Safety vulnerability ID: 54654
The information on this page was manually curated by our Cybersecurity Intelligence Team.
### Impact
Previous versions of Kiwi TCMS do not impose rate limits which makes it easier to attempt brute-force attacks against the login page.
### Patches
Users should upgrade to v12.0 or later.
### Workarounds
Users may install and configure a rate-limiting proxy in front of Kiwi TCMS. For example nginx.
### References
[Disclosed by spyata](https://huntr.dev/bounties/2b1a9be9-45e9-490b-8de0-26a492e79795/)
Latest version: 12.4
Test Case Management System
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application