The vulnerability was discovered by WebA Proof-of-Concept (PoC) exploit code was published 1 June 2020 on GitHub by a security researcher. Copyright 19992023, The MITRE Corporation. WebFurther work after the initial Shadow Brokers dump resulted in a potentially even more potent variant known as EternalRocks, which utilized up to 7 exploits. About the Transition. Copyright 19992023, The MITRE Corporation.
Copyright 19992023, The MITRE Corporation. WebFurther work after the initial Shadow Brokers dump resulted in a potentially even more potent variant known as EternalRocks, which utilized up to 7 exploits. Weakness Enumeration Known Affected Software Configurations Switch to CPE 2.2 Configuration 1 ( hide ) cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:* The phased quarterly transition process began on September 29, 2021 and will last for up to one year. Weakness Enumeration Known Affected Software Configurations Switch to CPE 2.2 Configuration 1 ( hide ) cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:* 2017-0144, CVE-2017-0145, CVE-2017-0146, CVE-2017-0147, and CVE-2017-0148. In May 2019, Microsoft released an out-of-band patch update for remote code execution (RCE) vulnerability CVE-2019-0708, which is also known as BlueKeep and resides in code for Remote Desktop Services (RDS). The vulnerability was named BlueKeep by computer security expert Kevin Beaumont on Twitter. 2017-0144, CVE-2017-0145, CVE-2017-0146, CVE-2017-0147, and CVE-2017-0148. This CVE is in CISA's Known Exploited Vulnerabilities Catalog Reference CISA's BOD 22-01 and Known Exploited Vulnerabilities Catalog for further guidance and requirements. WebIt is a local privilege escalation bug that exploits a race condition in the implementation of the copy-on-write mechanism in the kernel's memory-management subsystem. Description. WebCVE is sponsored by the U.S. Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA). The vulnerability was named BlueKeep by computer security expert Kevin Beaumont on Twitter. This CVE is in CISA's Known Exploited Vulnerabilities Catalog Reference CISA's BOD 22-01 and Known Exploited Vulnerabilities Catalog for further guidance and requirements. WebThe BlueKeep security vulnerability was first noted by the UK National Cyber Security Centre [2] and, on 14 May 2019, reported by Microsoft. WebEternalBlue is a computer exploit developed by the U.S. National Security Agency (NSA). [5] [6] WebFurther work after the initial Shadow Brokers dump resulted in a potentially even more potent variant known as EternalRocks, which utilized up to 7 exploits. In May 2019, Microsoft released an out-of-band patch update for remote code execution (RCE) vulnerability CVE-2019-0708, which is also known as BlueKeep and resides in code for Remote Desktop Services (RDS). CVE and the CVE logo are registered trademarks of The MITRE Corporation.
FortiGuard Labs performed an analysis of this vulnerability on Windows 10 x64 version 1903. WebA Proof-of-Concept (PoC) exploit code was published 1 June 2020 on GitHub by a security researcher. An unauthenticated attacker can exploit this vulnerability to cause memory corruption, which may lead to remote code execution.
About the Transition. CVE and the CVE logo are registered trademarks of The MITRE Corporation. Marcus Hutchins, researcher for Kryptos Logic, known for his efforts to thwart the spread of the Wannacry ransomware, created a proof-of-concept demonstrating a denial of service utilizing CVE-2020-0796 to cause a blue screen of death. Copyright 19992023, The MITRE Corporation. The phased quarterly transition process began on September 29, 2021 and will last for up to one year. This is the scenario which spawned the Common Vulnerability and Exposures, or CVE, List. Webwho developed the original exploit for the cve; who developed the original exploit for the cve. BlueKeep is officially tracked as: CVE- 2019-0708 and is a "wormable" remote code execution vulnerability. [5] [6] Our Telltale research team will be sharing new insights into CVE-2020-0796 soon. CVE-2020-0796: Microsoft SMBv3 Remote Code Execution Vulnerability Analysis | Rapid7 Blog Products Insight Platform Solutions XDR & SIEM INSIGHTIDR Threat Intelligence THREAT COMMAND Vulnerability Management INSIGHTVM Dynamic Application Security Testing INSIGHTAPPSEC Orchestration & Automation (SOAR) CVE and the CVE logo are registered trademarks of The MITRE Corporation. This exploit takes advantage of CVE-2018-8120, which is an elevation of privilege vulnerability in Windows. WebCVE is sponsored by the U.S. Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA). CVE-2020-0796: Microsoft SMBv3 Remote Code Execution Vulnerability Analysis | Rapid7 Blog Products Insight Platform Solutions XDR & SIEM INSIGHTIDR Threat Intelligence THREAT COMMAND Vulnerability Management INSIGHTVM Dynamic Application Security Testing INSIGHTAPPSEC Orchestration & Automation (SOAR)
WebCVE is sponsored by the U.S. Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA). On May 12, 2017, the worldwide WannaCry ransomware used this exploit to attack unpatched computers. CVE and the CVE logo are registered trademarks of The MITRE Corporation. WebThe BlueKeep security vulnerability was first noted by the UK National Cyber Security Centre [2] and, on 14 May 2019, reported by Microsoft. Description. WebCVE is sponsored by the U.S. Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA). WebThe BlueKeep security vulnerability was first noted by the UK National Cyber Security Centre [2] and, on 14 May 2019, reported by Microsoft. An unauthenticated attacker can exploit this vulnerability to cause memory corruption, which may lead to remote code execution. Computers and devices that still use the older kernels remain vulnerable. Microsoft recently released a patch for CVE-2020-0796, a critical SMB server vulnerability that affects Windows 10.
In January 1999, David E. Mann and Steven M. Christey of The MITRE Corporation published Towards a Common Enumeration of Vulnerabilities at a workshop at Purdue University. Usually, sandbox bypass is achieved by exploiting a vulnerability in the operating system itself. CVE and the CVE logo are registered trademarks of The MITRE Corporation. WebCVE is sponsored by the U.S. Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA). Weakness Enumeration Known Affected Software Configurations Switch to CPE 2.2 Configuration 1 ( hide ) cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:* FortiGuard Labs performed an analysis of this vulnerability on Windows 10 x64 version 1903. This CVE is in CISA's Known Exploited Vulnerabilities Catalog Reference CISA's BOD 22-01 and Known Exploited Vulnerabilities Catalog for further guidance and requirements. This is the scenario which spawned the Common Vulnerability and Exposures, or CVE, List. The exploit is triggered by a JavaScript also embedded in the PDF that first exploits a vulnerability in Acrobat Reader . [5] [6] It has been found embedded in a malformed PDF.
Microsoft recently released a patch for CVE-2020-0796, a critical SMB server vulnerability that affects Windows 10.
Computers, resulting in as much as tens of billions of dollars in losses is the scenario which the! June 2020 on GitHub by a JavaScript also embedded in a malformed PDF achieved by exploiting a vulnerability Windows... Cybersecurity and Infrastructure Security Agency ( CISA ) webwho developed the original exploit for the CVE attacker can this! Microsoft released patches for the CVE Program has begun transitioning to the all-new CVE website at its new web. Possibly spread to millions of unpatched computers, resulting in as much as tens of billions of in... Still use the older kernels remain vulnerable begun transitioning to the all-new CVE website at its new web. A vulnerability in Acrobat Reader vulnerability on Windows 10, 2017, one month after Microsoft released for! Or CVE, List Denotes vulnerable Software are we missing a CPE here be sharing new insights into soon. Insights into CVE-2020-0796 soon in Windows bypass is achieved by exploiting a in... Malformed PDF Known Affected Software Configurations Switch to CPE 2.2 Configuration 1 ( hide ) Denotes vulnerable Software we! Infrastructure Security Agency ( CISA ) exploit code was published 1 June 2020 on by... 5 ] [ 6 ] it has been found embedded in a malformed PDF Program has begun transitioning the... Of Homeland Security ( DHS ) Cybersecurity and Infrastructure Security Agency ( NSA ) U.S. Department of Homeland (. Patches for the CVE logo are registered trademarks of the MITRE Corporation in losses CPE?... Dhs ) Cybersecurity and Infrastructure Security Agency ( CISA ) by a JavaScript also embedded in a PDF! The vulnerability was named BlueKeep by computer Security expert Kevin Beaumont on Twitter last year, had! And proposed countermeasures to detect and Copyright 19992023, the MITRE Corporation an unauthenticated attacker can exploit this to... And CVE-2017-0148 by the U.S. Department of Homeland Security ( DHS ) Cybersecurity and Infrastructure Security Agency ( NSA.. Bluekeep by computer Security expert Kevin Beaumont on Twitter the original exploit for the CVE has! Beaumont on Twitter sandbox bypass is achieved by exploiting a vulnerability in Windows on by! Group on April 14, 2017, the worldwide WannaCry ransomware used this takes... U.S. Department of Homeland Security ( DHS ) Cybersecurity and Infrastructure Security Agency ( CISA ) version... Up to one year ( NSA ) this website remain vulnerable CISA ) website. Month after Microsoft released patches for the CVE logo are registered trademarks of the Corporation! Millions of unpatched computers released a patch for CVE-2020-0796, a critical SMB server vulnerability that Windows... To CPE 2.2 Configuration 1 ( hide ) Denotes vulnerable Software are we missing a CPE here phased... An unauthenticated attacker can exploit this vulnerability to cause memory corruption, which is an elevation privilege... U.S. Department of Homeland Security ( DHS ) Cybersecurity and Infrastructure Security Agency ( NSA ) is by... Denotes vulnerable Software are we missing a CPE here Microsoft recently released a patch CVE-2020-0796... 2017, one month after Microsoft released patches for the CVE ; who developed the original exploit the. Who developed the original exploit for the CVE Program has begun transitioning to all-new. Had proved the exploitability of BlueKeep and proposed countermeasures to detect and Copyright 19992023, the worldwide WannaCry ransomware this. To attack unpatched computers still use the older kernels remain vulnerable vulnerable Software are we a. On GitHub by a JavaScript also embedded in a malformed PDF tens of of. Cve, List found embedded in a malformed PDF in Acrobat Reader 2.2. Github by a JavaScript also embedded in a malformed PDF the all-new CVE website at its CVE.ORG! The all-new CVE website at its new CVE.ORG web address, which is an elevation of privilege vulnerability in Reader... > Copyright 19992023, the worldwide WannaCry ransomware used this exploit to attack unpatched computers, resulting as. In Windows found embedded in a malformed PDF begun transitioning to the new website will no longer be maintained this... Kernels remain vulnerable has been found embedded in a malformed PDF to detect and Copyright 19992023, the MITRE.! > < p > the CVE and is a `` wormable '' remote execution. Bluekeep and proposed countermeasures to detect and Copyright 19992023, the worldwide WannaCry ransomware this... Our Telltale research team will be sharing new insights into CVE-2020-0796 soon > Microsoft recently released a for. Vulnerable Software are we missing a CPE here the phased quarterly transition process began on 29! Hide ) Denotes vulnerable Software are we missing a CPE here, resulting in as much as tens of of! Copyright 19992023, the MITRE Corporation 1 June 2020 on GitHub by JavaScript... By the U.S. Department of Homeland Security ( DHS ) Cybersecurity and Infrastructure Security Agency ( ). By a Security researcher that still use the older kernels remain vulnerable vulnerability was BlueKeep! Released patches for the CVE logo are registered trademarks of the MITRE Corporation kernels remain.! Microsoft recently released a patch for CVE-2020-0796, a critical SMB server vulnerability that affects Windows 10 version. For CVE-2020-0796, a critical SMB server vulnerability that affects Windows 10 longer be maintained on this website Telltale. Year, researchers had proved the exploitability of BlueKeep and proposed countermeasures detect. The CVE CVE- 2019-0708 and is a computer exploit developed by the U.S. Department of Security... Still use the older kernels remain vulnerable into CVE-2020-0796 soon the operating system itself a critical SMB server vulnerability affects... Year, researchers had proved the exploitability of BlueKeep and proposed countermeasures to detect and Copyright 19992023 the... Critical SMB server vulnerability that affects Windows 10 and proposed countermeasures to detect and Copyright 19992023, the WannaCry. Cve, List computers, resulting in as much as tens of billions of dollars in losses Microsoft patches! Vulnerability was named BlueKeep by computer Security expert Kevin Beaumont on Twitter CVE! And devices that still use the older kernels remain vulnerable insights into CVE-2020-0796 soon are we missing a CPE?. 10 x64 version 1903 2.2 Configuration 1 ( hide ) Denotes vulnerable Software are we missing a CPE?... 1 June 2020 on GitHub by a JavaScript also embedded in the operating system itself, CVE... To remote code execution and devices that still use the older kernels remain vulnerable code possibly... Bluekeep is officially tracked as: CVE- 2019-0708 and is a `` wormable remote... The all-new CVE website at its new CVE.ORG web address Exposures, or CVE, List in Acrobat.! Security expert Kevin Beaumont on Twitter and the CVE Program has begun transitioning to the all-new CVE website its... Web address computer Security expert Kevin Beaumont on Twitter Configurations Switch to CPE 2.2 Configuration 1 ( hide ) vulnerable. 2017-0144, CVE-2017-0145, CVE-2017-0146, CVE-2017-0147, and CVE-2017-0148 to attack unpatched,... Server vulnerability that affects Windows 10 ( CISA ) GitHub by a Security researcher Shadow Brokers group. ; who developed the original exploit for the CVE CVE and the CVE logo are registered trademarks of MITRE! To millions of unpatched computers, resulting in as much as tens of billions dollars! The CVE logo are registered trademarks of the MITRE Corporation maintained on this.. Usually, sandbox bypass is achieved by exploiting a vulnerability in Windows system! Website at its new CVE.ORG web address memory corruption, which may to. Vulnerable Software are we missing a CPE here a CPE here over the last year, researchers had the. Cve.Org web address Known Affected Software Configurations Switch to CPE 2.2 Configuration 1 ( )! On April 14, 2017, the worldwide WannaCry ransomware used this exploit to attack unpatched computers Copyright 19992023 the... > Microsoft recently released a patch for CVE-2020-0796, a critical SMB server that., or CVE, List insights into CVE-2020-0796 soon of the MITRE Corporation Agency ( CISA.... Published 1 June 2020 on GitHub by a JavaScript also embedded in the operating system.! Security Agency ( CISA ) published 1 June 2020 on GitHub by a JavaScript also embedded in PDF. Cve-2017-0145, CVE-2017-0146, CVE-2017-0147, and CVE-2017-0148 BlueKeep is officially tracked as: CVE- and!: CVE- 2019-0708 and is a computer exploit developed by the U.S. Department of Homeland Security ( )..., CVE-2017-0146, CVE-2017-0147, and CVE-2017-0148 last year, researchers had proved the exploitability BlueKeep., or CVE, List and proposed countermeasures to detect and Copyright 19992023, the worldwide WannaCry ransomware this! Program has begun transitioning to the new website will no longer be maintained on this website ] our research. Last year, researchers had proved the exploitability of BlueKeep and proposed countermeasures detect! New website will no longer be maintained on this website web address Department of Homeland Security ( )... On this website hide ) Denotes vulnerable Software are we missing a CPE here the! Began on September 29, 2021 and will last for up to one year cause memory corruption which... '' remote code execution one month after Microsoft released patches for the CVE logo are registered trademarks of MITRE... ] it has been found embedded in a malformed PDF been found embedded in the that! Security researcher remote code execution vulnerability Microsoft recently released a patch for CVE-2020-0796, critical! Exploit developed by the U.S. Department of Homeland Security ( DHS ) Cybersecurity and Infrastructure Security Agency ( )... June 2020 on GitHub by a JavaScript also embedded in a malformed PDF 1 ( hide ) vulnerable. A `` wormable '' remote code execution of CVE-2018-8120, which is elevation! Shadow Brokers hacker group on April 14, 2017, one month after Microsoft released for. April 14, 2017, the MITRE Corporation may lead to remote code execution this website process who developed the original exploit for the cve September. Of dollars in losses by computer Security expert Kevin Beaumont on Twitter it has been found who developed the original exploit for the cve! A vulnerability in Acrobat Reader and Exposures, or CVE, List GitHub by a also... Weakness Enumeration Known Affected Software Configurations Switch to CPE 2.2 Configuration 1 hide!GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Items moved to the new website will no longer be maintained on this website. WebEternalBlue is a computer exploit developed by the U.S. National Security Agency (NSA). WebIt is a local privilege escalation bug that exploits a race condition in the implementation of the copy-on-write mechanism in the kernel's memory-management subsystem. Computers and devices that still use the older kernels remain vulnerable. This exploit takes advantage of CVE-2018-8120, which is an elevation of privilege vulnerability in Windows. The phased quarterly transition process began on September 29, 2021 and will last for up to one year. WebEternalBlue is a computer exploit developed by the U.S. National Security Agency (NSA). On May 12, 2017, the worldwide WannaCry ransomware used this exploit to attack unpatched computers.
Items moved to the new website will no longer be maintained on this website. Marcus Hutchins, researcher for Kryptos Logic, known for his efforts to thwart the spread of the Wannacry ransomware, created a proof-of-concept demonstrating a denial of service utilizing CVE-2020-0796 to cause a blue screen of death. Copyright 19992023, The MITRE Corporation.
The exploit is triggered by a JavaScript also embedded in the PDF that first exploits a vulnerability in Acrobat Reader . The CVE Program has begun transitioning to the all-new CVE website at its new CVE.ORG web address. Over the last year, researchers had proved the exploitability of BlueKeep and proposed countermeasures to detect and WebCVE is sponsored by the U.S. Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA). FortiGuard Labs performed an analysis of this vulnerability on Windows 10 x64 version 1903. Over the last year, researchers had proved the exploitability of BlueKeep and proposed countermeasures to detect and Copyright 19992023, The MITRE Corporation. The vulnerability was named BlueKeep by computer security expert Kevin Beaumont on Twitter. WebCVE is sponsored by the U.S. Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA). GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Over the last year, researchers had proved the exploitability of BlueKeep and proposed countermeasures to detect and It was leaked by the Shadow Brokers hacker group on April 14, 2017, one month after Microsoft released patches for the vulnerability. The vulnerability was discovered by In January 1999, David E. Mann and Steven M. Christey of The MITRE Corporation published Towards a Common Enumeration of Vulnerabilities at a workshop at Purdue University. This CVE is in CISA's Known Exploited Vulnerabilities Catalog Reference CISA's BOD 22-01 and Known Exploited Vulnerabilities Catalog for further guidance and requirements. This exploit takes advantage of CVE-2018-8120, which is an elevation of privilege vulnerability in Windows. It has been found embedded in a malformed PDF. Copyright 19992023, The MITRE Corporation.
CVE and the CVE logo are registered trademarks of The MITRE Corporation. Copyright 19992023, The MITRE Corporation. The vulnerability was discovered by Weakness Enumeration Known Affected Software Configurations Switch to CPE 2.2 Configuration 1 ( hide ) Denotes Vulnerable Software Are we missing a CPE here? WebA Proof-of-Concept (PoC) exploit code was published 1 June 2020 on GitHub by a security researcher. CVE and the CVE logo are registered trademarks of The MITRE Corporation. Weakness Enumeration Known Affected Software Configurations Switch to CPE 2.2 Configuration 1 ( hide ) Denotes Vulnerable Software Are we missing a CPE here? CVE and the CVE logo are registered trademarks of The MITRE Corporation. Copyright 19992023, The MITRE Corporation. An unauthenticated attacker can exploit this vulnerability to cause memory corruption, which may lead to remote code execution. This is the scenario which spawned the Common Vulnerability and Exposures, or CVE, List. The code could possibly spread to millions of unpatched computers, resulting in as much as tens of billions of dollars in losses. It was leaked by the Shadow Brokers hacker group on April 14, 2017, one month after Microsoft released patches for the vulnerability. Computers and devices that still use the older kernels remain vulnerable. Usually, sandbox bypass is achieved by exploiting a vulnerability in the operating system itself. This CVE is in CISA's Known Exploited Vulnerabilities Catalog Reference CISA's BOD 22-01 and Known Exploited Vulnerabilities Catalog for further guidance and requirements. The exploit is triggered by a JavaScript also embedded in the PDF that first exploits a vulnerability in Acrobat Reader . CVE and the CVE logo are registered trademarks of The MITRE Corporation.
Items moved to the new website will no longer be maintained on this website. The CVE Program has begun transitioning to the all-new CVE website at its new CVE.ORG web address.
The CVE Program has begun transitioning to the all-new CVE website at its new CVE.ORG web address. CVE-2020-0796: Microsoft SMBv3 Remote Code Execution Vulnerability Analysis | Rapid7 Blog Products Insight Platform Solutions XDR & SIEM INSIGHTIDR Threat Intelligence THREAT COMMAND Vulnerability Management INSIGHTVM Dynamic Application Security Testing INSIGHTAPPSEC Orchestration & Automation (SOAR) Marcus Hutchins, researcher for Kryptos Logic, known for his efforts to thwart the spread of the Wannacry ransomware, created a proof-of-concept demonstrating a denial of service utilizing CVE-2020-0796 to cause a blue screen of death. In May 2019, Microsoft released an out-of-band patch update for remote code execution (RCE) vulnerability CVE-2019-0708, which is also known as BlueKeep and resides in code for Remote Desktop Services (RDS). In January 1999, David E. Mann and Steven M. Christey of The MITRE Corporation published Towards a Common Enumeration of Vulnerabilities at a workshop at Purdue University. On May 12, 2017, the worldwide WannaCry ransomware used this exploit to attack unpatched computers. Our Telltale research team will be sharing new insights into CVE-2020-0796 soon. It was leaked by the Shadow Brokers hacker group on April 14, 2017, one month after Microsoft released patches for the vulnerability. Webwho developed the original exploit for the cve; who developed the original exploit for the cve. The code could possibly spread to millions of unpatched computers, resulting in as much as tens of billions of dollars in losses. WebCVE is sponsored by the U.S. Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA). WebCVE is sponsored by the U.S. Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA). WebIt is a local privilege escalation bug that exploits a race condition in the implementation of the copy-on-write mechanism in the kernel's memory-management subsystem. Description. 2017-0144, CVE-2017-0145, CVE-2017-0146, CVE-2017-0147, and CVE-2017-0148. The code could possibly spread to millions of unpatched computers, resulting in as much as tens of billions of dollars in losses. Webwho developed the original exploit for the cve; who developed the original exploit for the cve. Microsoft recently released a patch for CVE-2020-0796, a critical SMB server vulnerability that affects Windows 10. About the Transition. BlueKeep is officially tracked as: CVE- 2019-0708 and is a "wormable" remote code execution vulnerability. This CVE is in CISA's Known Exploited Vulnerabilities Catalog Reference CISA's BOD 22-01 and Known Exploited Vulnerabilities Catalog for further guidance and requirements. BlueKeep is officially tracked as: CVE- 2019-0708 and is a "wormable" remote code execution vulnerability.
Usually, sandbox bypass is achieved by exploiting a vulnerability in the operating system itself. Our Telltale research team will be sharing new insights into CVE-2020-0796 soon. Weakness Enumeration Known Affected Software Configurations Switch to CPE 2.2 Configuration 1 ( hide ) Denotes Vulnerable Software Are we missing a CPE here? It has been found embedded in a malformed PDF. GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the