Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vp3g-8qhm-pw5j

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The pcs daemon (pcsd) in PCS 0.9.137 and earlier does not include the HTTPOnly flag in a Set-Cookie header, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie. NOTE: this issue was SPLIT from CVE-2015-1848 per ADT2 due to different vulnerability types.

The pcs daemon (pcsd) in PCS 0.9.137 and earlier does not include the HTTPOnly flag in a Set-Cookie header, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie. NOTE: this issue was SPLIT from CVE-2015-1848 per ADT2 due to different vulnerability types.

EPSS

Процентиль: 69%
0.006
Низкий

Связанные уязвимости

redhat
больше 10 лет назад

The pcs daemon (pcsd) in PCS 0.9.137 and earlier does not include the HTTPOnly flag in a Set-Cookie header, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie. NOTE: this issue was SPLIT from CVE-2015-1848 per ADT2 due to different vulnerability types.

nvd
больше 10 лет назад

The pcs daemon (pcsd) in PCS 0.9.137 and earlier does not include the HTTPOnly flag in a Set-Cookie header, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie. NOTE: this issue was SPLIT from CVE-2015-1848 per ADT2 due to different vulnerability types.

debian
больше 10 лет назад

The pcs daemon (pcsd) in PCS 0.9.137 and earlier does not include the ...

EPSS

Процентиль: 69%
0.006
Низкий