Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
plesk plesk vulnerabilities and exploits
(subscribe to this query)
890
VMScore
CVE-2011-4749
The billing system for Parallels Plesk Panel 10.3.1_build1013110726.09 generates a password form field without disabling the autocomplete feature, which makes it easier for remote malicious users to bypass authentication by leveraging an unattended workstation, as demonstrated by...
Parallels Parallels Plesk Panel 10.3.1 Build1013110726.09
445
VMScore
CVE-2011-4737
The Control Panel in Parallels Plesk Panel 10.2.0 build 20110407.20 includes a submitted password within an HTTP response body, which allows remote malicious users to obtain sensitive information by sniffing the network, as demonstrated by password handling in client@2/domain@1/o...
Parallels Parallels Plesk Panel 10.2.0 Build20110407.20
383
VMScore
CVE-2011-4735
Multiple cross-site scripting (XSS) vulnerabilities in the Control Panel in Parallels Plesk Panel 10.2.0 build 20110407.20 allow remote malicious users to inject arbitrary web script or HTML via crafted input to a PHP script, as demonstrated by smb/user/create and certain other f...
Parallels Parallels Plesk Panel 10.2.0 Build20110407.20
383
VMScore
CVE-2011-4848
The Control Panel in Parallels Plesk Panel 10.4.4_build20111103.18 includes a submitted password within an HTTP response body, which allows remote malicious users to obtain sensitive information by sniffing the network, as demonstrated by password handling in certain files under ...
Parallels Parallels Plesk Panel 10.4.4 Build20111103.18
828
VMScore
CVE-2011-4851
The Control Panel in Parallels Plesk Panel 10.4.4_build20111103.18 generates a password form field without disabling the autocomplete feature, which makes it easier for remote malicious users to bypass authentication by leveraging an unattended workstation, as demonstrated by for...
Parallels Parallels Plesk Panel 10.4.4 Build20111103.18
383
VMScore
CVE-2011-4853
The Control Panel in Parallels Plesk Panel 10.4.4_build20111103.18 includes an RFC 1918 IP address within a web page, which allows remote malicious users to obtain potentially sensitive information by reading this page, as demonstrated by smb/user/list-data/items-per-page/ and ce...
Parallels Parallels Plesk Panel 10.4.4 Build20111103.18
890
VMScore
CVE-2011-4730
The Server Administration Panel in Parallels Plesk Panel 10.2.0_build1011110331.18 generates a password form field without disabling the autocomplete feature, which makes it easier for remote malicious users to bypass authentication by leveraging an unattended workstation, as dem...
Parallels Parallels Plesk Panel 10.2.0 Build1011110331.18
890
VMScore
CVE-2011-4739
The Control Panel in Parallels Plesk Panel 10.2.0 build 20110407.20 generates a password form field without disabling the autocomplete feature, which makes it easier for remote malicious users to bypass authentication by leveraging an unattended workstation, as demonstrated by fo...
Parallels Parallels Plesk Panel 10.2.0 Build20110407.20
445
VMScore
CVE-2011-4742
The Control Panel in Parallels Plesk Panel 10.2.0 build 20110407.20 has web pages containing e-mail addresses that are not intended for correspondence about the local application deployment, which allows remote malicious users to obtain potentially sensitive information by readin...
Parallels Parallels Plesk Panel 10.2.0 Build20110407.20
445
VMScore
CVE-2011-4748
The billing system for Parallels Plesk Panel 10.3.1_build1013110726.09 has web pages containing e-mail addresses that are not intended for correspondence about the local application deployment, which allows remote malicious users to obtain potentially sensitive information by rea...
Parallels Parallels Plesk Panel 10.3.1 Build1013110726.09
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
NEXT »