

app-emulation/docker

20.10.8

app-emulation/docker

20.10.7

docker

20.10.8

docker

20.10.8
Mageia 7
core/updates

docker

18.09.9 Potentially vulnerable (18.09.9-1.1.mga7)
Mageia 7
core/updates

docker

18.09.9 Potentially vulnerable (18.09.9-1.2.mga7)
Mageia 7
core/updates

docker

18.09.9 Potentially vulnerable (18.09.9-1.mga7)
Mageia 7
core/updates

docker

18.09.8 Potentially vulnerable (18.09.8-1.mga7)
Mageia 7
core/release

docker

18.09.3 Potentially vulnerable (18.09.3-2.mga7)
Mageia 8
core/updates

docker

20.10.5 (20.10.5-1.mga8)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • System/Configuration
  • License:
    • ASL 2.0
  • Links(s):
Mageia 8
core/release

docker

19.03.15 (19.03.15-1.mga8)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • System/Configuration
  • License:
    • ASL 2.0
  • Links(s):
Mageia Cauldron
core/release

docker

19.03.15 (19.03.15-1.mga8)
Manjaro Stable
community

docker

20.10.8 (1:20.10.8-1)
  • Summary:
    Pack, ship and run any application as a lightweight container
  • License:
    • Apache
  • Links(s):
Manjaro Testing
community

docker

20.10.8 (1:20.10.8-1)
  • Summary:
    Pack, ship and run any application as a lightweight container
  • License:
    • Apache
  • Links(s):

docker

20.10.8 (1:20.10.8-1)
  • Summary:
    Pack, ship and run any application as a lightweight container
  • License:
    • Apache
  • Links(s):

docker

20.10.7

docker

20.10.7

docker

20.10.8

docker

20.10.8
openmamba
devel

docker

20.10.8 (20.10.8-1mamba)
OpenMandriva 4.0
main/release

docker

18.09.6 Potentially vulnerable (1:18.09.6-2)
OpenMandriva Cooker
main/release

docker

20.10.8 (1:20.10.8-3)

docker

20.10.1.20210102 Potentially vulnerable
  • Summary:
    Docker Command-Line Interface
  • Category:
    • Filesystem
  • License:
    • Apache
  • Links(s):
openSUSE Leap 42.3
updates/oss

docker

18.09.1_ce Potentially vulnerable (18.09.1_ce-54.1)
openSUSE Leap 42.3
updates/oss

docker

18.06.1_ce Potentially vulnerable (18.06.1_ce-48.2)
openSUSE Leap 42.3
updates/oss

docker

18.06.1_ce Potentially vulnerable (18.06.1_ce-51.1)
openSUSE Leap 42.3
updates/oss

docker

17.09.1_ce Potentially vulnerable (17.09.1_ce-36.1)
openSUSE Leap 42.3
updates/oss

docker

17.09.1_ce Potentially vulnerable (17.09.1_ce-39.1)
openSUSE Leap 42.3
updates/oss

docker

17.09.1_ce Potentially vulnerable (17.09.1_ce-42.1)
openSUSE Leap 42.3
updates/oss

docker

17.09.1_ce Potentially vulnerable (17.09.1_ce-45.1)
openSUSE Leap 42.3
updates/oss

docker

17.04.0_ce Potentially vulnerable (17.04.0_ce-33.11)

docker

1.12.6 Potentially vulnerable (1.12.6-31.15)
openSUSE Leap 15.0
updates/oss

docker

19.03.1_ce Potentially vulnerable (19.03.1_ce-lp150.5.27.1)
openSUSE Leap 15.0
updates/oss

docker

18.09.6_ce Potentially vulnerable (18.09.6_ce-lp150.5.17.2)
openSUSE Leap 15.0
updates/oss

docker

18.09.6_ce Potentially vulnerable (18.09.6_ce-lp150.5.20.1)
openSUSE Leap 15.0
updates/oss

docker

18.09.6_ce Potentially vulnerable (18.09.6_ce-lp150.5.23.1)

docker

17.09.1_ce Potentially vulnerable (17.09.1_ce-lp150.4.2)
openSUSE Leap 15.1
updates/oss

docker

19.03.11_ce Potentially vulnerable (19.03.11_ce-lp151.2.18.1)
openSUSE Leap 15.1
updates/oss

docker

19.03.5_ce Potentially vulnerable (19.03.5_ce-lp151.2.15.1)
openSUSE Leap 15.1
updates/oss

docker

19.03.1_ce Potentially vulnerable (19.03.1_ce-lp151.2.12.1)
openSUSE Leap 15.1
updates/oss

docker

18.09.6_ce Potentially vulnerable (18.09.6_ce-lp151.2.3.1)
openSUSE Leap 15.1
updates/oss

docker

18.09.6_ce Potentially vulnerable (18.09.6_ce-lp151.2.6.1)
openSUSE Leap 15.1
updates/oss

docker

18.09.6_ce Potentially vulnerable (18.09.6_ce-lp151.2.9.1)

docker

18.09.1_ce Potentially vulnerable (18.09.1_ce-lp151.1.2)
openSUSE Leap 15.2
updates/oss

docker

20.10.6_ce (20.10.6_ce-lp152.2.12.1)
openSUSE Leap 15.2
updates/oss

docker

19.03.15_ce Potentially vulnerable (19.03.15_ce-lp152.2.3.1)
openSUSE Leap 15.2
updates/oss

docker

19.03.15_ce Potentially vulnerable (19.03.15_ce-lp152.2.6.1)
openSUSE Leap 15.2
updates/oss

docker

19.03.15_ce Potentially vulnerable (19.03.15_ce-lp152.2.9.1)

docker

19.03.11_ce Potentially vulnerable (19.03.11_ce-lp152.1.1)

docker

19.03.15_ce Potentially vulnerable (19.03.15_ce-6.46.1)

docker

20.10.6_ce (20.10.6_ce-1.2)

docker

20.10.8 (20.10.8-1)
Parabola
community

docker

20.10.8 (1:20.10.8-1)

docker.io

18.09.1 Potentially vulnerable (18.09.1+dfsg1-7.1+deb10u3)
Pardus 19
updates/main

docker.io

18.09.1 Potentially vulnerable (18.09.1+dfsg1-7.1+deb10u3)

docker

19.03.15

docker

1.5 Potentially vulnerable (1.5-2)

docker.io

18.09.1 Potentially vulnerable (18.09.1+dfsg1-7.1+deb10u2)

docker.io

18.09.1 Potentially vulnerable (18.09.1+dfsg1-7.1+deb10u3)

docker

1.5 Potentially vulnerable (1.5-2)

docker.io

18.09.1 Potentially vulnerable (18.09.1+dfsg1-7.1+rpi1+deb10u3)
Rosa 2014.1
main/updates

docker

1.11.2 Potentially vulnerable (1.11.2-2)
Rosa 2016.1
main/updates

docker

19.03.13 Potentially vulnerable (19.03.13-1)
Rosa 2016.1
main/testing

docker

19.03.7 Potentially vulnerable (19.03.7-1)
Rosa 2016.1
main/release

docker

1.11.2 Potentially vulnerable (1.11.2-4)
Rosa 2019.1
main/release

docker

20.10.8 (1:20.10.8-2)
Rosa Server 6.9
extra/updates

docker-io

1.7.1 Potentially vulnerable (1.7.1-4.res6)
Rosa Server 7.3
base/release

docker

1.8.2 Potentially vulnerable (1.8.2-10.res7c)
Rosa Server 7.5
base/release

docker

1.8.2 Potentially vulnerable (1.8.2-10.res7c)

docker

19.03.13 Potentially vulnerable
  • Summary:
    docker (manager for applications in Linux containers)

docker

0.11.1 Potentially vulnerable (0.11.1-19.el7)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0
  • Links(s):
Scoop
main

docker

19.03.1 Potentially vulnerable

docker

20.10.7

docker-dbginfo

20.10.7

docker

20.10.2 Potentially vulnerable
Trisquel 7.0
belenos-updates/main

docker.io

1.6.2 Potentially vulnerable (1.6.2~dfsg1-1ubuntu4~14.04.1)
Trisquel 7.0
belenos/main

docker.io

0.9.1 Potentially vulnerable (0.9.1~dfsg1-2)
Trisquel 8.0
flidas-updates/main

docker.io

18.09.7 Potentially vulnerable (18.09.7-0ubuntu1~16.04.7)
Trisquel 8.0
flidas/main

docker.io

1.10.3 Potentially vulnerable (1.10.3-0ubuntu6)
Trisquel 9.0
etiona-updates/main

docker.io

20.10.7 (20.10.7-0ubuntu1~18.04.1)
Trisquel 9.0
etiona/main

docker.io

17.12.1 Potentially vulnerable (17.12.1-0ubuntu1)

Docker

20.10.7