CAPEC-88: OS Command Injection

In this type of an attack, an adversary injects operating system commands into existing application functions. An application that uses untrusted input to build command strings is vulnerable. An adversary can leverage OS command injection in an application to elevate privileges, execute arbitrary commands and compromise the underlying operating system.

Severity
High
Likelihood
High
22
/ 100
low-risk
Active Threat 19/50 · Low
Exploit Availability 3/50 · Minimal