Parallels

Parallels Plesk Panel

42 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.33%
  • Veröffentlicht 13.11.2019 20:15:10
  • Zuletzt bearbeitet 21.11.2024 04:33:34

Parallels Plesk Panel 9.5 allows XSS in target/locales/tr-TR/help/index.htm? via the "fileName" parameter.

  • EPSS 13.94%
  • Veröffentlicht 18.07.2013 16:51:56
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The default configuration of Parallels Plesk Panel 9.0.x and 9.2.x on UNIX, and Small Business Panel 10.x on UNIX, has an improper ScriptAlias directive for phppath, which makes it easier for remote attackers to execute arbitrary code via a crafted r...

  • EPSS 0.19%
  • Veröffentlicht 18.04.2013 18:55:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Untrusted search path vulnerability in /usr/local/psa/admin/sbin/wrapper in Parallels Plesk Panel 11.0.9 allows local users to gain privileges via a crafted PATH environment variable.

  • EPSS 0.51%
  • Veröffentlicht 18.04.2013 18:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The suexec implementation in Parallels Plesk Panel 11.0.9 contains a cgi-wrapper whitelist entry, which allows user-assisted remote attackers to execute arbitrary PHP code via a request containing crafted environment variables.

  • EPSS 1.39%
  • Veröffentlicht 12.03.2012 19:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

SQL injection vulnerability in admin/plib/api-rpc/Agent.php in Parallels Plesk Panel 7.x and 8.x before 8.6 MU#2, 9.x before 9.5 MU#11, 10.0.x before MU#13, 10.1.x before MU#22, 10.2.x before MU#16, and 10.3.x before MU#5 allows remote attackers to e...

Exploit
  • EPSS 0.23%
  • Veröffentlicht 16.12.2011 11:55:13
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Control Panel in Parallels Plesk Panel 10.4.4_build20111103.18 generates web pages containing external links in response to GET requests with query strings for enterprise/mobile-monitor/ and certain other files, which makes it easier for remote a...

  • EPSS 0.17%
  • Veröffentlicht 16.12.2011 11:55:13
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Control Panel in Parallels Plesk Panel 10.4.4_build20111103.18 generates a password form field without disabling the autocomplete feature, which makes it easier for remote attackers to bypass authentication by leveraging an unattended workstation...

Exploit
  • EPSS 0.23%
  • Veröffentlicht 16.12.2011 11:55:13
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Control Panel in Parallels Plesk Panel 10.4.4_build20111103.18 includes an RFC 1918 IP address within a web page, which allows remote attackers to obtain potentially sensitive information by reading this page, as demonstrated by smb/user/list-dat...

  • EPSS 0.75%
  • Veröffentlicht 16.12.2011 11:55:13
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Control Panel in Parallels Plesk Panel 10.4.4_build20111103.18 does not ensure that Content-Type HTTP headers match the corresponding Content-Type data in HTML META elements, which might allow remote attackers to have an unspecified impact by lev...

  • EPSS 0.75%
  • Veröffentlicht 16.12.2011 11:55:13
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Control Panel in Parallels Plesk Panel 10.4.4_build20111103.18 omits the Content-Type header's charset parameter for certain resources, which might allow remote attackers to have an unspecified impact by leveraging an interpretation conflict invo...