Perl, sh, csh, or other shell interpreters are installed in the cgi-bin directory on a WWW site, which allows remote attackers to execute arbitrary commands.
References
Link | Resource |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/146 |
Configurations
No configuration.
Information
Published : 1996-05-28 21:00
Updated : 2022-08-16 23:15
NVD link : CVE-1999-0509
Mitre link : CVE-1999-0509
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
No product.