From this webpage screenshot, the following key information about the vulnerability can be obtained: 1. Vulnerability ID: CVE-2023-6912 2. Vulnerability Description: M-Files Server prior to version 23.12.13205.0 lacks protection against brute force attacks, allowing attackers to perform unlimited authentication attempts, potentially gaining access to target M-Files user accounts by guessing passwords. 3. Affected Products: - M-Files Server prior to version 23.12.13205.0 - M-Files Server prior to version 23.2 LTS SR6 (not affected) - M-Files Server prior to version 23.8 LTS SR4 (not affected) 4. Additional Information: - Specific API methods were found to be vulnerable to brute force attacks, allowing unauthenticated users to perform unlimited password guesses for M-Files user accounts. - CVSS 3.1 Base Score: 7.5 - CVSS 3.1 Temporal Score: 6.7 - CVSS Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C - CWE: CWE-307: Improper Restriction of Excessive Authentication Attempts - CAPEC: CAPEC-49: Password Brute Force - Internal IDs: 168150, 168178 - Release Date: 2023-12-19 5. Exploitability: - Public Disclosure: No - Exploit Available: No - Exploitability: Low – Internally discovered 6. Links: - Detailed CVE-2023-6912 page: https://www.cve.org/CVERecord?id=CVE-2023-6912 7. History: - Released: 2023-12-19 - Affected products updated: 2024-01-30 This information provides a detailed description and scope of impact for the CVE-2023-6912 vulnerability.