Filter

ClusterLabs HawkOS Command Injection, Code Injection

First published (updated )

ubuntu/libqbBuffer Overflow

First published (updated )

ClusterLabs pcsIt was discovered that an update for PCS package in RHBA-2023:2151 erratum released as part of Red H…

First published (updated )

redhat/pacemakerAn ACL bypass flaw was found in pacemaker. An attacker having a local account on the cluster and in …

First published (updated )

Canonical Ubuntu LinuxLast updated 24 July 2024

8.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Fedoraproject FedoraCSRF

8.8
First published (updated )

Redhat Enterprise Linux Server EusAn authorization flaw was found in Pacemaker before 1.1.16, where it did not properly guard its IPC …

8.8
First published (updated )

Debian Debian LinuxA flaw was found in the Pacemaker configuration tool (pcs). The pcs daemon was allowing expired acco…

8.8
First published (updated )

ClusterLabs HawkAn issue was discovered in ClusterLabs Hawk (aka HA Web Konsole) through 2.3.0-15. It ships the bina…

8.8
First published (updated )

Clusterlabs Pacemaker Command Line InterfacePath Traversal

8.7
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Fedoraproject FedoraSession fixation vulnerability in pcsd in pcs before 0.9.157.

8.1
First published (updated )

debian/pcsA vulnerability was found in the PCS project. This issue occurs due to incorrect permissions on a Un…

7.8
First published (updated )

ubuntu/crmshOS Command Injection, Code Injection

7.8
First published (updated )

Canonical Ubuntu LinuxUse After Free

7.5
First published (updated )

Redhat Enterprise Linux High AvailabilityPacemaker before 1.1.13 does not properly evaluate added nodes, which allows remote read-only users …

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Clusterlabs PacemakerPacemaker before 1.1.15, when using pacemaker remote, might allow remote attackers to cause a denial…

7.5
First published (updated )

Clusterlabs Pacemaker Command Line InterfaceInfoleak, Input Validation

7.5
First published (updated )

Clusterlabs Libqblibqb before 1.0.5 allows local users to overwrite arbitrary files via a symlink attack, because it …

7.1
First published (updated )

Debian Debian LinuxThe authfile directive in the booth config file is ignored, preventing use of authentication in comm…

First published (updated )

Canonical Ubuntu LinuxLast updated 24 July 2024

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

redhat/pcsXSS

First published (updated )

Redhat Enterprise Linux For Power Little Endian EusBooth: specially crafted hash can lead to invalid hmac being accepted by booth server

First published (updated )

Clusterlabs Fence-agentsIn fence-agents before 4.0.17 does not verify remote SSL certificates in the fence_cisco_ucs.py scri…

First published (updated )

Clusterlabs Cluster Gluestonith-ng in pacemaker and cluster-glue passed passwords as commandline parameters, making it possi…

First published (updated )

Clusterlabs PacemakerPacemaker before 1.1.6 configure script creates temporary files insecurely

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

redhat/fence-agentsA flaw was discovered in fence-agents, prior to version 4.3.4, where using non-ASCII characters in a…

First published (updated )

Redhat Enterprise LinuxPacemaker 1.1.10, when remote Cluster Information Base (CIB) configuration or resource management is…

First published (updated )

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203