CVE-2019-10200

Source
https://cve.org/CVERecord?id=CVE-2019-10200
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-10200.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2019-10200
Published
2021-03-19T21:15:11.713Z
Modified
2026-02-15T07:39:45.382153Z
Severity
  • 7.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A flaw was discovered in OpenShift Container Platform 4 where, by default, users with access to create pods also have the ability to schedule workloads on master nodes. Pods with permission to access the host network, running on master nodes, can retrieve security credentials for the master AWS IAM role, allowing management access to AWS resources. With access to the security credentials, the user then has access to the entire infrastructure. Impact to data and system availability is high.

References

Affected packages

Git / github.com/xtermjs/xterm.js

Affected ranges

Type
GIT
Repo
https://github.com/xtermjs/xterm.js
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

0.*
0.10
0.11
0.12
0.13
0.14
0.15
0.16
0.17
0.18
0.19
0.20
0.21
0.22
0.23
0.24
0.25
0.26
0.27
0.29
0.3
0.30
0.31
0.32
0.33
0.4
0.5
0.6
0.7
0.8
0.9
0.9.1
0.9.2
0.9.3
1.*
1.0.0
1.1.0
1.1.1
1.1.2
1.1.3
2.*
2.0.0
2.0.1
2.1.0
2.2.0
2.2.1
2.2.2
2.2.3
2.3.0
2.3.1
2.3.2
2.4.0
2.5.0
2.6.0
2.7.0
2.8.0
2.8.1
2.9.0
2.9.1
2.9.2
3.*
3.0.0
3.1.0
3.10.0
3.11.0
3.12.0
3.13.0
3.14.0
3.2.0
3.3.0
3.4.0
3.5.0
3.6.0
3.7.0
3.8.0
3.9.0
4.*
4.0.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-10200.json"