Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
parallels parallels plesk panel 10.2.0 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2011-4739
The Control Panel in Parallels Plesk Panel 10.2.0 build 20110407.20 generates a password form field without disabling the autocomplete feature, which makes it easier for remote malicious users to bypass authentication by leveraging an unattended workstation, as demonstrated by fo...
Parallels Parallels Plesk Panel 10.2.0 Build20110407.20
5
CVSSv2
CVE-2011-4741
The Control Panel in Parallels Plesk Panel 10.2.0 build 20110407.20 includes a database connection string within a web page, which allows remote malicious users to obtain potentially sensitive information by reading this page, as demonstrated by client@2/domain@1/hosting/aspdotne...
Parallels Parallels Plesk Panel 10.2.0 Build20110407.20
10
CVSSv2
CVE-2011-4730
The Server Administration Panel in Parallels Plesk Panel 10.2.0_build1011110331.18 generates a password form field without disabling the autocomplete feature, which makes it easier for remote malicious users to bypass authentication by leveraging an unattended workstation, as dem...
Parallels Parallels Plesk Panel 10.2.0 Build1011110331.18
5
CVSSv2
CVE-2011-4738
The Control Panel in Parallels Plesk Panel 10.2.0 build 20110407.20 does not include the HTTPOnly flag in a Set-Cookie header for a cookie, which makes it easier for remote malicious users to obtain potentially sensitive information via script access to this cookie, as demonstrat...
Parallels Parallels Plesk Panel 10.2.0 Build20110407.20
10
CVSSv2
CVE-2011-4744
The Control Panel in Parallels Plesk Panel 10.2.0 build 20110407.20 sends incorrect Content-Type headers for certain resources, which might allow remote malicious users to have an unspecified impact by leveraging an interpretation conflict involving smb/admin-home/featured-applic...
Parallels Parallels Plesk Panel 10.2.0 Build20110407.20
10
CVSSv2
CVE-2011-4732
The Server Administration Panel in Parallels Plesk Panel 10.2.0_build1011110331.18 omits the Content-Type header's charset parameter for certain resources, which might allow remote malicious users to have an unspecified impact by leveraging an interpretation conflict involvi...
Parallels Parallels Plesk Panel 10.2.0 Build1011110331.18
10
CVSSv2
CVE-2011-4733
The Server Administration Panel in Parallels Plesk Panel 10.2.0_build1011110331.18 sends incorrect Content-Type headers for certain resources, which might allow remote malicious users to have an unspecified impact by leveraging an interpretation conflict involving smb/admin-home/...
Parallels Parallels Plesk Panel 10.2.0 Build1011110331.18
4.3
CVSSv2
CVE-2011-4735
Multiple cross-site scripting (XSS) vulnerabilities in the Control Panel in Parallels Plesk Panel 10.2.0 build 20110407.20 allow remote malicious users to inject arbitrary web script or HTML via crafted input to a PHP script, as demonstrated by smb/user/create and certain other f...
Parallels Parallels Plesk Panel 10.2.0 Build20110407.20
4.3
CVSSv2
CVE-2011-4740
The Control Panel in Parallels Plesk Panel 10.2.0 build 20110407.20 generates web pages containing external links in response to GET requests with query strings for smb/app/search-data/catalogId/marketplace and certain other files, which makes it easier for remote malicious users...
Parallels Parallels Plesk Panel 10.2.0 Build20110407.20
5
CVSSv2
CVE-2011-4742
The Control Panel in Parallels Plesk Panel 10.2.0 build 20110407.20 has web pages containing e-mail addresses that are not intended for correspondence about the local application deployment, which allows remote malicious users to obtain potentially sensitive information by readin...
Parallels Parallels Plesk Panel 10.2.0 Build20110407.20
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
SSRF
server-side request forgery
CVE-2024-30067
CVE-2024-5553
CVE-2024-30095
IDOR
CVE-2024-35252
CVE-2024-23692
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »