1
As per
this announcement blatently stolen from slashdot, does the XOOPS API use the unserialize() function and is it vulnerable to this security hole in PHP?
I have recompiled PHP anyhow just to be safe, but just wondering if 90% of xoopsers who are hosted on shared hosting and cannot recompile themselves, if they are vulnerable to this.
And what measures other than upgrading php can be taken to secure XOOPS from this - assuming of course that it uses the unserialize() function at all.
Heno.