

<?xml version="1.0" encoding="UTF-8"?>
	<rss version="2.0"
		xmlns:content="http://purl.org/rss/1.0/modules/content/"
		xmlns:wfw="http://wellformedweb.org/CommentAPI/"
		xmlns:dc="http://purl.org/dc/elements/1.1/"
		xmlns:atom="http://www.w3.org/2005/Atom"

			>

	<channel>
		<title>LexiConn News  &#187;  Topic: All hosted Magento stores patched with latest SUPEE-5344 security vulnerability</title>
		<atom:link href="https://support.lexiconn.com/news/forums/topic/all-hosted-magento-stores-patched-with-latest-supee-5344-security-vulnerability/feed" rel="self" type="application/rss+xml" />
		<link>https://support.lexiconn.com/news/forums/topic/all-hosted-magento-stores-patched-with-latest-supee-5344-security-vulnerability/feed</link>
		<description></description>
		<pubDate>Sat, 04 Apr 2026 23:06:24 +0000</pubDate>
		<generator>http://bbpress.org/?v=2.5.3-5249</generator>
		<language>en-US</language>

		
														
					
				<item>
					<guid>https://support.lexiconn.com/news/forums/topic/all-hosted-magento-stores-patched-with-latest-supee-5344-security-vulnerability/#post-49098</guid>
					<title><![CDATA[All hosted Magento stores patched with latest SUPEE-5344 security vulnerability]]></title>
					<link>https://support.lexiconn.com/news/forums/topic/all-hosted-magento-stores-patched-with-latest-supee-5344-security-vulnerability/#post-49098</link>
					<pubDate>Thu, 12 Feb 2015 14:14:44 +0000</pubDate>
					<dc:creator>lexiconn</dc:creator>

					<description>
						<![CDATA[
						<p>Magento released a patch (February 9, 2015) for all Magento stores from versions 1.6 to the latest 1.9.1.0 version that addresses a potential remote code execution exploit. Although Magento states that they are not aware of any live stores that have been exploited by this bug, it is nonetheless a serious security issue that could be used to upload malicious files into a Magento store.</p>
<p>We have patched all hosted Magento stores that are running versions 1.6 to 1.9.1.0. We had extensively tested the patch and found it to be quite safe to apply to all stores.</p>
<p>Our Magento installer for new stores has also been updated to include this patch.</p>
<p>If you have any questions about this patch, please let us know.</p>
<p>- LexiConn Support</p>
						]]>
					</description>

					
					
				</item>

					
		
	</channel>
	</rss>

