Vulnerabilities (CVE)

Filtered by CWE-307
Total 362 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-20415 1 Ibm 1 Guardium Data Encryption 2024-11-21 5.0 MEDIUM 7.5 HIGH
IBM Guardium Data Encryption (GDE) 4.0.0.4 uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials. IBM X-Force ID: 196217.
CVE-2021-1311 1 Cisco 2 Webex Meetings, Webex Meetings Server 2024-11-21 5.5 MEDIUM 5.4 MEDIUM
A vulnerability in the reclaim host role feature of Cisco Webex Meetings and Cisco Webex Meetings Server could allow an authenticated, remote attacker to take over the host role during a meeting. This vulnerability is due to a lack of protection against brute forcing of the host key. An attacker could exploit this vulnerability by sending crafted requests to a vulnerable Cisco Webex Meetings or Webex Meetings Server site. A successful exploit would require the attacker to have access to join a Webex meeting, including applicable meeting join links and passwords. A successful exploit could allow the attacker to acquire or take over the host role for a meeting.
CVE-2020-8827 1 Argoproj 1 Argo Cd 2024-11-21 5.0 MEDIUM 7.5 HIGH
As of v1.5.0, the Argo API does not implement anti-automation measures such as rate limiting, account lockouts, or other anti-bruteforce measures. Attackers can submit an unlimited number of authentication attempts without consequence.
CVE-2020-8790 1 Oklok Project 1 Oklok 2024-11-21 7.5 HIGH 9.8 CRITICAL
The OKLOK (3.1.1) mobile companion app for Fingerprint Bluetooth Padlock FB50 (2.3) has weak password requirements combined with improper restriction of excessive authentication attempts, which could allow a remote attacker to discover user credentials and obtain access via a brute force attack.
CVE-2020-8228 2 Nextcloud, Opensuse 3 Preferred Providers, Backports Sle, Leap 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
A missing rate limit in the Preferred Providers app 1.7.0 allowed an attacker to set the password an uncontrolled amount of times.
CVE-2020-8202 1 Nextcloud 1 Preferred Providers 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
Improper check of inputs in Nextcloud Preferred Providers app v1.6.0 allowed to perform a denial of service attack when using a very long password.
CVE-2020-7995 1 Dolibarr 1 Dolibarr Erp\/crm 2024-11-21 10.0 HIGH 9.8 CRITICAL
The htdocs/index.php?mainmenu=home login page in Dolibarr 10.0.6 allows an unlimited rate of failed authentication attempts.
CVE-2020-7525 1 Schneider-electric 4 Spacelynk, Spacelynk Firmware, Wiser For Knx and 1 more 2024-11-21 5.0 MEDIUM 7.5 HIGH
Improper Restriction of Excessive Authentication Attempts vulnerability exists in all hardware versions of spaceLYnk and Wiser for KNX (formerly homeLYnk) which could allow an attacker to guess a password when brute force is used.
CVE-2020-7508 1 Schneider-electric 2 Easergy T300, Easergy T300 Firmware 2024-11-21 5.0 MEDIUM 9.8 CRITICAL
A CWE-307 Improper Restriction of Excessive Authentication Attempts vulnerability exists in Easergy T300 (Firmware version 1.5.2 and older) which could allow an attacker to gain full access by brute force.
CVE-2020-7057 1 Hikvision 2 Ds-7204hghi-f1, Ds-7204hghi-f1 Firmware 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
Hikvision DVR DS-7204HGHI-F1 V4.0.1 build 180903 Web Version sends a different response for failed ISAPI/Security/sessionLogin/capabilities login attempts depending on whether the user account exists, which might make it easier to enumerate users. However, only about 4 or 5 failed logins are allowed.
CVE-2020-6852 1 Cacagoo 2 Tv-288zd-2mp, Tv-288zd-2mp Firmware 2024-11-21 10.0 HIGH 9.8 CRITICAL
CACAGOO Cloud Storage Intelligent Camera TV-288ZD-2MP with firmware 3.4.2.0919 has weak authentication of TELNET access, leading to root privileges without any password required.
CVE-2020-5141 1 Sonicwall 2 Sonicos, Sonicosv 2024-11-21 6.4 MEDIUM 6.5 MEDIUM
A vulnerability in SonicOS allows a remote unauthenticated attacker to brute force Virtual Assist ticket ID in the firewall SSLVPN service. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version SonicOS 7.0.0.0.
CVE-2020-4891 1 Ibm 1 Spectrum Scale 2024-11-21 2.1 LOW 5.5 MEDIUM
IBM Spectrum Scale 5.0.0 through 5.0.5.5 and 5.1.0 through 5.1.0.2 uses an inadequate account lockout setting that could allow a local user er to brute force Rest API account credentials. IBM X-Force ID: 190974.
CVE-2020-4567 1 Ibm 1 Security Key Lifecycle Manager 2024-11-21 5.0 MEDIUM 9.8 CRITICAL
IBM Tivoli Key Lifecycle Manager 3.0.1 and 4.0 uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials. IBM X-Force ID: 184156.
CVE-2020-4400 1 Ibm 1 Verify Gateway 2024-11-21 5.0 MEDIUM 7.5 HIGH
IBM Verify Gateway (IVG) 1.0.0 and 1.0.1 uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials. IBM X-Force ID: 179478.
CVE-2020-4232 1 Ibm 1 Security Identity Governance And Intelligence 2024-11-21 5.0 MEDIUM 7.5 HIGH
IBM Security Identity Governance and Intelligence 5.2.6 could allow an attacker to enumerate usernames to find valid login credentials which could be used to attempt further attacks against the system. IBM X-Force ID: 175336.
CVE-2020-4193 1 Ibm 1 Security Guardium 2024-11-21 5.0 MEDIUM 9.8 CRITICAL
IBM Security Guardium 11.1 uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials. IBM X-Force ID: 174857.
CVE-2020-35590 1 Limitloginattempts 1 Limit Login Attempts Reloaded 2024-11-21 5.0 MEDIUM 9.8 CRITICAL
LimitLoginAttempts.php in the limit-login-attempts-reloaded plugin before 2.17.4 for WordPress allows a bypass of (per IP address) rate limits because the X-Forwarded-For header can be forged. When the plugin is configured to accept an arbitrary header for the client source IP address, a malicious user is not limited to perform a brute force attack, because the client IP header accepts any arbitrary string. When randomizing the header input, the login count does not ever reach the maximum allowed retries.
CVE-2020-35586 1 Mersive 2 Solstice Pod, Solstice Pod Firmware 2024-11-21 5.0 MEDIUM 7.5 HIGH
In Solstice Pod before 3.3.0 (or Open4.3), the Administrator password can be enumerated using brute-force attacks via the /Config/service/initModel?password= Solstice Open Control API because there is no complexity requirement (e.g., it might be all digits or all lowercase letters).
CVE-2020-35585 1 Mersive 2 Solstice Pod, Solstice Pod Firmware 2024-11-21 5.0 MEDIUM 7.5 HIGH
In Solstice Pod before 3.3.0 (or Open4.3), the screen key can be enumerated using brute-force attacks via the /lookin/info Solstice Open Control API because there are only 1.7 million possibilities.