Hey Penny,

One of the applications affected by a recent swatch of PEAR XML_RPC
(aka XML-RPC or xmlrpc) and PHPXMLRPC security flaws that allow remote
attackers to execute arbitrary PHP code via an XML file (which is not
properly sanitized before being used in an eval statement) is....
serendipity!

Be sure that when packaging serendipity that CAN-2005-1921 is fixed
before it is uploaded.

Micah


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to