Article ID: 112303, created on Sep 16, 2011, last review on Jun 17, 2016

  • Applies to:
  • Plesk 12.0 for Linux

Release Notes

This article provides fixes for the most critical vulnerabilities in the older Plesk versions 8.x, 9.0.x - 9.5.4, 10.0.x - 10.2.0 on Windows. Earlier versions 7.x, 6.x, etc. have to be upgraded to a later version that is not vulnerable.

NOTE: The fixes are available on Plesk 9.5.5 for Windows through the Micro-Update technology since the 9.5.5 MU#1 release.

NOTE: If you suspect your server was compromised with the remote vulnerability KB #113321 before applying the patch, it's strongly recommended to change passwords for all accounts in the Plesk. Please refer to KB #113391 to perform the mass password change using provided script.


To apply the fixes to one Plesk server use the plesk_remote_vulnerability_fix_deployer script:

  1. Upload the attached archive on Plesk server (MD5 19f5002019c9f57f363f002175d21e8c).

  2. Uncompress the archive to some temporary directory.

  3. Go to the temporary directory and run the following command:

    "%plesk_bin%\php" -d auto_prepend_file="" plesk_remote_vulnerability_fix_deployer.php

    NOTE:  To simplify a mass deployment in Virtuozzo containers for Windows environment, it is recommended to utilize the plesk_remote_vulnerability_fix_mass_deployer script:

  4. Upload the attached plesk_remote_vulnerability_fix_mass archive on Virtuozzo containers Windows hardware node (MD5 7f152f0b8fab07fe42ea27265bde6f50).

  5. Uncompress the archive to some temporary directory.

  6. Go to the temporary directory and run the following command:

    # plesk_remote_vulnerability_fix_mass_deployer.bat

Search Words

Security Update Custom Fixes for Windows


56797cefb1efc9130f7c48a7d1db0f0c a914db3fdc7a53ddcfd1b2db8f5a1b9c 29d1e90fd304f01e6420fbe60f66f838 2a5151f57629129e26ff206d171fbb5f e335d9adf7edffca6a8af8039031a4c7

Email subscription for changes to this article
Save as PDF