Typecho v1.3.0 was discovered to contain a race condition vulnerability in the post commenting function. This vulnerability allows attackers to post several comments before the spam protection checks if the comments are posted too frequently.
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://cyberaz0r.info/2024/08/typecho-multiple-vulnerabilities/ | Exploit Third Party Advisory |
https://typecho.org | Product |
Configurations
History
01 May 2025, 14:57
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:typecho:typecho:1.3.0:*:*:*:*:*:*:* | |
References | () https://cyberaz0r.info/2024/08/typecho-multiple-vulnerabilities/ - Exploit, Third Party Advisory | |
References | () https://typecho.org - Product | |
First Time |
Typecho
Typecho typecho |
19 Aug 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-19 21:15
Updated : 2025-05-01 14:57
NVD link : CVE-2024-35539
Mitre link : CVE-2024-35539
JSON object : View
Products Affected
typecho
- typecho
CWE
No CWE.