Description
A remote attacker can exploit a weakness in the Bash shell, allowing them to execute arbitrary code on an affected system.
Recommendation
Upgrade the Bash shell to the latest version available to prevent exploitation of this vulnerability.
Automated human-like penetration testing for your web apps & APIs
Teams using Beagle Security are set up in minutes, embrace release-based CI/CD security testing and save up to 65% with timely remediation of vulnerabilities. Sign up for a free account to see what it can do for you.