In LiteSpeed QUIC (LSQUIC) Library before 4.0.4, DCID validation is mishandled.
Max CVSS
9.8
EPSS Score
0.06%
Published
2024-02-09
Updated
2024-02-15
Missing Authorization vulnerability in LiteSpeed Technologies LiteSpeed Cache.This issue affects LiteSpeed Cache: from n/a through 5.7.
Max CVSS
8.2
EPSS Score
0.04%
Published
2024-04-16
Updated
2024-04-17
LiteSpeed OpenLiteSpeed before 1.7.18 does not strictly validate HTTP request headers.
Max CVSS
7.5
EPSS Score
0.05%
Published
2023-08-14
Updated
2023-08-22
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LiteSpeed Technologies LiteSpeed Cache allows Stored XSS.This issue affects LiteSpeed Cache: from n/a through 5.7.
Max CVSS
8.3
EPSS Score
0.04%
Published
2024-04-16
Updated
2024-04-17
The LiteSpeed Cache plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'esi' shortcode in versions up to, and including, 5.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Max CVSS
6.4
EPSS Score
0.05%
Published
2024-01-11
Updated
2024-01-17
Cross-Site Request Forgery (CSRF) vulnerability in LiteSpeed Technologies LiteSpeed Cache plugin <= 5.3 versions.
Max CVSS
8.8
EPSS Score
0.06%
Published
2023-05-25
Updated
2023-05-31
liblsquic/lsquic_qenc_hdl.c in LiteSpeed QUIC (aka LSQUIC) before 3.1.0 mishandles MAX_TABLE_CAPACITY.
Max CVSS
9.8
EPSS Score
0.21%
Published
2022-05-11
Updated
2022-05-20
Untrusted Search Path vulnerability in LiteSpeed Technologies OpenLiteSpeed Web Server and LiteSpeed Web Server Container allows Privilege Escalation. This affects versions from 1.6.15 before 1.7.16.1.
Max CVSS
8.8
EPSS Score
0.09%
Published
2022-10-27
Updated
2022-12-09
Improper Input Validation vulnerability in LiteSpeed Technologies OpenLiteSpeed Web Server and LiteSpeed Web Server dashboards allows Command Injection. This affects 1.7.0 versions before 1.7.16.1.
Max CVSS
8.8
EPSS Score
0.06%
Published
2022-10-27
Updated
2022-12-09
Directory Traversal vulnerability in LiteSpeed Technologies OpenLiteSpeed Web Server and LiteSpeed Web Server dashboards allows Path Traversal. This affects versions from 1.5.11 through 1.5.12, from 1.6.5 through 1.6.20.1, from 1.7.0 before 1.7.16.1
Max CVSS
5.8
EPSS Score
0.07%
Published
2022-10-27
Updated
2022-12-09
Privilege Escalation in LiteSpeed Technologies OpenLiteSpeed web server version 1.7.8 allows attackers to gain root terminal access and execute commands on the host system.
Max CVSS
9.0
EPSS Score
6.29%
Published
2021-04-07
Updated
2021-04-12
The LiteSpeed Cache WordPress plugin before 4.4.4 does not properly verify that requests are coming from QUIC.cloud servers, allowing attackers to make requests to certain endpoints by using a specific X-Forwarded-For header value. In addition, one of the endpoint could be used to set CSS code if a setting is enabled, which will then be output in some pages without being sanitised and escaped. Combining those two issues, an unauthenticated attacker could put Cross-Site Scripting payloads in pages visited by users.
Max CVSS
6.1
EPSS Score
0.12%
Published
2022-01-03
Updated
2022-01-08
The LiteSpeed Cache WordPress plugin before 4.4.4 does not escape the qc_res parameter before outputting it back in the JS code of an admin page, leading to a Reflected Cross-Site Scripting
Max CVSS
4.8
EPSS Score
0.05%
Published
2022-01-03
Updated
2022-01-08
A cross-site scripting (XSS) vulnerability in the LiteSpeed Cache plugin before 3.6.1 for WordPress can be exploited via the Server IP setting.
Max CVSS
6.1
EPSS Score
0.08%
Published
2020-12-26
Updated
2020-12-28
The WebAdmin Console in OpenLiteSpeed before v1.6.5 does not strictly check request URLs, as demonstrated by the "Server Configuration > External App" screen.
Max CVSS
9.8
EPSS Score
0.24%
Published
2020-01-06
Updated
2020-01-15
The server in LiteSpeed OpenLiteSpeed before 1.5.0 RC6 allows local users to cause a denial of service (buffer overflow) or possibly have unspecified other impact by creating a symlink through which the openlitespeed program can be invoked with a long command name (involving ../ characters), which is mishandled in the LshttpdMain::getServerRootFromExecutablePath function.
Max CVSS
6.7
EPSS Score
0.04%
Published
2018-12-03
Updated
2019-01-31
The server in LiteSpeed OpenLiteSpeed before 1.5.0 RC6 does not correctly handle requests for byte sequences, allowing an attacker to amplify the response size by requesting the entire response body repeatedly, as demonstrated by an HTTP Range header value beginning with the "bytes=0-,0-" substring.
Max CVSS
6.5
EPSS Score
0.07%
Published
2018-12-03
Updated
2019-02-05
Use-after-free vulnerability in Open Litespeed before 1.3.10.
Max CVSS
7.5
EPSS Score
0.11%
Published
2017-09-20
Updated
2020-07-31
Cross-site scripting (XSS) vulnerability in service/graph_html.php in the administrator panel in LiteSpeed Web Server 4.1.11 allows remote attackers to inject arbitrary web script or HTML via the gtitle parameter.
Max CVSS
4.3
EPSS Score
0.22%
Published
2012-09-06
Updated
2017-08-29

CVE-2010-2333

Public exploit
LiteSpeed Technologies LiteSpeed Web Server 4.0.x before 4.0.15 allows remote attackers to read the source code of scripts via an HTTP request with a null byte followed by a .txt file extension.
Max CVSS
5.0
EPSS Score
90.58%
Published
2010-06-18
Updated
2010-07-13
The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read.
Max CVSS
5.0
EPSS Score
0.25%
Published
2004-11-23
Updated
2024-02-15
21 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!