<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    <div class="moz-cite-prefix">On 9/26/2014 11:02 AM, Matt Emmott
      wrote:<br>
    </div>
    <blockquote
cite="mid:CAGHPk0aKDZi3NhB20Zs+=EbJ3jp8Hge5mAZ0UpUL5+x=G3g0fQ@mail.gmail.com"
      type="cite">
      <div dir="ltr"><br>
        <div class="gmail_extra"><br>
          <div class="gmail_quote">On Fri, Sep 26, 2014 at 10:38 AM,
            Raymond Wagner <span dir="ltr">&lt;<a
                moz-do-not-send="true"
                href="mailto:raymond@wagnerrp.com" target="_blank">raymond@wagnerrp.com</a>&gt;</span>
            wrote:<br>
            <blockquote class="gmail_quote" style="margin:0 0 0
              .8ex;border-left:1px #ccc solid;padding-left:1ex"><span
                class="">On 9/25/2014 11:13 PM, Another Sillyname wrote:<br>
                <blockquote class="gmail_quote" style="margin:0 0 0
                  .8ex;border-left:1px #ccc solid;padding-left:1ex">
                  I don't know if people have read about the Shellshock
                  vulnerability recently discovered.<br>
                  <br>
                  Anyone with an Internet exposed mythtv server would be
                  well advised to do research on it ASAP.<br>
                </blockquote>
                <br>
              </span>
              If your backend is exposed to the internet, an attacker
              doesn't need to use Bash to run anything they want on your
              system.<br>
              _______________________________________________<br>
            </blockquote>
            <div><br>
            </div>
            <div>What about MythWeb? <br>
            </div>
          </div>
        </div>
      </div>
      <br>
    </blockquote>
    <br>
    If Mythweb is on the internet, same thing.<br>
  </body>
</html>