Plesk Pre-Transfer Checker version 13.0 is available
New check has been added:
– Add warning that Mailman specific settings set up through Mailman admin interface or un-approved messages in moderated lists will be lost during migration
New check has been added:
– Add warning that Mailman specific settings set up through Mailman admin interface or un-approved messages in moderated lists will be lost during migration
The following new functionality has been added:
[+] Migration of databases from remote DB server on Source to remote DB server on Destination
[+] (Linux only) phpMyAdmin has been upgraded to 3.5.8.1
[+] (Windows only) PHP 5.3 has been upgraded to 5.3.25
[+] (Windows only) PHP 5.4 has been upgraded to 5.4.15
Parallels always advises that you run up-to-date OS’s with the latest security patches. The following patch to RHEL/CentOS is highly recommended. A secure OS helps protect the security of your Control Panel too.
The following bugs have been fixed:
[-]Impossibility to execute API-RPC requests in Power User Mode when “Custom View Settings” is enabled.
[-]Impossibility to set autoresponder in case of Qmail MTA when there a lot of mail aliases for a mail name.
The following bug has been fixed:
[-] Fixed moderate security issue with leak of sensitive information. The issue can be exploited by authenticated users only. Authenticated users are users that have logins to Parallels Plesk Panel (such as your customers, resellers, or your employees). This MU is strongly recommended for all Parallels Plesk Panel users.
The following bug has been fixed:
[-] Fixed moderate security issue with leak of sensitive information. The issue can be exploited by authenticated users only. Authenticated users are users that have logins to Parallels Plesk Panel (such as your customers, resellers, or your employees). This MU is strongly recommended for all Parallels Plesk Panel users.
This update includes some bug fixes.
The following bugs have been fixed:
[-] If you are using Parallels Panel Mobile Center and MSSQL database for Plesk, then Home Page of the Control Panel will throw Error 500 or “Microsoft OLE DB Provider for SQL Server An expression of non-boolean type specified in a context where a condition is expected” (120843)
[-] mod_cloudflare apache server module doesn’t exists in Plesk distributive for Debian 6 x86
[-] Plesk doesn’t work with error: “File “DbAdapterPdoMysql.php” does not exist or class “Db_Adapter_Pdo_Mysql” was not found in the file” (122456)
The following new features have been implemented:
[+] Support for new operating systems for deployment of service nodes. CentOS 6.4 and RedHat 6.4 operating systems are now supported.
The following features have been improved:
[*] Option names in the WHMCS module were improved.
The following bugs have been fixed:
[-] Addition of a service node could fail at the step of installing additional packages. Restarting the task or attempting to remove the incompletely added node and then add it again resulted in an error.
Good news! Now Plesk Webserver Configuration Checker can be used as Plesk extension.
Good news! Now you can perform pre-trasfer checks directly from Plesk Mass Transfer Script for Linux servers. (Look at –check option)
Version 11.0:
Following check item has been added:
– warn if different mail servers installed on source and destination
The following new functionality has been added:
[+] MailEnable has been updated to version 7.06. It is actual only for new installation. Already existing MailEnable installations will not be upgraded.
The following bug has been fixed:
[-] PHP settings can’t be set via API-RPC (124552)
MailEnable has released critical updates to the following versions: 3, 4, 5, 6 and 7.
MailEnable recommend to install this security update on all production systems.
Please check http://www.mailenable.com/rss/article.asp?Source=RSSADMIN&ID=SECURITYUPDATE20130422 for more details and update instructions.
The following new functionality has been added:
[+] (Windows only) BIND has been updated to version 9.9.2-P2
[+] Behaviour of Event Handlers is changed. Since this microupdate Plesk will expose plain passwords for event handlers independent on security mode.
The following bug has been fixed:
[-] Plesk could not be updated on Centos 6 if package perl-Digest-SHA is installed (134272)
[-] PHP settings can’t be set via API-RPC (124552
[-] Impossible to delete DNS record via API-RPC in case of 400 domains on the server
[-] (Windows only) Temporary statistics files are not deleting from C:Recycler (128399)
The following bug has been fixed:
[-] Fixed moderate security issue with privilege escalation.
More details in article Public issues VU#310500 and CVE-2013-0132, CVE-2013-0133
This MU is recommended for all Parallels Plesk Panel users.
The following bug has been fixed:
[-] Fixed moderate security issue with privilege escalation.
More details in article Public issues VU#310500 and CVE-2013-0132, CVE-2013-0133
This MU is recommended for all Parallels Plesk Panel users.
The following bug has been fixed:
[-] Fixed moderate security issue with privilege escalation.
More details in article Public issues VU#310500 and CVE-2013-0132, CVE-2013-0133
This MU is recommended for all Parallels Plesk Panel users.
The following bug has been fixed:
[-] Fixed moderate security issue with privilege escalation.
More details in article Public issues VU#310500 and CVE-2013-0132, CVE-2013-0133
This MU is recommended for all Parallels Plesk Panel users.
The following bug has been fixed:
[-] Fixed moderate security issue with privilege escalation. Parallels Plesk Panel versions 9.x-11.x with Apache web server running mod_php, mod_perl, mod_python, etc. is vulnerable to authenticated user privilege escalation. Authenticated users are users that have login to Parallels Plesk Panel (such as f.e. your customers, resellers, or your employees).
Parallels Plesk Panel instances with Apache web server configured with Fast CGI (PHP, perl, python, etc) or CGI (PHP, perl, python, etc) are NOT vulnerable.
More details in article Public issues VU#310500 and CVE-2013-0132, CVE-2013-0133
This MU is recommended for all Parallels Plesk Panel users.
The following bug has been fixed:
[-] Fixed moderate security issue with privilege escalation. Parallels Plesk Panel versions 9.x-11.x with Apache web server running mod_php, mod_perl, mod_python, etc. is vulnerable to authenticated user privilege escalation. Authenticated users are users that have login to Parallels Plesk Panel (such as f.e. your customers, resellers, or your employees).
Parallels Plesk Panel instances with Apache web server configured with Fast CGI (PHP, perl, python, etc) or CGI (PHP, perl, python, etc) are NOT vulnerable.
More details in article Public issues VU#310500 and CVE-2013-0132, CVE-2013-0133
This MU is recommended for all Parallels Plesk Panel users.
The following bug has been fixed:
[-] Fixed moderate security issue with privilege escalation. Parallels Plesk Panel versions 9.x-11.x with Apache web server running mod_php, mod_perl, mod_python, etc. is vulnerable to authenticated user privilege escalation. Authenticated users are users that have login to Parallels Plesk Panel (such as f.e. your customers, resellers, or your employees).
Parallels Plesk Panel instances with Apache web server configured with Fast CGI (PHP, perl, python, etc) or CGI (PHP, perl, python, etc) are NOT vulnerable.
More details in article Public issues VU#310500 and CVE-2013-0132, CVE-2013-0133
This MU is recommended for all Parallels Plesk Panel users.
Plesk Service Team is pleased to introduce the Plesk FAQ.
We collected a lot of questions and answers concerning various aspects of Plesk in the corresponding KB article.
We will continue to fill Plesk FAQ with new and valuable information.
The following new features have been implemented:
[+] Running PPA behind NAT. Administrators can configure PPA to run behind a router with NAT.
The following features have been improved:
The following bugs have been fixed:
[-] Administrators could not register Windows-based service nodes if the administrator’s password contained the ^ symbol.
The following new functionality has been added:
[+] AWstats has been updated to version 7.1.1.
Note: New AWstats perceive wget as a robot.
The following bugs have been fixed:
[-] Error appeared after trying to edit default website widget in admin UI (133018)
[-] Phpmyadmin stuck when execute Update SQL query from GUI (132241)
Following check item has been added:
The following bugs have been fixed:
[-] Backup fails on dumping smb_users table if perl-DBD-mysql package doesn’t installed (129117, 129657)
[-] If custom database schema has been created inside database that database can’t be backed up and restored on MS SQL 2008 SP2 (125163)
[-] Installation of psa-kav8 package on CentOS/RedHat 5.9 fails after libxml2.so.2 update
Following check item has been added:
– add notice about all mail list members of all domains will receive welcome messages about being added to their mail list again
Following check item has been added:
– check for enough inodes on Destination server
The following bugs have been fixed:
[-] DrWeb mail handler runs two times on each message (108472).
[-] Upgrade php component breaks permissions on php sessions directory (91998).
60 queries. 8.75 mb Memory usage. 1.606 seconds.