Total vulnerabilities in the database
Kubernetes before 1.2.0-alpha.5 allows remote attackers to read arbitrary pod logs via a container name.
Software | From | Fixed in |
---|---|---|
kubernetes / kubernetes | - | 1.2.0.x |
redhat / openshift | 3.1 | 3.1.x |
redhat / openshift | 3.0 | 3.0.x |
![]() |
- | 1.2.0 |