Hi Steven,

That is what you get when websites are treated as cash-cows by hosters and security is not a first priority: For that apache server version exploit: https://hackerone.com/reports/66929

Due for instance to insecure handling of the HTTP headers, and with PHP.cgi for that version you are food for the birds
through remote code execution.

Read on Kaspersky’s analysis = -https://threatpost.com/new-exploits-arrive-for-old-php-vulnerability/104881/
(I decided to block that link as too much of customized XSS malware code is shown and comes flagged by my Malware Script Detector v.v.1.1.), so be warned before visiting this link.

polonus