If you wish to use FileBird folders in all premium page builders, you can upgrade to FileBird PRO. Premium features include advanced sort & filtering for both files and folders, download entire media folders, more themes, plugins & page builders supported.
When an update becomes available, the theme files will be the first part that should be updated. You should see that an update is available in your WP Dashboard. You can follow the update prompt there and the latest version of Avada will automatically get installed.
Download File https://cinurl.com/2yXx7Q
This applies, if you are using the child theme and have copied template files from parent theme to child theme, or added your own custom code. Old and outdated code in the child theme can lead to display issues or even fatal errors.
The main issue was regarding the PHP 8.0 version. The moment I rolled the PHP version back to 7.4 3/5 sites started working again and I could actually install the new enfold version.
After that I disabled the Enfold theme on gentsandcrooks.nl & dietistlotjevaes.nl, then activated a default wordpress theme and moved the enfold themes to a diffrent folder. After that wordpress somehow still saw the Enfold themes and I could activate them again, which moved themselves back to the actual theme folder and got it fixed.
Individual installations of WordPress can be protected with security plugins that prevent user enumeration, hide resources and thwart probes. Users can also protect their WordPress installations by taking steps such as keeping all WordPress installations, themes, and plugins updated, using only trusted themes and plugins,[130] and editing the site's .htaccess configuration file if supported by the webserver to prevent many types of SQL injection attacks and block unauthorized access to sensitive files. It is especially important to keep WordPress plugins updated because would-be hackers can easily list all the plugins a site uses and then run scans searching for any vulnerabilities against those plugins. If vulnerabilities are found, they may be exploited to allow hackers to, for example, upload their own files (such as a web shell) that collect sensitive information.