K
Klaus-DK
Guest
Plesk 9.5.1 ist da
Update von Debian Lenny Plesk 9.3.0 zu 9.5.1 keine Probleme.
Gruss
Klaus
Update von Debian Lenny Plesk 9.3.0 zu 9.5.1 keine Probleme.
Gruss
Klaus
CPU GenuineIntel, Intel(R) Core(TM) i5 CPU 750 @ 2.67GHz
Version Parallels Plesk Panel v9.5.1_build95100410.12 os_Debian 5.0
OS Linux 2.6.33.2
Keynummer PLSK.01213294.0004
Systembetriebszeit: 02:50
RPM: http://download1.parallels.com/Plesk/Panel9.5/plesk-9.5.0-for-rpm-based-os.html[+] Upgraded components: ProFTPD was upgraded to the version 1.3.2e, phpMyAdmin to the version 2.9.11, and Horde Application Framework to the version 3.3.6.
[-] An unauthenticated remote attacker being able to compromise the system and gain control over it security issues were resolved.
[-] Cross-site scripting vulnerability was eliminated.
[-] ProFTPD 1.3.1 was prone to a security vulnerability that allowed attackers to perform cross-site request forgery types of attacks issue is resolved by upgrade of ProFTPD to the version 1.3.2e.
PKG: http://download1.parallels.com/Plesk/Panel9.5/plesk-9.5.0-for-pkg-based-os.html[+] CloudLinux support — Parallels Plesk Panel can now work under CloudLinux operating system.
[+]Upgraded components: ProFTPD was upgraded to the version 1.3.2e, phpMyAdmin to the version 2.9.11, and Horde Application Framework to the version 3.3.6.
[-] An unauthenticated remote attacker being able to compromise the system and gain control over it security issues were resolved.
[-] Cross-site scripting vulnerability was eliminated.
[-] ProFTPD 1.3.1 was prone to a security vulnerability that allowed attackers to perform cross-site request forgery types of attacks issue is resolved by upgrade of ProFTPD to the version 1.3.2e.
[+] Upgraded components: ProFTPD was upgraded to the version 1.3.2e, phpMyAdmin to the version 2.9.11, and Horde Application Framework to the version 3.3.6.
[-] An unauthenticated remote attacker being able to compromise the system and gain control over it security issues were resolved.
[-] Cross-site scripting vulnerability was eliminated.
[-] ProFTPD 1.3.1 was prone to a security vulnerability that allowed attackers to perform cross-site request forgery types of attacks issue is resolved by upgrade of ProFTPD to the version 1.3.2e.
Würde ich mich nicht wirklich drauf verlassen. Aber die Chancen stehen zumindest besser als bei 8er-Backups.Die Backups von Plesk sollten zwischen 9.0.1 und 9.5 auch kompatible sein oder?
Jetzt (10.33): keine Updates mehr....
????
Version Parallels Plesk Panel v9.5.1_build95100410.12 os_Debian 5.0
Hallo zusammen,
gestern wurde mir über den Installer das Upgrade auf 9.5 angeboten und ich habe dieses dann auch ganz normal ausgeführt. Nun steh ich aber vor dem Problem, das 9.5 den Key, welcher auf 9.3 noch wunderbar funktionierte, nicht akzeptiert.
<?xml version="1.0" encoding="UTF-8"?><plesk-unix-95:key xmlns:plesk-unix-95="http://parallels.com/schemas/keys/products/plesk/unix/9.5" core:format="openfusion-3" xmlns:core="http://parallels.com/schemas/keys/core/3">
<!--Unique product Key number-->
<core:key-number core:type="string">PLSK.01213294</core:key-number>
<!--Key version-->
<core:key-version core:type="string">0004</core:key-version>
<!--Key description-->
<core:description>
<core:keytype>Parallels Plesk Panel 9.5</core:keytype>
<core:feature>SpamAssassin</core:feature>
<core:feature>Application Pack</core:feature>
<core:feature>30 Domains</core:feature>
<core:feature>1 Language Pack</core:feature>
<core:property core:value="1">Additional Language Packs</core:property>
</core:description>
<!--Product which this license is intended to work on-->
<core:product core:type="string">plesk-unix</core:product>
<!--Supported product version-->
<core:version core:type="string">9.5</core:version>
<!--Date after which this license becomes usable (inclusive)-->
<core:start-date core:type="date">instant</core:start-date>
<!--Date before which this license is usable (exclusive)-->
<core:expiration-date core:type="date">2010-07-15</core:expiration-date>
<!--URL of the service endpoint to use when performing an autoupdate-->
We use essential cookies to make this site work, and optional cookies to enhance your experience.