Примеры использования Arbitrary commands на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
You can put fairly arbitrary commands in an. xinitrc, but there are some caveats.
This would allow a logged-in user to run arbitrary commands on the server.
Michal Kowalczyk discovered that missing input sanitising in the foomatic-rip print filter might result in the execution of arbitrary commands.
Remote(authenticated) attackers could execute arbitrary commands as the web server user.
Phillip Hallam-Baker discovered that window property values could be queried in rxvt-unicode,resulting in the potential execution of arbitrary commands.
Stephane Chauveau reported several ways to inject arbitrary commands in the arguments of this utility.
John Houwer discovered a way to cause xdg-open, a tool that automatically opens URLs in a user's preferred application,to execute arbitrary commands remotely.
This could allow remote users to execute arbitrary commands upon the system, or read any files which were readable by the webserver user.
An attacker could craft a HTML page that,when visited by a victim running OpenOCD, could execute arbitrary commands on the victims host.
This could allow local users to edit it such that arbitrary commands could be executed whenever any local user executed a program under WINE.
In addition, it was discovered that it was possible to invoke scp with certain options that may lead to the execution of arbitrary commands CVE-2007-6415.
This allows an attacker to execute arbitrary commands with the privileges of such a process by sending crafted DHCP options to a client using a rogue server.
This enables an attacker in control of a Bcfg2 client to execute arbitrary commands on the server with root privileges.
This allows an attacker to execute arbitrary commands with the privileges of such a process by sending crafted DHCP options to a client using a rogue server.
An unprivileged user can inject the DBUS_SESSION_BUS_ADDRESS environment variable to run arbitrary commands as root user via the policy-funcs script.
It was discovered that bitlbee, an IRC to other chat networks gateway, contained issues that allowed a remote attacker to cause a denial of service(via application crash), orpotentially execute arbitrary commands.
An attacker with control on input image orthe input filename can execute arbitrary commands with the privileges of the user running the application.
Jiri Horner discovered a way to cause xdg-open, a tool that automatically opens URLs in a user's preferred application,to execute arbitrary commands remotely.
Rory McNamara discovered that an attacker is able to execute arbitrary commands(with the privilege of the CUPS daemon) by setting a malicious IPP server with a crafted PPD file.
An attacker with control of the DNS responses to the DNS proxy in ConnMan might crash the service and,in same cases, remotely execute arbitrary commands in the host running the service.
A malicious user with sudo permissions may be able to run arbitrary commands with elevated privileges by manipulating the environment of a command the user is legitimately allowed to run.
Dan Bastone andEric Rafaloff of Gotham Digital Science discovered that an attacker with sandboxed root access can execute arbitrary commands as unsandboxed root by modifying/etc/cups/cups-files.
The smarty_function_math function allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the equation attribute of the math function.
It was discovered that ganeti, a virtual server cluster manager, does not validate the path of scripts passed as arguments to certain commands, which allows local or remote users(via the web interfacein versions 2. x) to execute arbitrary commands on a host acting as a cluster master.
Alvaro Muñoz and Christian Schneider discovered that BeanShell,an embeddable Java source interpreter, could be leveraged to execute arbitrary commands: applications including BeanShell in their classpath are vulnerable to this flaw if they deserialize data from an untrusted source.
Steve Kemp from the Debian Security Audit project discovered that gfax, a GNOME frontend for fax programs,uses temporary files in an unsafe manner which may be exploited to execute arbitrary commands with the privileges of the root user.
Consequently executing fixps on a malicious PostScript file could result in files being deleted or arbitrary commands being executed with the privileges of the user running fixps.
It was discovered that php-net-ping, a PHP PEAR module to execute ping independently of the Operating System, performs insufficient input sanitising, which might be used to inject arguments(no CVE yet)or execute arbitrary commands( CVE-2009-4024) on a system that uses php-net-ping.
They would allow remote attackers to hijack victims' credentials, access sensitive information,execute arbitrary commands, bypass read and post restrictions, or mount denial-of-service attacks.
It has been discovered that cacti allows authenticated administrator users to gain access to the host system by executing arbitrary commands via the"Data Input Method" for the"Linux- Get Memory Usage" setting.