
Vulnerability
Description
A remote attacker can exploit a weakness in the Bash shell, allowing them to execute arbitrary code on an affected system.
Recommendation
Upgrade the Bash shell to the latest version available to prevent exploitation of this vulnerability.
Summarize:
Experience the Beagle Security platform
Unlock one full penetration test and all Advanced plan features free for 14 days





