Security Hero Rotating Header Image

Bitweaver <= 2.6 /boards/boards_rss.php / saveFeed() remote code execution exploit

Bitweaver <= 2.6 /boards/boards_rss.php / saveFeed() remote code execution exploit

<!– Envelope-to: email@address Delivery-date: Tue, 12 May 2009 14:44:45 +0100 Received: from outgoing.securityfocus.com ([205.206.231.26] helo=outgoing2.securityfocus.com) by lt.network5.net with esmtp (Exim 4.43) id 1M3sHk-0007vl-Qs for email@address; Tue, 12 May 2009 14:44:45 +0100 Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20]) by outgoing2.securityfocus.com (Postfix) with QMQP id E6C73143A37; Tue, 12 May 2009 07:41:59 -0600 (MDT) Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm Precedence: bulk List-Id: <bugtraq.list-id.securityfocus.com> List-Post: <mailto:bugtraq@securityfocus.com> List-Help: <mailto:bugtraq-help@securityfocus.com> List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com> List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com> Delivered-To: mailing list bugtraq@securityfocus.com Delivered-To: moderator for bugtraq@securityfocus.com Received: (qmail 13904 invoked from network); 12 May 2009 01:44:41 -0000 Message-Id: <200905120144.n4C1iedr027033@www5.securityfocus.com> Content-Type: text/plain Content-Disposition: inline MIME-Version: 1.0 X-Mailer: MIME-tools 5.420 (Entity 5.420) execution exploit Content-Transfer-Encoding: quoted-printable X-IMAPbase: 1176125385 9033 Status: O X-UID: 9032 Content-Length: 10358 X-Keywords:

Leave a Reply

Powered by WP Hashcash

Spam Protection by WP-SpamFree

Bad Behavior has blocked 463 access attempts in the last 7 days.