{% extends "introduction/base.html" %} {% load static %} {% block content %} {% block title %} Command Injection {% endblock %}

CWE-77: Command Injection

The software builds all or a portion of a command using input that has been influenced externally from an upstream component, but it fails to neutralise or does so in a way that could cause the intended command to be changed when it is sent to a downstream component. Command injection vulnerabilities typically occur when: Many protocols and products have their own custom command language. While OS or shell command strings are frequently discovered and targeted, developers may not realize that these other command languages might also be vulnerable to attacks. Command injection is a common problem with wrapper programs.

This is a web utility for scanning IP address for open ports.
Can you use this utility for something other than scanning ports?

{% endblock %}