Brute Force

32 CVEs product

Monthly

CVE-2026-33771 CRITICAL Act Now

Juniper Networks CTP OS 9.2R1 and 9.2R2 fail to persist password complexity settings, enabling unauthenticated attackers to exploit predictable weak passwords on local accounts. The password management function allows administrators to configure complexity requirements but does not save these configurations, verifiable through 'Show password requirements' menu. This defect permits trivial passwords that attackers can brute-force remotely to gain full device control. No public exploit identified at time of analysis.

Authentication Bypass Juniper Brute Force
NVD
CVSS 4.0
9.1
EPSS
0.0%
CVE-2026-34203 LOW PATCH GHSA Monitor

Nautobot REST API user creation and modification endpoints bypass Django's configured password validation rules, allowing authenticated administrators to set or modify user passwords that fail to meet organizational security standards. Versions prior to 2.4.30 and 3.0.10 are affected; an authenticated admin with high privileges can create accounts with weak passwords despite configured AUTH_PASSWORD_VALIDATORS rules. CVSS score is 2.7 (low severity) due to requirement for authenticated administrative access; however, organizations with strict password policies relying on Nautobot's config-driven enforcement face integrity risk.

Python Brute Force Information Disclosure
NVD GitHub
CVSS 3.1
2.7
EPSS
0.0%
CVE-2025-65014 LOW POC PATCH Monitor

LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Rated low severity (CVSS 3.7), this vulnerability is remotely exploitable, no authentication required. Public exploit code available and no vendor patch available.

PHP Brute Force Information Disclosure Librenms
NVD GitHub
CVSS 3.1
3.7
EPSS
0.0%
CVE-2025-63800 HIGH POC This Month

The password change endpoint in Open Source Point of Sale 3.4.1 allows users to set their account password to an empty string due to missing server-side validation. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Authentication Bypass Brute Force Open Source Point Of Sale
NVD GitHub
CVSS 3.1
7.5
EPSS
0.3%
CVE-2025-63747 CRITICAL POC Act Now

QaTraq 6.9.2 ships with administrative account credentials which are enabled in default installations and permit immediate login via the web application login page. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Information Disclosure Brute Force Qatraq
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2025-55034 HIGH This Month

General Industrial Controls Lynx+ Gateway is vulnerable to a weak password requirement vulnerability, which may allow an attacker to execute a brute-force attack resulting in unauthorized access and. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Authentication Bypass Brute Force
NVD GitHub
CVSS 4.0
8.8
EPSS
0.1%
CVE-2025-9551 MEDIUM PATCH This Month

Drupal Protected Pages module fails to implement rate limiting on authentication attempts, enabling unauthenticated attackers to conduct brute force attacks against password-protected content. Affected versions include Protected Pages 0.0.0 through 1.7.x and 7.x-1.0 through 7.x-2.4. The vulnerability permits attackers to enumerate valid credentials and bypass access controls through repeated login submissions without detection or throttling mechanisms. No public exploit code or active exploitation has been confirmed; EPSS scoring of 0.05% (15th percentile) indicates low real-world exploitation likelihood despite the moderate CVSS score of 6.5.

Drupal PHP Brute Force Protected Pages
NVD HeroDevs VulDB
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-9964 HIGH This Week

No password for the root user is set in Novakon P series. Rated high severity (CVSS 8.6), this vulnerability is no authentication required, low attack complexity. No vendor patch available.

Brute Force Information Disclosure
NVD VulDB
CVSS 4.0
8.6
EPSS
0.0%
CVE-2025-57295 HIGH POC This Week

H3C devices running firmware version NX15V100R015 are vulnerable to unauthorized access due to insecure default credentials. Rated high severity (CVSS 8.0), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

Brute Force RCE Authentication Bypass Privilege Escalation Information Disclosure +1
NVD GitHub
CVSS 3.1
8.0
EPSS
0.1%
CVE-2025-10320 LOW Monitor

A vulnerability was detected in iteachyou Dreamer CMS up to 4.1.3.2. Rated low severity (CVSS 2.3), this vulnerability is remotely exploitable. No vendor patch available.

Brute Force Information Disclosure
NVD VulDB
CVSS 4.0
2.3
EPSS
0.0%
CVE-2025-9514 MEDIUM This Month

A vulnerability has been found in macrozheng mall up to 1.0.3. Rated medium severity (CVSS 6.3), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.

Brute Force Information Disclosure Mall
NVD GitHub VulDB
CVSS 4.0
6.3
EPSS
0.0%
CVE-2025-25737 MEDIUM POC This Week

Kapsch TrafficCom RIS-9160 & RIS-9260 Roadside Units (RSUs) v3.2.0.829.23, v3.8.0.1119.42, and v4.6.0.1211.28 were discovered to lack secure password requirements for its BIOS Supervisor and User. Rated medium severity (CVSS 6.8), this vulnerability is no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Authentication Bypass Brute Force Ris 9160 Firmware Ris 9260 Firmware
NVD
CVSS 3.1
6.8
EPSS
0.2%
CVE-2025-55299 CRITICAL This Week

VaulTLS is a modern solution for managing mTLS (mutual TLS) certificates. Rated critical severity (CVSS 9.4), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Brute Force Information Disclosure
NVD GitHub
CVSS 3.1
9.4
EPSS
0.0%
CVE-2025-8549 MEDIUM POC PATCH This Month

A vulnerability was found in atjiu pybbs up to 6.0.0. Rated medium severity (CVSS 6.3), this vulnerability is remotely exploitable, no authentication required. Public exploit code available.

Information Disclosure Brute Force Java Pybbs
NVD GitHub VulDB
CVSS 4.0
6.3
EPSS
0.1%
CVE-2025-4383 CRITICAL Act Now

A authentication bypass vulnerability in Art-in Bilişim Teknolojileri ve Yazılım Hizm (CVSS 9.3). Critical severity with potential for significant impact on affected systems.

Authentication Bypass Brute Force
NVD
CVSS 3.1
9.3
EPSS
0.1%
CVE-2025-28389 CRITICAL POC Act Now

Critical authentication bypass vulnerability in OpenC3 COSMOS v6.0.0 caused by weak password requirements that enable brute force attacks. An unauthenticated remote attacker can exploit this with no user interaction to gain full control over the affected system, including confidentiality, integrity, and availability compromise. The CVSS 9.8 severity and network-based attack vector indicate this poses significant risk to any organization running the vulnerable version without additional protective controls.

Authentication Bypass Brute Force Credential Stuffing Cosmos
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2025-5485 HIGH This Week

User enumeration vulnerability affecting web management interfaces where usernames are limited to device identifiers (10-digit numerical values). An unauthenticated remote attacker can enumerate valid user accounts by systematically testing digit sequences, potentially gaining information disclosure and limited system manipulation capabilities. The CVSS 8.6 rating reflects high confidentiality impact, though patch status and active exploitation details require vendor-specific assessment.

Information Disclosure Authentication Bypass Brute Force
NVD
CVSS 3.1
8.6
EPSS
0.1%
CVE-2025-48372 MEDIUM PATCH This Month

Schule is open-source school management system software. Rated medium severity (CVSS 6.6), this vulnerability is remotely exploitable, no authentication required, low attack complexity.

Brute Force Information Disclosure Schule School Management System
NVD GitHub
CVSS 4.0
6.6
EPSS
0.3%
CVE-2025-46742 MEDIUM Monitor

Users who were required to change their password could still access system information before changing their password. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Brute Force Information Disclosure
NVD
CVSS 3.1
4.3
EPSS
0.2%
CVE-2025-4534 MEDIUM This Month

A vulnerability, which was classified as problematic, has been found in SunGrow Logger1000 01_A. Rated medium severity (CVSS 6.3), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.

Brute Force Information Disclosure
NVD VulDB
CVSS 4.0
6.3
EPSS
0.2%
CVE-2025-1993 MEDIUM This Month

IBM App Connect Enterprise Certified Container 8.1, 8.2, 9.0, 9.1, 9.2, 10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 12.0, 12.1, 12.2, 12.3, 12.4, 12.5, 12.6, 12.7, 12.8, 12.9, and 12.10. Rated medium severity (CVSS 5.1), this vulnerability is no authentication required. No vendor patch available.

Brute Force IBM Information Disclosure App Connect Enterprise Certified Containers Operands App Connect Operator
NVD
CVSS 3.1
5.1
EPSS
0.0%
CVE-2025-28200 CRITICAL POC Act Now

Victure RX1800 EN_V1.0.0_r12_110933 was discovered to utilize a weak default password which includes the last 8 digits of the Mac address. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Brute Force Information Disclosure Rx1800 Firmware
NVD
CVSS 3.1
9.8
EPSS
0.4%
CVE-2025-26847 HIGH This Week

An issue was discovered in Znuny before 7.1.5. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Brute Force Information Disclosure Znuny
NVD
CVSS 3.1
7.5
EPSS
0.3%
CVE-2025-25211 CRITICAL Act Now

Weak password requirements issue exists in CHOCO TEI WATCHER mini (IB-MCT001) all versions. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Brute Force Authentication Bypass
NVD
CVSS 3.1
9.8
EPSS
0.5%
CVE-2025-1474 MEDIUM POC PATCH This Month

In mlflow/mlflow version 2.18, an admin is able to create a new user account without setting a password. Rated medium severity (CVSS 5.5), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available.

Brute Force Authentication Bypass Mlflow AI / ML
NVD GitHub
CVSS 3.1
5.5
EPSS
0.1%
CVE-2025-27663 CRITICAL Act Now

Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Weak Password Encryption / Encoding OVE-20230524-0007. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Brute Force Information Disclosure Vasion Print Virtual Appliance
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2024-41778 MEDIUM This Month

IBM Controller 11.0.0 through 11.0.1 and 11.1.0 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable. No vendor patch available.

Brute Force IBM Information Disclosure Controller
NVD
CVSS 3.1
5.3
EPSS
0.1%
CVE-2025-1341 MEDIUM POC This Month

A vulnerability, which was classified as problematic, was found in PMWeb 7.2.0. Rated medium severity (CVSS 6.3), this vulnerability is remotely exploitable, no authentication required. Public exploit code available and no vendor patch available.

Brute Force Information Disclosure Pmweb
NVD VulDB
CVSS 4.0
6.3
EPSS
0.1%
CVE-2024-42173 MEDIUM Monitor

HCL MyXalytics is affected by an improper password policy implementation vulnerability. Rated medium severity (CVSS 4.8), this vulnerability is remotely exploitable. No vendor patch available.

Brute Force Information Disclosure Dryice Myxalytics
NVD
CVSS 3.1
4.8
EPSS
0.2%
CVE-2025-22390 HIGH This Month

An issue was discovered in Optimizely EPiServer.CMS.Core before 12.32.0. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Brute Force Information Disclosure Optimizely Cms
NVD
CVSS 3.1
7.5
EPSS
0.2%
CVE-2024-0347 LOW POC Monitor

A vulnerability was found in SourceCodester Engineers Online Portal 1.0 and classified as problematic.php. Rated low severity (CVSS 3.7), this vulnerability is remotely exploitable, no authentication required. Public exploit code available and no vendor patch available.

PHP Brute Force Information Disclosure Engineers Online Portal
NVD VulDB
CVSS 3.1
3.7
EPSS
0.1%
CVE-2024-0188 LOW POC Monitor

A vulnerability, which was classified as problematic, was found in RRJ Nueva Ecija Engineer Online Portal 1.0. Rated low severity (CVSS 3.1), this vulnerability is remotely exploitable. Public exploit code available and no vendor patch available.

PHP Brute Force Information Disclosure Rrj Nueva Ecija Engineer Online Portal
NVD VulDB
CVSS 3.1
3.1
EPSS
0.2%
CVE-2026-33771
EPSS 0% CVSS 9.1
CRITICAL Act Now

Juniper Networks CTP OS 9.2R1 and 9.2R2 fail to persist password complexity settings, enabling unauthenticated attackers to exploit predictable weak passwords on local accounts. The password management function allows administrators to configure complexity requirements but does not save these configurations, verifiable through 'Show password requirements' menu. This defect permits trivial passwords that attackers can brute-force remotely to gain full device control. No public exploit identified at time of analysis.

Authentication Bypass Juniper Brute Force
NVD
CVE-2026-34203
EPSS 0% CVSS 2.7
LOW PATCH Monitor

Nautobot REST API user creation and modification endpoints bypass Django's configured password validation rules, allowing authenticated administrators to set or modify user passwords that fail to meet organizational security standards. Versions prior to 2.4.30 and 3.0.10 are affected; an authenticated admin with high privileges can create accounts with weak passwords despite configured AUTH_PASSWORD_VALIDATORS rules. CVSS score is 2.7 (low severity) due to requirement for authenticated administrative access; however, organizations with strict password policies relying on Nautobot's config-driven enforcement face integrity risk.

Python Brute Force Information Disclosure
NVD GitHub
CVE-2025-65014
EPSS 0% CVSS 3.7
LOW POC PATCH Monitor

LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Rated low severity (CVSS 3.7), this vulnerability is remotely exploitable, no authentication required. Public exploit code available and no vendor patch available.

PHP Brute Force Information Disclosure +1
NVD GitHub
CVE-2025-63800
EPSS 0% CVSS 7.5
HIGH POC This Month

The password change endpoint in Open Source Point of Sale 3.4.1 allows users to set their account password to an empty string due to missing server-side validation. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Authentication Bypass Brute Force Open Source Point Of Sale
NVD GitHub
CVE-2025-63747
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

QaTraq 6.9.2 ships with administrative account credentials which are enabled in default installations and permit immediate login via the web application login page. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Information Disclosure Brute Force Qatraq
NVD
CVE-2025-55034
EPSS 0% CVSS 8.8
HIGH This Month

General Industrial Controls Lynx+ Gateway is vulnerable to a weak password requirement vulnerability, which may allow an attacker to execute a brute-force attack resulting in unauthorized access and. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Authentication Bypass Brute Force
NVD GitHub
CVE-2025-9551
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

Drupal Protected Pages module fails to implement rate limiting on authentication attempts, enabling unauthenticated attackers to conduct brute force attacks against password-protected content. Affected versions include Protected Pages 0.0.0 through 1.7.x and 7.x-1.0 through 7.x-2.4. The vulnerability permits attackers to enumerate valid credentials and bypass access controls through repeated login submissions without detection or throttling mechanisms. No public exploit code or active exploitation has been confirmed; EPSS scoring of 0.05% (15th percentile) indicates low real-world exploitation likelihood despite the moderate CVSS score of 6.5.

Drupal PHP Brute Force +1
NVD HeroDevs VulDB
CVE-2025-9964
EPSS 0% CVSS 8.6
HIGH This Week

No password for the root user is set in Novakon P series. Rated high severity (CVSS 8.6), this vulnerability is no authentication required, low attack complexity. No vendor patch available.

Brute Force Information Disclosure
NVD VulDB
CVE-2025-57295
EPSS 0% CVSS 8.0
HIGH POC This Week

H3C devices running firmware version NX15V100R015 are vulnerable to unauthorized access due to insecure default credentials. Rated high severity (CVSS 8.0), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

Brute Force RCE Authentication Bypass +3
NVD GitHub
CVE-2025-10320
EPSS 0% CVSS 2.3
LOW Monitor

A vulnerability was detected in iteachyou Dreamer CMS up to 4.1.3.2. Rated low severity (CVSS 2.3), this vulnerability is remotely exploitable. No vendor patch available.

Brute Force Information Disclosure
NVD VulDB
CVE-2025-9514
EPSS 0% CVSS 6.3
MEDIUM This Month

A vulnerability has been found in macrozheng mall up to 1.0.3. Rated medium severity (CVSS 6.3), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.

Brute Force Information Disclosure Mall
NVD GitHub VulDB
CVE-2025-25737
EPSS 0% CVSS 6.8
MEDIUM POC This Week

Kapsch TrafficCom RIS-9160 & RIS-9260 Roadside Units (RSUs) v3.2.0.829.23, v3.8.0.1119.42, and v4.6.0.1211.28 were discovered to lack secure password requirements for its BIOS Supervisor and User. Rated medium severity (CVSS 6.8), this vulnerability is no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Authentication Bypass Brute Force Ris 9160 Firmware +1
NVD
CVE-2025-55299
EPSS 0% CVSS 9.4
CRITICAL This Week

VaulTLS is a modern solution for managing mTLS (mutual TLS) certificates. Rated critical severity (CVSS 9.4), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Brute Force Information Disclosure
NVD GitHub
CVE-2025-8549
EPSS 0% CVSS 6.3
MEDIUM POC PATCH This Month

A vulnerability was found in atjiu pybbs up to 6.0.0. Rated medium severity (CVSS 6.3), this vulnerability is remotely exploitable, no authentication required. Public exploit code available.

Information Disclosure Brute Force Java +1
NVD GitHub VulDB
CVE-2025-4383
EPSS 0% CVSS 9.3
CRITICAL Act Now

A authentication bypass vulnerability in Art-in Bilişim Teknolojileri ve Yazılım Hizm (CVSS 9.3). Critical severity with potential for significant impact on affected systems.

Authentication Bypass Brute Force
NVD
CVE-2025-28389
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

Critical authentication bypass vulnerability in OpenC3 COSMOS v6.0.0 caused by weak password requirements that enable brute force attacks. An unauthenticated remote attacker can exploit this with no user interaction to gain full control over the affected system, including confidentiality, integrity, and availability compromise. The CVSS 9.8 severity and network-based attack vector indicate this poses significant risk to any organization running the vulnerable version without additional protective controls.

Authentication Bypass Brute Force Credential Stuffing +1
NVD
CVE-2025-5485
EPSS 0% CVSS 8.6
HIGH This Week

User enumeration vulnerability affecting web management interfaces where usernames are limited to device identifiers (10-digit numerical values). An unauthenticated remote attacker can enumerate valid user accounts by systematically testing digit sequences, potentially gaining information disclosure and limited system manipulation capabilities. The CVSS 8.6 rating reflects high confidentiality impact, though patch status and active exploitation details require vendor-specific assessment.

Information Disclosure Authentication Bypass Brute Force
NVD
CVE-2025-48372
EPSS 0% CVSS 6.6
MEDIUM PATCH This Month

Schule is open-source school management system software. Rated medium severity (CVSS 6.6), this vulnerability is remotely exploitable, no authentication required, low attack complexity.

Brute Force Information Disclosure Schule School Management System
NVD GitHub
CVE-2025-46742
EPSS 0% CVSS 4.3
MEDIUM Monitor

Users who were required to change their password could still access system information before changing their password. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Brute Force Information Disclosure
NVD
CVE-2025-4534
EPSS 0% CVSS 6.3
MEDIUM This Month

A vulnerability, which was classified as problematic, has been found in SunGrow Logger1000 01_A. Rated medium severity (CVSS 6.3), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.

Brute Force Information Disclosure
NVD VulDB
CVE-2025-1993
EPSS 0% CVSS 5.1
MEDIUM This Month

IBM App Connect Enterprise Certified Container 8.1, 8.2, 9.0, 9.1, 9.2, 10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 12.0, 12.1, 12.2, 12.3, 12.4, 12.5, 12.6, 12.7, 12.8, 12.9, and 12.10. Rated medium severity (CVSS 5.1), this vulnerability is no authentication required. No vendor patch available.

Brute Force IBM Information Disclosure +2
NVD
CVE-2025-28200
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

Victure RX1800 EN_V1.0.0_r12_110933 was discovered to utilize a weak default password which includes the last 8 digits of the Mac address. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Brute Force Information Disclosure Rx1800 Firmware
NVD
CVE-2025-26847
EPSS 0% CVSS 7.5
HIGH This Week

An issue was discovered in Znuny before 7.1.5. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Brute Force Information Disclosure Znuny
NVD
CVE-2025-25211
EPSS 0% CVSS 9.8
CRITICAL Act Now

Weak password requirements issue exists in CHOCO TEI WATCHER mini (IB-MCT001) all versions. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Brute Force Authentication Bypass
NVD
CVE-2025-1474
EPSS 0% CVSS 5.5
MEDIUM POC PATCH This Month

In mlflow/mlflow version 2.18, an admin is able to create a new user account without setting a password. Rated medium severity (CVSS 5.5), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available.

Brute Force Authentication Bypass Mlflow +1
NVD GitHub
CVE-2025-27663
EPSS 0% CVSS 9.8
CRITICAL Act Now

Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Weak Password Encryption / Encoding OVE-20230524-0007. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Brute Force Information Disclosure Vasion Print +1
NVD
CVE-2024-41778
EPSS 0% CVSS 5.3
MEDIUM This Month

IBM Controller 11.0.0 through 11.0.1 and 11.1.0 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable. No vendor patch available.

Brute Force IBM Information Disclosure +1
NVD
CVE-2025-1341
EPSS 0% CVSS 6.3
MEDIUM POC This Month

A vulnerability, which was classified as problematic, was found in PMWeb 7.2.0. Rated medium severity (CVSS 6.3), this vulnerability is remotely exploitable, no authentication required. Public exploit code available and no vendor patch available.

Brute Force Information Disclosure Pmweb
NVD VulDB
CVE-2024-42173
EPSS 0% CVSS 4.8
MEDIUM Monitor

HCL MyXalytics is affected by an improper password policy implementation vulnerability. Rated medium severity (CVSS 4.8), this vulnerability is remotely exploitable. No vendor patch available.

Brute Force Information Disclosure Dryice Myxalytics
NVD
CVE-2025-22390
EPSS 0% CVSS 7.5
HIGH This Month

An issue was discovered in Optimizely EPiServer.CMS.Core before 12.32.0. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Brute Force Information Disclosure Optimizely Cms
NVD
CVE-2024-0347
EPSS 0% CVSS 3.7
LOW POC Monitor

A vulnerability was found in SourceCodester Engineers Online Portal 1.0 and classified as problematic.php. Rated low severity (CVSS 3.7), this vulnerability is remotely exploitable, no authentication required. Public exploit code available and no vendor patch available.

PHP Brute Force Information Disclosure +1
NVD VulDB
CVE-2024-0188
EPSS 0% CVSS 3.1
LOW POC Monitor

A vulnerability, which was classified as problematic, was found in RRJ Nueva Ecija Engineer Online Portal 1.0. Rated low severity (CVSS 3.1), this vulnerability is remotely exploitable. Public exploit code available and no vendor patch available.

PHP Brute Force Information Disclosure +1
NVD VulDB

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy