I am not a developer, but spend a lot of time managing and collaborating on site and extension development. There is no need for me to run Joomla locally (using XAMPP or WAMP) on my machine for these day to day duties. With all the concerns related to Heartbleed and other vulnerabilities recently, and the complexities of running Virtual Machines, I went to look for another way to be able to run multiple Joomla websites on my machine for the conference. I wanted something easy and safe, and found it is USB Web Server. It easily installs on a USB drive, and I can simply unplug it and be assured my system is safe.

Joomla 3.3.6 and 3.2.7 Security Updates have been released.

Joomla 3.3.5 and 3.2.6 were retracted and the same tracker and security issues notes in that release are included in this release.

If you have already installed 3.3.5 or 3.2.6 the Joomla Updater will not work this one time to update the site. You can use Method B of the upgrade instructions found in the Joomla WIKI to update. Note that Watchful subscribers are not affected by the updater bug and may use their Watchful.li dashboard to upgrade as usual.

This is a security release adressing 1 High Priority - [20140903] - Core - Remote File Inclusion and - 1 Medium Priority - [20140904] - Core - Denial of Service vulnerability as well as resolves 9 tracker issues.

IMPORTANT NOTE: Joomla 3.3.0 and higher requires PHP 5.3.10 for server that have yet to be updated the Joomla 3.2.7 bridge release that includes the patches for the 2 vulnerabilities is also available which can be used with PHP versions 5.3.1 through 5.3.9. It is highly recommended that servers are update to the latest version of PHP 5.3 for best performance, security and compatibility (current release is PHP 5.3.29). Note that older releases will be prompted to update to Joomla 3.2.4 before upgrading to Joomla 3.3.4

This is a security and maitenenance release.

Full details can be found in the official 3.3.6 release announcement at joomla.org.

Joomla 2.5.27 has been released.

Joomla 2.5.26 was retracted and the same tracker and security issues notes in that release are included in this release.

If you have already installed 2.5.26 the Joomla Updater will not work this one time to update the site. You can use Method B of the upgrade instructions found in the Joomla WIKI to update. Note that Watchful subscribers are not affected by the updater bug and may use their Watchful.li dashboard to upgrade as usual.

This is a maintenance and security release, addressing 4 tracker items, as well as 1 High Priority - [20140903] - Core - Remote File Inclusion and 1 Medium Priority - [20140904] - Core - Denial of Service security issue.

Full details can be found in the official 2.5.27 release announcement at joomla.org.

Joomla 3.3.5 Security Update has been released.

This is a security release adressing 1 High Priority - [20140903] - Core - Remote File Inclusion and - 1 Medium Priority - [20140904] - Core - Denial of Service vulnerability as well as resolves 9 tracker issues.

IMPORTANT NOTE: Joomla 3.3.0 and higher requires PHP 5.3.10 for server that have yet to be updated the Joomla 3.2.6 bridge release that includes the patches for the 2 vulnerabilities is also available which can be used with PHP versions 5.3.1 through 5.3.9. It is highly recommended that servers are update to the latest version of PHP 5.3 for best performance, security and compatibility (current release is PHP 5.3.29). Note that older releases will be prompted to update to Joomla 3.2.4 before upgrading to Joomla 3.3.4

This is a security release addressing bugs and not introducing new features.

Full details can be found in the official 3.3.5 release announcement at joomla.org.

Joomla 2.5.26 has been released.

This is a maintenance and security release, addressing 4 tracker items, as well as 1 High Priority - [20140903] - Core - Remote File Inclusion and 1 Medium Priority - [20140904] - Core - Denial of Service security issue.

Full details can be found in the official 2.5.26 release announcement at joomla.org.

 
 

Get the latest updates on our extensions