Search for packages
| purl | pkg:deb/debian/pcs@0.12.0.2-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-3bdn-5bra-5kbr | pcs: Command injection with root privileges. |
CVE-2015-5190
|
| VCID-9253-hxxf-b3ds | pcs: Cross-Site Request Forgery in web UI |
CVE-2016-0720
|
| VCID-au19-kepf-pyhe | security update |
CVE-2018-1086
|
| VCID-hjzc-ca2p-pyf8 | pcs: obtaining an authentication token for hacluster user could lead to privilege escalation |
CVE-2022-2735
|
| VCID-hs6e-5g21-c7cx | pcs: improper web session variable signing |
CVE-2015-3983
|
| VCID-jmq9-4ac2-c7de | pcs: improper authentication via PAM |
CVE-2022-1049
|
| VCID-p3c7-4pkf-1qg7 | pcs: cookies are not invalidated upon logout |
CVE-2016-0721
|
| VCID-q6mh-54hq-3yfa | pcs: improper web session variable signing |
CVE-2015-1848
|
| VCID-wrhk-ya3a-bbfz | pcs: Privilege escalation via authorized user malicious REST call |
CVE-2018-1079
|
| VCID-xmq8-39wj-fqgp | pcs: Improper node name field validation when creating clusters leads to XSS |
CVE-2017-2661
|
| VCID-yscv-wf2k-wbf1 | pcs: Incorrect authorization when using pcs web UI |
CVE-2015-5189
|