noVNC before 0.5 does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "1:0.4+dfsg+1+20131010+gitf68af8af3d-4", "binary_name": "novnc" }, { "binary_version": "1:0.4+dfsg+1+20131010+gitf68af8af3d-4", "binary_name": "python-novnc" } ] }