Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
plesk vulnerabilities and exploits
(subscribe to this query)
890
VMScore
CVE-2011-4757
Parallels Plesk Small Business Panel 10.2.0 generates a password form field without disabling the autocomplete feature, which makes it easier for remote malicious users to bypass authentication by leveraging an unattended workstation, as demonstrated by forms in smb/auth and cert...
Parallels Parallels Plesk Small Business Panel 10.2.0
445
VMScore
CVE-2011-4759
Parallels Plesk Small Business Panel 10.2.0 generates web pages containing external links in response to GET requests with query strings for client@1/domain@1/hosting/file-manager/ and certain other files, which makes it easier for remote malicious users to obtain sensitive infor...
Parallels Parallels Plesk Small Business Panel 10.2.0
890
VMScore
CVE-2011-4762
Parallels Plesk Small Business Panel 10.2.0 sends incorrect Content-Type headers for certain resources, which might allow remote malicious users to have an unspecified impact by leveraging an interpretation conflict involving smb/app/top-categories-data/ and certain other files. ...
Parallels Parallels Plesk Small Business Panel 10.2.0
668
VMScore
CVE-2011-4763
Multiple SQL injection vulnerabilities in the Site Editor (aka SiteBuilder) feature in Parallels Plesk Small Business Panel 10.2.0 allow remote malicious users to execute arbitrary SQL commands via crafted input to a PHP script, as demonstrated by Wizard/Edit/Html and certain oth...
Parallels Parallels Plesk Small Business Panel 10.2.0
383
VMScore
CVE-2011-4764
Multiple cross-site scripting (XSS) vulnerabilities in the Site Editor (aka SiteBuilder) feature in Parallels Plesk Small Business Panel 10.2.0 allow remote malicious users to inject arbitrary web script or HTML via crafted input to a PHP script, as demonstrated by Wizard/Edit/Mo...
Parallels Parallels Plesk Small Business Panel 10.2.0
445
VMScore
CVE-2011-4766
The Site Editor (aka SiteBuilder) feature in Parallels Plesk Small Business Panel 10.2.0 allows remote malicious users to obtain ASP source code via a direct request to wysiwyg/fckconfig.js. NOTE: CVE disputes this issue because ASP is only used in a JavaScript comment
Parallels Parallels Plesk Small Business Panel 10.2.0
890
VMScore
CVE-2011-4768
The Site Editor (aka SiteBuilder) feature in Parallels Plesk Small Business Panel 10.2.0 omits the Content-Type header's charset parameter for certain resources, which might allow remote malicious users to have an unspecified impact by leveraging an interpretation conflict i...
Parallels Parallels Plesk Small Business Panel 10.2.0
383
VMScore
CVE-2011-4765
The Site Editor (aka SiteBuilder) feature in Parallels Plesk Small Business Panel 10.2.0 does not include the HTTPOnly flag in a Set-Cookie header for a cookie, which makes it easier for remote malicious users to obtain potentially sensitive information via script access to this ...
Parallels Parallels Plesk Small Business Panel 10.2.0
445
VMScore
CVE-2011-4767
The Site Editor (aka SiteBuilder) feature in Parallels Plesk Small Business Panel 10.2.0 has web pages containing e-mail addresses that are not intended for correspondence about the local application deployment, which allows remote malicious users to obtain potentially sensitive ...
Parallels Parallels Plesk Small Business Panel 10.2.0
755
VMScore
CVE-2013-4878
The default configuration of Parallels Plesk Panel 9.0.x and 9.2.x on UNIX, and Small Business Panel 10.x on UNIX, has an improper ScriptAlias directive for phppath, which makes it easier for remote malicious users to execute arbitrary code via a crafted request, a different vuln...
Parallels Parallels Plesk Panel 9.2
Parallels Parallels Plesk Panel 9.0
Parallels Parallels Small Business Panel 10.0
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48654
CVE-2024-2757
authentication bypass
CVE-2024-3194
CVE-2024-33640
CVE-2024-21111
dos
insecure direct object reference
CVE-2024-21345
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »