<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Topics tagged with bruteforce]]></title><description><![CDATA[A list of topics that have been tagged with bruteforce]]></description><link>https://board.circlewithadot.net/tags/bruteforce</link><generator>RSS for Node</generator><lastBuildDate>Thu, 14 May 2026 23:13:19 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/tags/bruteforce.rss" rel="self" type="application/rss+xml"/><pubDate>Invalid Date</pubDate><ttl>60</ttl><item><title><![CDATA[🛡️ HIGH severity in SignalK signalk-server &amp;lt;2.25.0 (CVE-2026-41893): WebSocket login bypasses rate limits, enabling fast brute force attacks.]]></title><description><![CDATA[️ HIGH severity in SignalK signalk-server &lt;2.25.0 (CVE-2026-41893): WebSocket login bypasses rate limits, enabling fast brute force attacks. Patch to 2.25.0+ ASAP. Details: https://radar.offseq.com/threat/cve-2026-41893-cwe-307-improper-restriction-of-exc-a656937b #OffSeq #infosec #vuln #bruteforce]]></description><link>https://board.circlewithadot.net/topic/33199e2d-c546-49ef-834a-0cfec2f9ba3e/high-severity-in-signalk-signalk-server-lt-2.25.0-cve-2026-41893-websocket-login-bypasses-rate-limits-enabling-fast-brute-force-attacks.</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/33199e2d-c546-49ef-834a-0cfec2f9ba3e/high-severity-in-signalk-signalk-server-lt-2.25.0-cve-2026-41893-websocket-login-bypasses-rate-limits-enabling-fast-brute-force-attacks.</guid><dc:creator><![CDATA[offseq@infosec.exchange]]></dc:creator><pubDate>Invalid Date</pubDate></item></channel></rss>