Total vulnerabilities in the database
Red Hat OpenShift Enterprise before 2.2 does not properly restrict access to gears, which allows remote attackers to access the network resources of arbitrary gears via unspecified vectors.
Software | From | Fixed in |
---|---|---|
redhat / openshift | 2.1.2 | 2.1.2.x |
redhat / openshift | 2.0.6 | 2.0.6.x |
redhat / openshift | 2.1.5 | 2.1.5.x |
redhat / openshift | 2.1 | 2.1.x |
redhat / openshift | 2.0.5 | 2.0.5.x |
redhat / openshift | 2.0.2 | 2.0.2.x |
redhat / openshift | 2.1.1 | 2.1.1.x |
redhat / openshift | 2.0.1 | 2.0.1.x |
redhat / openshift | - | 2.1.8.x |
redhat / openshift | 2.1.7 | 2.1.7.x |
redhat / openshift | 2.1.4 | 2.1.4.x |
redhat / openshift | 2.0.3 | 2.0.3.x |
redhat / openshift | 2.1.3 | 2.1.3.x |
redhat / openshift | 2.0.4 | 2.0.4.x |
redhat / openshift | 2.1.6 | 2.1.6.x |
redhat / openshift | 2.0 | 2.0.x |