英語 での Arbitrary commands の使用例とその 日本語 への翻訳
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
The malware creates a maliciousJSP page on vulnerable systems that executes arbitrary commands.
Standard commands or arbitrary commands can be sent to the external power supply via GPIB I/F in these functions.
When the vulnerability is exploited,a local user may run arbitrary commands with SYSTEM user privileges.
The ability to run arbitrary commands can lead to denial-of-service(DoS), data corruption, data security violations and other risks.
Discovered in March of 1995,this hole allows outsiders to execute arbitrary commands on the server host.
Firefox: We do not believe Firefox can be forced to set an environment variable in amanner that would allow Bash to run arbitrary commands.
CVE-2008-5353 allows malicious code to escape the Java sandbox andrun arbitrary commands with the permissions of the executing user.
Some servers, including Apache and NCSA, allow the Web master to selectivelydisable the types of includes that can execute arbitrary commands.
An attacker canprovide specially-crafted environment variables containing arbitrary commands that will be executed on vulnerable systems under certain conditions.
When allowing user-supplied data to be passed to this function, use escapeshellarg() or escapeshellcmd()to ensure that users cannot trick the system into executing arbitrary commands.
A malicious DHCP server, or an attacker on the local network able to spoof DHCP responses,could use this flaw to execute arbitrary commands with root privileges on systems using NetworkManager and configured to obtain network configuration using the DHCP protocol.
Servers compiled with this module contain a vulnerability that allows remote users to send the server extremely long cookies and overrun the program stack,potentially allowing arbitrary commands to be executed.
The exploit, described by TheHackerNews, who also first reported the flaw, is thus:"The vulnerability in question is a sudo security policy bypass issue that could allow a malicious user ora program to execute arbitrary commands as root on a targeted Linux system even when the"sudoers configuration" explicitly disallows the root access.
As its name implies, it's a tool used heavily by Chef, but it can run independently of Chef(for example, those who use Puppet for configuration management can use Knife); like all of the other tools,it can be used to run arbitrary commands over SSH.
The vulnerability is a cross-site scripting(XSS) vulnerability that could allow elevation of privilege,enabling an attacker to execute arbitrary commands on the site in the context of the target user.
SHELL_EXEC| Rogue Wave- Documentation Command injection vulnerabilityWhen the system() or popen() function is used with externally-influenced input,it's possible for a malicious user to inject a string and execute arbitrary commands and code with the privileges of the attacked process.
When a specially craftedcontent exploiting the vulnerability is processed, arbitrary command may be executed on the server where Ghostscript is running.
A user may execute an arbitrary command.
If unfiltered input is passed to this API,it can lead to arbitrary command execution.