Vulnerabilities > Redhat > Beaker

DATE CVE VULNERABILITY TITLE RISK
2017-09-06 CVE-2015-3163 Improper Access Control vulnerability in Redhat Beaker
The admin pages for power types and key types in Beaker before 20.1 do not have any access controls, which allows remote authenticated users to modify power types and key types via navigating to $BEAKER/powertypes and $BEAKER/keytypes respectively.
network
low complexity
redhat CWE-284
4.3