CAPEC-76: Manipulating Web Input to File System Calls

An attacker manipulates inputs to the target software which the target software passes to file system calls in the OS. The goal is to gain access to, and perhaps modify, areas of the file system that the target software did not intend to be accessible.

Severity
Very High
Likelihood
High
17
/ 100
low-risk
Active Threat 15/50 · Low
Exploit Availability 2/50 · Minimal