Service pack contains fixes for issues solved in Plesk 7.0 hotfixes:
Changing BACKUP directory in reconfigurator.
Reconfigurator utility did not change Plesk domains Backup directory location.
Reconfigurator GUI and usability improvements
There was no shortcut on reconfigurator in Start->Programs->SWsoft Plesk menu. There was no help messages (hints). Button 'Map address to' was not disabled correctly.
Reconfigurator path validation
Reconfigurator did not check correctly path value to conform some conditions. E.g. it was possible to set Plesk vhosts directory into system folder, user home directory, etc.
Statistics.exe uses a lot of CPU resources
Statistics utility ulitized too much CPU time during start to determine location of log files per each domain. Initialization step was significantly optimized.
Databases size in domain report issue
Size of database files was not calculated in domain report.
Wrong web ftp statistics calculation for domains on shared IP
Statistics was calculated only for one domain on a shared IP address. All other domains was not processed.
UebiMiau login issue
Uebimiau displayed error message "Invalid theme, configure your $default_theme" on login page. UebiMiau was incorrectly installed on a domain, some configuration steps were missed.
Client couldn't access to log manager
Client has not enouph permissions to access Log Manager even if server administrator delegated access to the client via control panel.
Backup utilities and national symbols issue
Couldn't restore files with national symbols in the name.
Wrong \vhosts\webmail\index.html file context
File index.html in webmail folder was malformed. It doesn't conform to W3C HTML standard.
"Invalid Base Path" issue
System user psaadm sometimes loses permissions to access certain registry keys. Usually it happens after migration from Plesk 6.5.x to 7.0.0 or multiple install/uninstall cycles. The utility called reconfigurator.exe could be used to fix registry keys access permissions. Please run reconfigurator.exe, click on "Repair Plesk Installation", select "Plesk File Security" checkbox and then click "Next".
Workaround for "BIND high CPU utilization" issue
BIND DNS server used by Plesk could use about 20-40% CPU load running under Windows on some SMP configurations even when idle. In the case where DNS services are not actually provided by Plesk, it is now possible to disable BIND service completely to reduce unnecessary load. server and keep it's configuration up-to-date manually or use static domain configarations. In this case it is possible to disable BIND service installed with Plesk Control Panel version 7.0.0. To disable BIND, please run command line (without quotes): "dnsmng --named-disable". Plesk control panel will disable BIND DNS service and won't start Bind again during new domain addition or reconfiguration of existing domains. To enable BIND service back, please run command line (without quotes): "dnsmng --named-enable" Bind service will be enabled and all DNS reconfigurations will work as usual.
Error at domain page after migration from 6.5.x to 7.0.x
It is impossible to read and change existing domain configuration and to create new domain on a Plesk systems migrated from 6.5.x version to Plesk 7.0.x. Domain configuration web page failed and displayed error message: "Unable to assign DomainControlForm object: Unable to addVars: domain_bu failed: ProductInfo,Product,Attribute"
Plesk AutoUpdater crashes after the migration from 6.5.x to 7.0.x
It is impossible to check for new Plesk updates after the migration from Plesk 6.5.x to Plesk 7.0.x. Plesk AutoUpdater displays message box "Error in checking updates: ProductInfo,Product,Attribute" and stops. Plesk Control Panel page "Plesk Update" fails and displays error message: "Unable to init the AutoUpdatesList: Unable to run `pleskautoupdate` utility: ProductInfo,Product,Attribute"
Plesk "login_name" Cross-Site Scripting Vulnerability
Plesk had CSS vulnerability on login page. It was possible to execute arbitrary HTML and script code in a user's browser session in context of a vulnerable site. More information about this vulnerability is available from
http://secunia.com/advisories/12368/