Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0656 | Kiwi TCMS, an open source test management system, does not impose rate limits in versions prior to 12.0. This makes it easier to attempt denial-of-service attacks against the Password reset page. An attacker could potentially send a large number of emails if they know the email addresses of users in Kiwi TCMS. Additionally that may strain SMTP resources. Users should upgrade to v12.0 or later to receive a patch. As potential workarounds, users may install and configure a rate-limiting proxy in front of Kiwi TCMS and/or configure rate limits on their email server when possible. |
Github GHSA |
GHSA-7j9h-3jxf-3vrf | Denial of service vulnerability on Password reset page |
Mon, 10 Mar 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-03-10T21:11:05.640Z
Reserved: 2023-02-03T00:00:00.000Z
Link: CVE-2023-25171
Updated: 2024-08-02T11:18:36.151Z
Status : Modified
Published: 2023-02-15T15:15:11.653
Modified: 2024-11-21T07:49:14.837
Link: CVE-2023-25171
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA