Typecho v1.3.0 was discovered to contain a race condition vulnerability in the post commenting function. This vulnerability allows attackers to post several comments before the spam protection checks if the comments are posted too frequently.
References
| Link | Resource |
|---|---|
| https://cyberaz0r.info/2024/08/typecho-multiple-vulnerabilities/ | Exploit Third Party Advisory |
| https://typecho.org | Product |
Configurations
History
01 May 2025, 14:57
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:typecho:typecho:1.3.0:*:*:*:*:*:*:* | |
| First Time |
Typecho
Typecho typecho |
|
| References | () https://cyberaz0r.info/2024/08/typecho-multiple-vulnerabilities/ - Exploit, Third Party Advisory | |
| References | () https://typecho.org - Product |
Information
Published : 2024-08-19 21:15
Updated : 2025-05-01 14:57
NVD link : CVE-2024-35539
Mitre link : CVE-2024-35539
CVE.ORG link : CVE-2024-35539
JSON object : View
Products Affected
typecho
- typecho
CWE
CWE-290
Authentication Bypass by Spoofing
