Parallels

Parallels Plesk Panel

42 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.24%
  • Veröffentlicht 16.12.2011 11:55:10
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The billing system for Parallels Plesk Panel 10.3.1_build1013110726.09 does not prevent the use of weak ciphers for SSL sessions, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a crafted CipherSuite list.

  • EPSS 0.23%
  • Veröffentlicht 16.12.2011 11:55:10
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Multiple cross-site scripting (XSS) vulnerabilities in the billing system for Parallels Plesk Panel 10.3.1_build1013110726.09 allow remote attackers to inject arbitrary web script or HTML via crafted input to a PHP script, as demonstrated by admin/in...

  • EPSS 1.8%
  • Veröffentlicht 16.12.2011 11:55:10
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Control Panel in Parallels Plesk Panel 10.2.0 build 20110407.20 sends incorrect Content-Type headers for certain resources, which might allow remote attackers to have an unspecified impact by leveraging an interpretation conflict involving smb/ad...

  • EPSS 1.8%
  • Veröffentlicht 16.12.2011 11:55:10
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Control Panel in Parallels Plesk Panel 10.2.0 build 20110407.20 omits the Content-Type header's charset parameter for certain resources, which might allow remote attackers to have an unspecified impact by leveraging an interpretation conflict inv...

  • EPSS 0.23%
  • Veröffentlicht 16.12.2011 11:55:10
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Control Panel in Parallels Plesk Panel 10.2.0 build 20110407.20 has web pages containing e-mail addresses that are not intended for correspondence about the local application deployment, which allows remote attackers to obtain potentially sensiti...

  • EPSS 0.23%
  • Veröffentlicht 16.12.2011 11:55:10
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Control Panel in Parallels Plesk Panel 10.2.0 build 20110407.20 includes a database connection string within a web page, which allows remote attackers to obtain potentially sensitive information by reading this page, as demonstrated by client@2/d...

  • EPSS 0.23%
  • Veröffentlicht 16.12.2011 11:55:10
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Control Panel in Parallels Plesk Panel 10.2.0 build 20110407.20 generates web pages containing external links in response to GET requests with query strings for smb/app/search-data/catalogId/marketplace and certain other files, which makes it eas...

  • EPSS 1.09%
  • Veröffentlicht 16.12.2011 11:55:10
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Control Panel in Parallels Plesk Panel 10.2.0 build 20110407.20 generates a password form field without disabling the autocomplete feature, which makes it easier for remote attackers to bypass authentication by leveraging an unattended workstatio...

  • EPSS 0.25%
  • Veröffentlicht 16.12.2011 11:55:10
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Control Panel in Parallels Plesk Panel 10.2.0 build 20110407.20 does not include the HTTPOnly flag in a Set-Cookie header for a cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to th...

  • EPSS 0.25%
  • Veröffentlicht 16.12.2011 11:55:10
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Control Panel in Parallels Plesk Panel 10.2.0 build 20110407.20 includes a submitted password within an HTTP response body, which allows remote attackers to obtain sensitive information by sniffing the network, as demonstrated by password handlin...