CERT mailing list archives

Joomla! Releases Security Update


From: "US-CERT" <US-CERT () ncas us-cert gov>
Date: Tue, 25 Jul 2017 19:09:13 -0500

U.S. Department of Homeland Security US-CERT

National Cyber Awareness System:



Joomla! Releases Security Update [ 
https://www.us-cert.gov/ncas/current-activity/2017/07/25/Joomla-Releases-Security-Update ] 07/25/2017 06:55 PM EDT 
Original release date: July 25, 2017

Joomla! has released version 3.7.4 of its Content Management System (CMS) software to address several vulnerabilities. 
A remote attacker could exploit some of these vulnerabilities to take control of an affected website.

US-CERT encourages users and administrators to review the Joomla! Security Release  [ 
http://www.joomla.org/announcements/release-news/5710-joomla-3-7-4-release.html ]and US-CERT's Alert on Content 
Management Systems Security and Associated Risks [ http://www.us-cert.gov/ncas/alerts/TA13-024A ] and apply the 
necessary update.

________________________________________________________________________

This product is provided subject to this Notification [ http://www.us-cert.gov/privacy/notification ] and this Privacy 
& Use [ http://www.us-cert.gov/privacy/ ] policy.

________________________________________________________________________

A copy of this publication is available at www.us-cert.gov [ https://www.us-cert.gov ]. If you need help or have 
questions, please send an email to info () us-cert gov. Do not reply to this message since this email was sent from a 
notification-only address that is not monitored. To ensure you receive future US-CERT products, please add US-CERT () 
ncas us-cert gov to your address book. 

OTHER RESOURCES: Contact Us [ http://www.us-cert.gov/contact-us/ ] | Security Publications [ 
http://www.us-cert.gov/security-publications ] | Alerts and Tips [ http://www.us-cert.gov/ncas ] | Related Resources [ 
http://www.us-cert.gov/related-resources ]  

STAY CONNECTED: Sign up for email updates [ http://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/new ] 


Current thread: