Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| LiteSpeed Technologies | LiteSpeed Cache | 0 ~ 6.5.0.1 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2024-44000 is a vulnerability in the LiteSpeed Cache plugin, a popular WordPress plugin. This vulnerability affects session management in LiteSpeed Cache, allowing attackers to gain unauthorized access to sensitive data. | https://github.com/absholi7ly/CVE-2024-44000-LiteSpeed-Cache | POC Details |
| 2 | LiteSpeed Unauthorized Account Takeover | https://github.com/gbrsh/CVE-2024-44000 | POC Details |
| 3 | CVE-2024-44000-LiteSpeed-Cache | https://github.com/ifqygazhar/CVE-2024-44000-LiteSpeed-Cache | POC Details |
| 4 | is a PoC tool designed to exploit insecurely exposed debug logs from WordPress sites and extract session cookies | https://github.com/geniuszlyy/CVE-2024-44000 | POC Details |
| 5 | CVE-2024-44000 | https://github.com/zgimszhd61/CVE-2024-44000 | POC Details |
| 6 | is a PoC tool designed to exploit insecurely exposed debug logs from WordPress sites and extract session cookies | https://github.com/geniuszly/CVE-2024-44000 | POC Details |
| 7 | The LiteSpeed Cache plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 6.4.1 through the debug.log file that is publicly exposed. This makes it possible for unauthenticated attackers to view potentially sensitive information contained in the exposed log file. The log file may contain user cookies making it possible for an attacker to log in with any session that is actively valid and exposed in the log file. Note: the debug feature must be enabled for this to be a concern and this feature is disabled by default. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-44000.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet