Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Pacemaker_configuration_system
(Fedora)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 2 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2015-05-14 | CVE-2015-1848 | The pcs daemon (pcsd) in PCS 0.9.137 and earlier does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. NOTE: this issue was SPLIT per ADT2 due to different vulnerability types. CVE-2015-3983 is for the issue with not setting the HTTPOnly flag. | Pacemaker_configuration_system, Enterprise_linux_high_availability, Enterprise_linux_high_availability_eus, Enterprise_linux_resilient_storage, Enterprise_linux_resilient_storage_eus | N/A | ||
2015-05-14 | CVE-2015-3983 | The pcs daemon (pcsd) in PCS 0.9.137 and earlier does not include the HTTPOnly flag in a Set-Cookie header, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie. NOTE: this issue was SPLIT from CVE-2015-1848 per ADT2 due to different vulnerability types. | Pacemaker_configuration_system | N/A |