Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
parallels parallels plesk panel 10.2.0 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2011-4759
Parallels Plesk Small Business Panel 10.2.0 generates web pages containing external links in response to GET requests with query strings for client@1/domain@1/hosting/file-manager/ and certain other files, which makes it easier for remote malicious users to obtain sensitive infor...
Parallels Parallels Plesk Small Business Panel 10.2.0
5
CVSSv2
CVE-2011-4766
The Site Editor (aka SiteBuilder) feature in Parallels Plesk Small Business Panel 10.2.0 allows remote malicious users to obtain ASP source code via a direct request to wysiwyg/fckconfig.js. NOTE: CVE disputes this issue because ASP is only used in a JavaScript comment
Parallels Parallels Plesk Small Business Panel 10.2.0
4.3
CVSSv2
CVE-2011-4754
Multiple cross-site scripting (XSS) vulnerabilities in Parallels Plesk Small Business Panel 10.2.0 allow remote malicious users to inject arbitrary web script or HTML via crafted input to a PHP script, as demonstrated by smb/app/available/id/apscatalog/ and certain other files.
Parallels Parallels Plesk Small Business Panel 10.2.0
10
CVSSv2
CVE-2011-4761
Parallels Plesk Small Business Panel 10.2.0 omits the Content-Type header's charset parameter for certain resources, which might allow remote malicious users to have an unspecified impact by leveraging an interpretation conflict involving domains/sitebuilder_edit.php and cer...
Parallels Parallels Plesk Small Business Panel 10.2.0
4.3
CVSSv2
CVE-2011-4764
Multiple cross-site scripting (XSS) vulnerabilities in the Site Editor (aka SiteBuilder) feature in Parallels Plesk Small Business Panel 10.2.0 allow remote malicious users to inject arbitrary web script or HTML via crafted input to a PHP script, as demonstrated by Wizard/Edit/Mo...
Parallels Parallels Plesk Small Business Panel 10.2.0
5
CVSSv2
CVE-2011-4767
The Site Editor (aka SiteBuilder) feature in Parallels Plesk Small Business Panel 10.2.0 has web pages containing e-mail addresses that are not intended for correspondence about the local application deployment, which allows remote malicious users to obtain potentially sensitive ...
Parallels Parallels Plesk Small Business Panel 10.2.0
10
CVSSv2
CVE-2011-4768
The Site Editor (aka SiteBuilder) feature in Parallels Plesk Small Business Panel 10.2.0 omits the Content-Type header's charset parameter for certain resources, which might allow remote malicious users to have an unspecified impact by leveraging an interpretation conflict i...
Parallels Parallels Plesk Small Business Panel 10.2.0
5
CVSSv2
CVE-2011-4736
The Control Panel in Parallels Plesk Panel 10.2.0 build 20110407.20 receives cleartext password input over HTTP, which allows remote malicious users to obtain sensitive information by sniffing the network, as demonstrated by forms in login_up.php3 and certain other files.
Parallels Parallels Plesk Panel 10.2.0 Build20110407.20
10
CVSSv2
CVE-2011-4744
The Control Panel in Parallels Plesk Panel 10.2.0 build 20110407.20 sends incorrect Content-Type headers for certain resources, which might allow remote malicious users to have an unspecified impact by leveraging an interpretation conflict involving smb/admin-home/featured-applic...
Parallels Parallels Plesk Panel 10.2.0 Build20110407.20
10
CVSSv2
CVE-2011-4743
The Control Panel in Parallels Plesk Panel 10.2.0 build 20110407.20 omits the Content-Type header's charset parameter for certain resources, which might allow remote malicious users to have an unspecified impact by leveraging an interpretation conflict involving smb/user/cre...
Parallels Parallels Plesk Panel 10.2.0 Build20110407.20
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-21991
CVE-2024-32674
path traversal
CVE-2023-21987
denial of service
dos
CVE-2024-4647
CVE-2024-25519
CVE-2024-33612
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »