What is the most common method to exploit the “Bash Bug” or “Shellshock” vulnerability?
SYN Flood
SSH
Through Web servers utilizing CGI (Common Gateway Interface) to send a malformed environment variable to a vulnerable Web server
Manipulate format strings in text fields
Submit