Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
plesk plesk vulnerabilities and exploits
(subscribe to this query)
383
VMScore
CVE-2011-4849
The Control Panel in Parallels Plesk Panel 10.4.4_build20111103.18 does not set the secure flag for a cookie in an https session, which makes it easier for remote malicious users to capture this cookie by intercepting its transmission within an http session, as demonstrated by co...
Parallels Parallels Plesk Panel 10.4.4 Build20111103.18
383
VMScore
CVE-2011-4853
The Control Panel in Parallels Plesk Panel 10.4.4_build20111103.18 includes an RFC 1918 IP address within a web page, which allows remote malicious users to obtain potentially sensitive information by reading this page, as demonstrated by smb/user/list-data/items-per-page/ and ce...
Parallels Parallels Plesk Panel 10.4.4 Build20111103.18
890
VMScore
CVE-2011-4730
The Server Administration Panel in Parallels Plesk Panel 10.2.0_build1011110331.18 generates a password form field without disabling the autocomplete feature, which makes it easier for remote malicious users to bypass authentication by leveraging an unattended workstation, as dem...
Parallels Parallels Plesk Panel 10.2.0 Build1011110331.18
445
VMScore
CVE-2011-4738
The Control Panel in Parallels Plesk Panel 10.2.0 build 20110407.20 does not include the HTTPOnly flag in a Set-Cookie header for a cookie, which makes it easier for remote malicious users to obtain potentially sensitive information via script access to this cookie, as demonstrat...
Parallels Parallels Plesk Panel 10.2.0 Build20110407.20
890
VMScore
CVE-2011-4744
The Control Panel in Parallels Plesk Panel 10.2.0 build 20110407.20 sends incorrect Content-Type headers for certain resources, which might allow remote malicious users to have an unspecified impact by leveraging an interpretation conflict involving smb/admin-home/featured-applic...
Parallels Parallels Plesk Panel 10.2.0 Build20110407.20
383
VMScore
CVE-2011-4850
The Control Panel in Parallels Plesk Panel 10.4.4_build20111103.18 does not include the HTTPOnly flag in a Set-Cookie header for a cookie, which makes it easier for remote malicious users to obtain potentially sensitive information via script access to this cookie, as demonstrate...
Parallels Parallels Plesk Panel 10.4.4 Build20111103.18
828
VMScore
CVE-2011-4856
The Control Panel in Parallels Plesk Panel 10.4.4_build20111103.18 sends incorrect Content-Type headers for certain resources, which might allow remote malicious users to have an unspecified impact by leveraging an interpretation conflict involving admin/health/parameters and cer...
Parallels Parallels Plesk Panel 10.4.4 Build20111103.18
383
VMScore
CVE-2011-4848
The Control Panel in Parallels Plesk Panel 10.4.4_build20111103.18 includes a submitted password within an HTTP response body, which allows remote malicious users to obtain sensitive information by sniffing the network, as demonstrated by password handling in certain files under ...
Parallels Parallels Plesk Panel 10.4.4 Build20111103.18
890
VMScore
CVE-2011-4732
The Server Administration Panel in Parallels Plesk Panel 10.2.0_build1011110331.18 omits the Content-Type header's charset parameter for certain resources, which might allow remote malicious users to have an unspecified impact by leveraging an interpretation conflict involvi...
Parallels Parallels Plesk Panel 10.2.0 Build1011110331.18
890
VMScore
CVE-2011-4733
The Server Administration Panel in Parallels Plesk Panel 10.2.0_build1011110331.18 sends incorrect Content-Type headers for certain resources, which might allow remote malicious users to have an unspecified impact by leveraging an interpretation conflict involving smb/admin-home/...
Parallels Parallels Plesk Panel 10.2.0 Build1011110331.18
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
logic flaw
CVE-2024-23692
CVE-2024-26229
CVE-2024-35255
CVE-2024-5835
CVE-2024-5837
XML external entity
dos
CVE-2024-5813
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »