noVNC before 0.5 does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
https://github.com/kanaka/noVNC/commit/ad941faddead705cd611921730054767a0b32dcd
https://bugzilla.redhat.com/show_bug.cgi?id=1193451
http://www.openwall.com/lists/oss-security/2015/03/12/13
http://www.openwall.com/lists/oss-security/2015/02/17/1
http://rhn.redhat.com/errata/RHSA-2015-0884.html
http://rhn.redhat.com/errata/RHSA-2015-0834.html