23 Dec, 2015

The Joomla! 3.4.7 Version has released 2 days ago which addresses a critical security vulnerability and one low level security vulnerability.

In this new version only contains the security fixes, no other changes have been made compared to the Joomla 3.4.6 version. However, it is very important for your site’s safety, so we highly recommend you update your sites as soon as possible.

Joomla! 3.4.7 improves (hardens) the security fixes made in Joomla! 3.4.6, addressing a vulnerability that was caused by a bug in PHP itself. 3.4.7 now includes additional fixes for older PHP versions among other fixes. 

What’s in Joomla! 3.4.7

  • High Priority - Core - Session Hardening (affecting Joomla 1.5 through 3.4.6) >> More information
  • Low Priority - Core - SQL Injection (affecting Joomla 3.0.0 through 3.4.6) >> More information

Documentation:

Please see the documentation wiki for FAQ’s regarding the 3.4.7 release.

Download

New Installations: (Full package) » Click here

Update Package: (Update package) » Click here

Please read the update instructions before updating. Please remember to clear your browser's cache after upgrading.

For Joomla 1.5 and 2.5, please apply the hotfixes from HERE!

Update plan for JUX’s product

In order to provide the best quality Joomla Templates and Joomla Extensions for you guys, we will update our products as soon as possible to catch up with the latest version of Joomla. Please stay in touch with us to get notification about our news and activities via social channels.

                                                                            


Don’t forget about our Promotion for Christmas and New Year Event.

xmas-promotion


From 18th December 2015 to 1st January 2016 (00:00 GTM +7), JoomlaUX is giving away 30% OFF when join ANY MEMBERSHIP PLANS.
Coupon code: JUX_XMAS_2015

                                                                   buy now

Thank you for your attention! 
Merry Christmas and Happy New Year :)

Rate this item
(0 votes)
Lee Giang

Hello, I'm Le Giang.

Login to post comments