Home / Vulnerability Database / Config files : Docker daemon socket exposure
Config files
Config files : Docker daemon socket exposure
Classification
CWE
Overview
If your docker daemon is running with -H tcp://0.0.0.0:XXX or similar it is exposing un-encrypted and un-authenticated direct access to the Docker daemon.
MEDIUM
DerScanner Severity Score
Do you want to fix Config files : Docker daemon socket exposure in your application?
See also
Config files
Config files : Text4Shell Vulnerability
Config files
Config files : Incorrect directory deletion
Config files
