Total vulnerabilities in the database
Perl, sh, csh, or other shell interpreters are installed in the cgi-bin directory on a WWW site, which allows remote attackers to execute arbitrary commands.
CVSS v2:
CWEs:
No affected software listed.