Total vulnerabilities in the database
The pcs daemon (pcsd) in PCS 0.9.137 and earlier does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. NOTE: this issue was SPLIT per ADT2 due to different vulnerability types. CVE-2015-3983 is for the issue with not setting the HTTPOnly flag.
Software | From | Fixed in |
---|---|---|
fedora / pacemaker_configuration_system | - | 0.9.137.x |
redhat / enterprise_linux_resilient_storage_eus | 7.1 | 7.1.x |
redhat / enterprise_linux_high_availability_eus | 6.6.z | 6.6.z.x |
redhat / enterprise_linux_resilient_storage_eus | 6.6.z | 6.6.z.x |
redhat / enterprise_linux_high_availability | 6.0 | 6.0.x |
redhat / enterprise_linux_resilient_storage | 7.0 | 7.0.x |
redhat / enterprise_linux_resilient_storage | 6.0 | 6.0.x |
redhat / enterprise_linux_high_availability | 7.0 | 7.0.x |
redhat / enterprise_linux_high_availability_eus | 7.1 | 7.1.x |