Perl, sh, csh, or other shell interpreters are installed in the cgi-bin directory on a WWW site, which allows remote attackers to execute arbitrary commands.Referenceshttps://exchange.xforce.ibmcloud.com/vulnerabilities/146