pcs vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the pcs package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
CVE-2023-28154

<0:0.11.3-4.el9_1.3
  • H
CVE-2023-28154

<0:0.11.3-4.el9_1.3
  • H
CVE-2023-28154

<0:0.11.3-4.el9_1.3
  • M
HTTP Request Smuggling

*
  • L
Inefficient Regular Expression Complexity

*
  • M
Origin Validation Error

*
  • M
Exposed Dangerous Method or Function

*
  • H
Resource Exhaustion

<0:0.11.7-2.el9_4.4
  • H
Resource Exhaustion

<0:0.11.4-7.el9_2.5
  • H
Resource Exhaustion

<0:0.11.4-7.el9_2.5
  • H
Resource Exhaustion

<0:0.11.4-7.el9_2.5
  • H
Resource Exhaustion

<0:0.11.7-2.el9_4.4
  • H
Allocation of Resources Without Limits or Throttling

<0:0.11.1-10.el9_0.8
  • H
Resource Exhaustion

<0:0.11.1-10.el9_0.8
  • H
Resource Exhaustion

<0:0.11.7-2.el9_4.4
  • H
Resource Exhaustion

<0:0.11.9-2.el9_6.1
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Output Neutralization for Logs

<0:0.11.9-2.el9
  • M
Race Condition

*
  • H
Resource Exhaustion

<0:0.11.9-2.el9_6.1
  • M
Race Condition

*
  • M
Improper Check for Unusual or Exceptional Conditions

*
  • M
Always-Incorrect Control Flow Implementation

*
  • H
Resource Exhaustion

<0:0.11.4-7.el9_2.4
  • H
Resource Exhaustion

<0:0.11.4-7.el9_2.4
  • H
Resource Exhaustion

<0:0.11.4-7.el9_2.4
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • L
Improper Input Validation

<0:0.11.6-3.el9
  • L
Improper Input Validation

<0:0.11.6-3.el9
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • L
Improper Input Validation

<0:0.11.6-3.el9
  • H
Resource Exhaustion

<0:0.11.1-10.el9_0.7
  • H
Resource Exhaustion

<0:0.11.7-2.el9_4.3
  • H
Resource Exhaustion

<0:0.11.7-2.el9_4.3
  • H
Resource Exhaustion

<0:0.11.7-2.el9_4.3
  • H
Resource Exhaustion

<0:0.11.8-1.el9_5.2
  • H
Resource Exhaustion

<0:0.11.8-1.el9_5.2
  • M
Improper Output Neutralization for Logs

<0:0.11.9-2.el9
  • H
Inefficient Regular Expression Complexity

<0:0.11.1-10.el9_0.6
  • M
Inefficient Regular Expression Complexity

*
  • M
CRLF Injection

*
  • M
Cross-site Scripting (XSS)

*
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • L
Improper Input Validation

<0:0.11.6-3.el9
  • H
Inefficient Regular Expression Complexity

<0:0.11.4-7.el9_2
  • H
Improper Input Validation

<0:0.11.4-7.el9_2
  • H
CVE-2023-2319

<0:0.11.4-7.el9_2
  • H
CVE-2023-28154

<0:0.11.3-4.el9_1.3
  • M
Download of Code Without Integrity Check

<0:0.11.3-4.el9_1.2
  • M
Improper Authentication

<0:0.11.3-4.el9
  • H
Incorrect Default Permissions

<0:0.11.1-10.el9_0.2
  • H
Directory Traversal

<0:0.11.1-10.el9_0.1
  • M
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

*
  • L
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • M
Excessive Platform Resource Consumption within a Loop

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

<0:0.11.4-7.el9_2.1
  • M
Inefficient Regular Expression Complexity

<0:0.11.4-7.el9_2.1
  • M
Inefficient Regular Expression Complexity

<0:0.11.4-7.el9_2.1
  • M
Inefficient Regular Expression Complexity

<0:0.11.4-7.el9_2.1
  • M
Inefficient Regular Expression Complexity

<0:0.11.4-7.el9_2.1
  • M
Inefficient Regular Expression Complexity

<0:0.11.4-7.el9_2.1
  • M
Inefficient Regular Expression Complexity

<0:0.11.4-7.el9_2.1
  • M
Inefficient Regular Expression Complexity

<0:0.11.4-7.el9_2.1
  • M
Inefficient Regular Expression Complexity

<0:0.11.4-7.el9_2.1
  • M
Inefficient Regular Expression Complexity

<0:0.11.1-10.el9_0.5
  • M
Inefficient Regular Expression Complexity

<0:0.11.1-10.el9_0.5
  • M
Inefficient Regular Expression Complexity

<0:0.11.1-10.el9_0.5
  • M
Inefficient Regular Expression Complexity

<0:0.11.1-10.el9_0.5
  • M
Inefficient Regular Expression Complexity

<0:0.11.1-10.el9_0.5
  • M
Inefficient Regular Expression Complexity

<0:0.11.1-10.el9_0.5
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • M
Resource Exhaustion

*
  • H
CVE-2023-2319

<0:0.11.4-7.el9_2
  • H
CVE-2023-2319

<0:0.11.4-7.el9_2
  • H
CVE-2023-2319

<0:0.11.4-7.el9_2
  • H
CVE-2023-2319

<0:0.11.4-7.el9_2
  • H
Inefficient Regular Expression Complexity

<0:0.11.4-7.el9_2
  • M
Inefficient Regular Expression Complexity

<0:0.11.1-10.el9_0.4
  • H
Inefficient Regular Expression Complexity

<0:0.11.4-7.el9_2
  • H
Inefficient Regular Expression Complexity

<0:0.11.4-7.el9_2
  • M
Inefficient Regular Expression Complexity

<0:0.11.1-10.el9_0.4
  • H
Inefficient Regular Expression Complexity

<0:0.11.4-7.el9_2
  • H
CVE-2023-28154

<0:0.11.3-4.el9_1.3
  • H
CVE-2023-28154

<0:0.11.3-4.el9_1.3
  • H
CVE-2023-28154

<0:0.11.3-4.el9_1.3
  • H
CVE-2023-28154

<0:0.11.3-4.el9_1.3
  • H
Improper Input Validation

<0:0.11.4-7.el9_2
  • M
Improper Input Validation

<0:0.11.1-10.el9_0.4
  • M
Improper Input Validation

<0:0.11.1-10.el9_0.4
  • H
Improper Input Validation

<0:0.11.4-7.el9_2
  • H
Improper Input Validation

<0:0.11.4-7.el9_2
  • H
Improper Input Validation

<0:0.11.4-7.el9_2
  • L
Improper Input Validation

<0:0.11.6-3.el9
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Resource Exhaustion

*
  • M
Download of Code Without Integrity Check

<0:0.11.1-10.el9_0.3
  • M
Download of Code Without Integrity Check

<0:0.11.3-4.el9_1.2
  • M
Download of Code Without Integrity Check

<0:0.11.3-4.el9_1.2
  • M
Download of Code Without Integrity Check

<0:0.11.3-4.el9_1.2
  • M
Download of Code Without Integrity Check

<0:0.11.3-4.el9_1.2
  • M
Download of Code Without Integrity Check

<0:0.11.1-10.el9_0.3
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • H
Incorrect Default Permissions

<0:0.11.1-10.el9_0.2
  • H
Incorrect Default Permissions

<0:0.11.1-10.el9_0.2
  • H
Incorrect Default Permissions

<0:0.11.1-10.el9_0.2
  • H
Incorrect Default Permissions

<0:0.11.1-10.el9_0.2
  • H
Incorrect Default Permissions

<0:0.11.1-10.el9_0.2
  • H
Incorrect Default Permissions

<0:0.11.1-10.el9_0.2
  • H
Directory Traversal

<0:0.11.1-10.el9_0.1
  • H
Directory Traversal

<0:0.11.1-10.el9_0.1
  • H
Directory Traversal

<0:0.11.1-10.el9_0.1
  • H
Directory Traversal

<0:0.11.1-10.el9_0.1
  • H
Directory Traversal

<0:0.11.1-10.el9_0.1
  • H
Directory Traversal

<0:0.11.1-10.el9_0.1
  • M
Improper Authentication

<0:0.11.3-4.el9
  • M
Improper Authentication

<0:0.11.3-4.el9
  • M
Improper Authentication

<0:0.11.3-4.el9
  • M
Improper Authentication

<0:0.11.3-4.el9
  • M
Resource Exhaustion

*