Hey Penny, One of the applications affected by a recent swatch of PEAR XML_RPC (aka XML-RPC or xmlrpc) and PHPXMLRPC security flaws that allow remote attackers to execute arbitrary PHP code via an XML file (which is not properly sanitized before being used in an eval statement) is.... serendipity!
Be sure that when packaging serendipity that CAN-2005-1921 is fixed before it is uploaded. Micah -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]