• Our team is looking to connect with folks who use email services provided by Plesk, or a premium service. If you'd like to be part of the discovery process and share your experiences, we invite you to complete this short screening survey. If your responses match the persona we are looking for, you'll receive a link to schedule a call at your convenience. We look forward to hearing from you!
  • The BIND DNS server has already been deprecated and removed from Plesk for Windows.
    If a Plesk for Windows server is still using BIND, the upgrade to Plesk Obsidian 18.0.70 will be unavailable until the administrator switches the DNS server to Microsoft DNS. We strongly recommend transitioning to Microsoft DNS within the next 6 weeks, before the Plesk 18.0.70 release.
  • The Horde component is removed from Plesk Installer. We recommend switching to another webmail software supported in Plesk.

Search results

  1. F

    Resolved Roundcube CVE 2024 - when does Plesk release an update?

    Adding: and I guess you don't want to miss the Regression/follow-up for CVE-2024-42008 as well Fix regression where printing/scaling/rotating image attachments was … · roundcube/roundcubemail@32fed15
  2. F

    Resolved Roundcube CVE 2024 - when does Plesk release an update?

    For those like me who cannot wait, here are all the 3 fixes for the CVE's to fix on your own risk, as always..hf! Fix XSS vulnerability in post-processing of sanitized HTML content [CVE-2024-42009] https://github.com/roundcube/roundcubemail/commit/68af7c864a36e1941764238dac440ab0d99a8d26 Fix...
  3. F

    Resolved Plesk Rouncube and exploit CVE-2023-5631

    I have checked it and there where no further changes between 1.6.3 and 1.6.4 so you can apply the patch on 18.0.56 Update #1 by running this, at your own risk as I did: cp /usr/share/psa-roundcube/program/lib/Roundcube/rcube_washtml.php /root/ cd /root/ && wget...
  4. F

    Resolved Plesk Rouncube and exploit CVE-2023-5631

    Well this looks dangerous to me. Why? -> First of all you are getting the file from the current master branch, usually when a version is released then this branch will be used for the next version, so this is what makes it dangerous in terms of possible incompatibilities. Next, I didnt check...
  5. F

    Resolved Plesk Rouncube and exploit CVE-2023-5631

    Hello together, I assume when you ensure that you run the latest roundcube 1.6.3 shipped by plesk packages, that you should be able to implement the following changes manually that should be overwritten automatically as soon as plesk ships 1.6.4 (You may better wait for an official confirmation...
Back
Top