CVE-1999-1063

HIGH (10.0) No Patch (9696 days)

Threat Intelligence

⚠️ CRITICAL GAP - Exploits exist but no detection available
EPSS Score: 4.42% chance of exploitation (percentile: 89%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: Exploit-DB

How we test →

What is it?

CDomain whois_raw.cgi whois CGI script allows remote attackers to execute arbitrary commands via shell metacharacters in the fqdn parameter.

Am I affected?

Specific version info not stated in the advisory. If you don't recognise this software, you're probably not affected.

Affected Products

CDomain / whois_raw.cgi

How to fix

Check the vendor advisory for patch details: http://www.securityfocus.com/archive/1/14019 As immediate mitigation: restrict network access to affected systems if possible.