{"url":"http://public2.vulnerablecode.io/api/packages/934572?format=json","purl":"pkg:deb/debian/pcs@0.11.5-1%2Bdeb12u1?distro=trixie","type":"deb","namespace":"debian","name":"pcs","version":"0.11.5-1+deb12u1","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"0.12.0.2-1","latest_non_vulnerable_version":"0.12.2-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85538?format=json","vulnerability_id":"VCID-3bdn-5bra-5kbr","summary":"pcs: Command injection with root privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5190.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5190.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5190","reference_id":"","reference_type":"","scores":[{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.7019","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.70202","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.70219","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.70196","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.70242","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.70257","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.7028","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.70265","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.70253","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.70294","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.70303","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.70285","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.70338","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.70346","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.70344","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.70316","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5190"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252813","reference_id":"1252813","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252813"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1700","reference_id":"RHSA-2015:1700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1700"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934573?format=json","purl":"pkg:deb/debian/pcs@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934574?format=json","purl":"pkg:deb/debian/pcs@0.10.8-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.10.8-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934572?format=json","purl":"pkg:deb/debian/pcs@0.11.5-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.11.5-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934576?format=json","purl":"pkg:deb/debian/pcs@0.12.0.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.0.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934575?format=json","purl":"pkg:deb/debian/pcs@0.12.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.2-1%3Fdistro=trixie"}],"aliases":["CVE-2015-5190"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3bdn-5bra-5kbr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85329?format=json","vulnerability_id":"VCID-9253-hxxf-b3ds","summary":"pcs: Cross-Site Request Forgery in web UI","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178261.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178261.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178384.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178384.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2596.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2596.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0720.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0720.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0720","reference_id":"","reference_type":"","scores":[{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51381","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51437","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51389","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.5144","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51467","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51426","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.5148","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51478","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51521","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.515","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51487","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.5153","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51538","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51516","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.5147","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51476","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0720"},{"reference_url":"https://github.com/ClusterLabs/pcs/commit/b9e7f061788c3b86a0c67d2d4158f067ec5eb625","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/ClusterLabs/pcs/commit/b9e7f061788c3b86a0c67d2d4158f067ec5eb625"},{"reference_url":"http://www.securityfocus.com/bid/97984","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/97984"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1299614","reference_id":"1299614","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1299614"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:clusterlabs:pcs:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:clusterlabs:pcs:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:clusterlabs:pcs:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0720","reference_id":"CVE-2016-0720","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0720"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2596","reference_id":"RHSA-2016:2596","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2596"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934577?format=json","purl":"pkg:deb/debian/pcs@0.9.149-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.9.149-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934574?format=json","purl":"pkg:deb/debian/pcs@0.10.8-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.10.8-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934572?format=json","purl":"pkg:deb/debian/pcs@0.11.5-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.11.5-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934576?format=json","purl":"pkg:deb/debian/pcs@0.12.0.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.0.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934575?format=json","purl":"pkg:deb/debian/pcs@0.12.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.2-1%3Fdistro=trixie"}],"aliases":["CVE-2016-0720"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9253-hxxf-b3ds"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73382?format=json","vulnerability_id":"VCID-au19-kepf-pyhe","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1086.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1086.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1086","reference_id":"","reference_type":"","scores":[{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42067","published_at":"2026-04-01T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42126","published_at":"2026-04-02T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42154","published_at":"2026-04-04T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42092","published_at":"2026-04-07T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42144","published_at":"2026-04-08T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42155","published_at":"2026-04-09T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42176","published_at":"2026-04-11T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-12T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42113","published_at":"2026-04-13T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42165","published_at":"2026-04-16T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42139","published_at":"2026-04-18T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42069","published_at":"2026-04-21T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42012","published_at":"2026-04-24T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42007","published_at":"2026-04-26T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41924","published_at":"2026-04-29T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41781","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1086"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1086","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1086"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1557366","reference_id":"1557366","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1557366"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=895313","reference_id":"895313","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=895313"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1927","reference_id":"RHSA-2018:1927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1927"},{"reference_url":"https://usn.ubuntu.com/7614-1/","reference_id":"USN-7614-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7614-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934579?format=json","purl":"pkg:deb/debian/pcs@0.9.164-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.9.164-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934574?format=json","purl":"pkg:deb/debian/pcs@0.10.8-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.10.8-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934572?format=json","purl":"pkg:deb/debian/pcs@0.11.5-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.11.5-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934576?format=json","purl":"pkg:deb/debian/pcs@0.12.0.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.0.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934575?format=json","purl":"pkg:deb/debian/pcs@0.12.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.2-1%3Fdistro=trixie"}],"aliases":["CVE-2018-1086"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-au19-kepf-pyhe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79084?format=json","vulnerability_id":"VCID-hjzc-ca2p-pyf8","summary":"pcs: obtaining an authentication token for hacluster user could lead to privilege escalation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2735.json","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2735.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2735","reference_id":"","reference_type":"","scores":[{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13629","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13691","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.1349","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13571","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13622","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13594","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13556","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13508","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.1342","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13416","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13497","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13469","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13361","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13265","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2735"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1049","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1049"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2735","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2735"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1018930","reference_id":"1018930","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1018930"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2116815","reference_id":"2116815","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2116815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6312","reference_id":"RHSA-2022:6312","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6312"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6313","reference_id":"RHSA-2022:6313","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6313"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6314","reference_id":"RHSA-2022:6314","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6314"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6341","reference_id":"RHSA-2022:6341","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6341"},{"reference_url":"https://usn.ubuntu.com/7614-1/","reference_id":"USN-7614-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7614-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934574?format=json","purl":"pkg:deb/debian/pcs@0.10.8-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.10.8-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934581?format=json","purl":"pkg:deb/debian/pcs@0.11.3-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.11.3-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934572?format=json","purl":"pkg:deb/debian/pcs@0.11.5-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.11.5-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934576?format=json","purl":"pkg:deb/debian/pcs@0.12.0.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.0.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934575?format=json","purl":"pkg:deb/debian/pcs@0.12.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.2-1%3Fdistro=trixie"}],"aliases":["CVE-2022-2735"],"risk_score":3.8,"exploitability":"0.5","weighted_severity":"7.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hjzc-ca2p-pyf8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85672?format=json","vulnerability_id":"VCID-hs6e-5g21-c7cx","summary":"pcs: improper web session variable signing","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3983.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3983.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3983","reference_id":"","reference_type":"","scores":[{"value":"0.006","scoring_system":"epss","scoring_elements":"0.6938","published_at":"2026-04-01T12:55:00Z"},{"value":"0.006","scoring_system":"epss","scoring_elements":"0.69392","published_at":"2026-04-02T12:55:00Z"},{"value":"0.006","scoring_system":"epss","scoring_elements":"0.69408","published_at":"2026-04-04T12:55:00Z"},{"value":"0.006","scoring_system":"epss","scoring_elements":"0.69388","published_at":"2026-04-07T12:55:00Z"},{"value":"0.006","scoring_system":"epss","scoring_elements":"0.69438","published_at":"2026-04-08T12:55:00Z"},{"value":"0.006","scoring_system":"epss","scoring_elements":"0.69454","published_at":"2026-04-09T12:55:00Z"},{"value":"0.006","scoring_system":"epss","scoring_elements":"0.69476","published_at":"2026-04-11T12:55:00Z"},{"value":"0.006","scoring_system":"epss","scoring_elements":"0.69461","published_at":"2026-04-12T12:55:00Z"},{"value":"0.006","scoring_system":"epss","scoring_elements":"0.69447","published_at":"2026-04-13T12:55:00Z"},{"value":"0.006","scoring_system":"epss","scoring_elements":"0.69485","published_at":"2026-04-16T12:55:00Z"},{"value":"0.006","scoring_system":"epss","scoring_elements":"0.69496","published_at":"2026-04-18T12:55:00Z"},{"value":"0.006","scoring_system":"epss","scoring_elements":"0.69477","published_at":"2026-04-21T12:55:00Z"},{"value":"0.006","scoring_system":"epss","scoring_elements":"0.69529","published_at":"2026-04-24T12:55:00Z"},{"value":"0.006","scoring_system":"epss","scoring_elements":"0.69537","published_at":"2026-04-26T12:55:00Z"},{"value":"0.006","scoring_system":"epss","scoring_elements":"0.69542","published_at":"2026-04-29T12:55:00Z"},{"value":"0.006","scoring_system":"epss","scoring_elements":"0.69518","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3983"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1208294","reference_id":"1208294","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1208294"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0980","reference_id":"RHSA-2015:0980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0980"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0990","reference_id":"RHSA-2015:0990","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0990"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934573?format=json","purl":"pkg:deb/debian/pcs@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934574?format=json","purl":"pkg:deb/debian/pcs@0.10.8-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.10.8-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934572?format=json","purl":"pkg:deb/debian/pcs@0.11.5-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.11.5-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934576?format=json","purl":"pkg:deb/debian/pcs@0.12.0.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.0.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934575?format=json","purl":"pkg:deb/debian/pcs@0.12.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.2-1%3Fdistro=trixie"}],"aliases":["CVE-2015-3983"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hs6e-5g21-c7cx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79578?format=json","vulnerability_id":"VCID-jmq9-4ac2-c7de","summary":"pcs: improper authentication via PAM","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1049.json","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1049.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1049","reference_id":"","reference_type":"","scores":[{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.5076","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50816","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50841","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50799","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50856","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50853","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50895","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50872","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50857","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50894","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50901","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50879","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50829","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50838","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50797","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50721","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1049"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1049","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1049"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2735","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2735"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2066629","reference_id":"2066629","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2066629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7447","reference_id":"RHSA-2022:7447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7935","reference_id":"RHSA-2022:7935","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7935"},{"reference_url":"https://usn.ubuntu.com/7614-1/","reference_id":"USN-7614-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7614-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934574?format=json","purl":"pkg:deb/debian/pcs@0.10.8-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.10.8-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934580?format=json","purl":"pkg:deb/debian/pcs@0.11.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.11.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934572?format=json","purl":"pkg:deb/debian/pcs@0.11.5-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.11.5-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934576?format=json","purl":"pkg:deb/debian/pcs@0.12.0.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.0.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934575?format=json","purl":"pkg:deb/debian/pcs@0.12.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.2-1%3Fdistro=trixie"}],"aliases":["CVE-2022-1049"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jmq9-4ac2-c7de"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85330?format=json","vulnerability_id":"VCID-p3c7-4pkf-1qg7","summary":"pcs: cookies are not invalidated upon logout","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178261.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178261.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178384.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178384.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2596.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2596.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0721.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0721.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0721","reference_id":"","reference_type":"","scores":[{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63446","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63474","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63333","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63393","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.6342","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63385","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63437","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63455","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63472","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63456","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63454","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63462","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63448","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63466","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63478","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0721"},{"reference_url":"https://github.com/ClusterLabs/pcs/commit/acdbbe8307e6f4a36b2c7754765e732e43fe8d17","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/ClusterLabs/pcs/commit/acdbbe8307e6f4a36b2c7754765e732e43fe8d17"},{"reference_url":"https://github.com/ClusterLabs/pcs/commit/bc6ad9086857559db57f4e3e6de66762291c0774","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/ClusterLabs/pcs/commit/bc6ad9086857559db57f4e3e6de66762291c0774"},{"reference_url":"https://github.com/ClusterLabs/pcs/commit/e9b28833d54a47ec441f6dbad0db96e1fc662a5b","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/ClusterLabs/pcs/commit/e9b28833d54a47ec441f6dbad0db96e1fc662a5b"},{"reference_url":"http://www.securityfocus.com/bid/97977","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/97977"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1299615","reference_id":"1299615","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1299615"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:clusterlabs:pcs:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:clusterlabs:pcs:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:clusterlabs:pcs:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0721","reference_id":"CVE-2016-0721","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0721"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2596","reference_id":"RHSA-2016:2596","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2596"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934577?format=json","purl":"pkg:deb/debian/pcs@0.9.149-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.9.149-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934574?format=json","purl":"pkg:deb/debian/pcs@0.10.8-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.10.8-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934572?format=json","purl":"pkg:deb/debian/pcs@0.11.5-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.11.5-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934576?format=json","purl":"pkg:deb/debian/pcs@0.12.0.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.0.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934575?format=json","purl":"pkg:deb/debian/pcs@0.12.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.2-1%3Fdistro=trixie"}],"aliases":["CVE-2016-0721"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p3c7-4pkf-1qg7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85671?format=json","vulnerability_id":"VCID-q6mh-54hq-3yfa","summary":"pcs: improper web session variable signing","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1848.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1848.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-1848","reference_id":"","reference_type":"","scores":[{"value":"0.0121","scoring_system":"epss","scoring_elements":"0.7894","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0121","scoring_system":"epss","scoring_elements":"0.78946","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0121","scoring_system":"epss","scoring_elements":"0.78974","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0121","scoring_system":"epss","scoring_elements":"0.78958","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0121","scoring_system":"epss","scoring_elements":"0.78983","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0121","scoring_system":"epss","scoring_elements":"0.78989","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0121","scoring_system":"epss","scoring_elements":"0.79013","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0121","scoring_system":"epss","scoring_elements":"0.78998","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0121","scoring_system":"epss","scoring_elements":"0.78988","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0121","scoring_system":"epss","scoring_elements":"0.79016","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0121","scoring_system":"epss","scoring_elements":"0.79012","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0121","scoring_system":"epss","scoring_elements":"0.79045","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0121","scoring_system":"epss","scoring_elements":"0.79052","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0121","scoring_system":"epss","scoring_elements":"0.79067","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0121","scoring_system":"epss","scoring_elements":"0.7908","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-1848"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1208294","reference_id":"1208294","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1208294"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0980","reference_id":"RHSA-2015:0980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0980"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0990","reference_id":"RHSA-2015:0990","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0990"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934573?format=json","purl":"pkg:deb/debian/pcs@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934574?format=json","purl":"pkg:deb/debian/pcs@0.10.8-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.10.8-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934572?format=json","purl":"pkg:deb/debian/pcs@0.11.5-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.11.5-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934576?format=json","purl":"pkg:deb/debian/pcs@0.12.0.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.0.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934575?format=json","purl":"pkg:deb/debian/pcs@0.12.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.2-1%3Fdistro=trixie"}],"aliases":["CVE-2015-1848"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q6mh-54hq-3yfa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83561?format=json","vulnerability_id":"VCID-wrhk-ya3a-bbfz","summary":"pcs: Privilege escalation via authorized user malicious REST call","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1079.json","reference_id":"","reference_type":"","scores":[{"value":"8.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1079.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1079","reference_id":"","reference_type":"","scores":[{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61051","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61128","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61156","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61121","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.6117","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61185","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61205","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61192","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61173","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61213","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61218","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61199","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61188","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61203","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61197","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61146","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1079"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1079","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1079"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1550243","reference_id":"1550243","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1550243"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=895314","reference_id":"895314","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=895314"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934579?format=json","purl":"pkg:deb/debian/pcs@0.9.164-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.9.164-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934574?format=json","purl":"pkg:deb/debian/pcs@0.10.8-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.10.8-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934572?format=json","purl":"pkg:deb/debian/pcs@0.11.5-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.11.5-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934576?format=json","purl":"pkg:deb/debian/pcs@0.12.0.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.0.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934575?format=json","purl":"pkg:deb/debian/pcs@0.12.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.2-1%3Fdistro=trixie"}],"aliases":["CVE-2018-1079"],"risk_score":3.9,"exploitability":"0.5","weighted_severity":"7.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wrhk-ya3a-bbfz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84498?format=json","vulnerability_id":"VCID-xmq8-39wj-fqgp","summary":"pcs: Improper node name field validation when creating clusters leads to XSS","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2661.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2661.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2661","reference_id":"","reference_type":"","scores":[{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.51301","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.51353","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.5138","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.51339","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.51393","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.51391","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.51434","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.51413","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.51399","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.51442","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.5145","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.51429","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.51378","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.51385","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.51345","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.51291","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2661"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1428948","reference_id":"1428948","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1428948"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858379","reference_id":"858379","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858379"},{"reference_url":"https://usn.ubuntu.com/7614-1/","reference_id":"USN-7614-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7614-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934578?format=json","purl":"pkg:deb/debian/pcs@0.9.155%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.9.155%252Bdfsg-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934574?format=json","purl":"pkg:deb/debian/pcs@0.10.8-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.10.8-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934572?format=json","purl":"pkg:deb/debian/pcs@0.11.5-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.11.5-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934576?format=json","purl":"pkg:deb/debian/pcs@0.12.0.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.0.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934575?format=json","purl":"pkg:deb/debian/pcs@0.12.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.2-1%3Fdistro=trixie"}],"aliases":["CVE-2017-2661"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xmq8-39wj-fqgp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85537?format=json","vulnerability_id":"VCID-yscv-wf2k-wbf1","summary":"pcs: Incorrect authorization when using pcs web UI","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5189.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5189.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5189","reference_id":"","reference_type":"","scores":[{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32808","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.3294","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32975","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32798","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32845","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32874","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32875","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32837","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32811","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32853","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.3283","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32795","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32645","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.3253","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32446","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32308","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5189"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252805","reference_id":"1252805","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252805"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1700","reference_id":"RHSA-2015:1700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1700"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934573?format=json","purl":"pkg:deb/debian/pcs@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934574?format=json","purl":"pkg:deb/debian/pcs@0.10.8-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.10.8-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934572?format=json","purl":"pkg:deb/debian/pcs@0.11.5-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.11.5-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934576?format=json","purl":"pkg:deb/debian/pcs@0.12.0.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.0.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934575?format=json","purl":"pkg:deb/debian/pcs@0.12.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.2-1%3Fdistro=trixie"}],"aliases":["CVE-2015-5189"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yscv-wf2k-wbf1"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.11.5-1%252Bdeb12u1%3Fdistro=trixie"}