Vulnerabilities
Vulnerable Software
Redhat:  >> Beaker  >> 0.10.0  Security Vulnerabilities
The admin pages for power types and key types in Beaker before 20.1 do not have any access controls, which allows remote authenticated users to modify power types and key types via navigating to $BEAKER/powertypes and $BEAKER/keytypes respectively.
CVSS Score
4.3
EPSS Score
0.005
Published
2017-09-06


Contact Us

Shodan ® - All rights reserved