This executable can spawn an interactive system shell.
This function can be performed by any unprivileged user.
xargs -a /dev/null /bin/sh
This function is performed by the privileged user if executed via sudo because the acquired privileges are not dropped.
xargs -a /dev/null /bin/sh
This function is performed by the privileged user if the executable has the SUID bit set and the right ownership because the effective privileges are not dropped.
xargs -a /dev/null /bin/sh -p
This function can be performed by any unprivileged user.
xargs -a /dev/null /bin/sh
This function is performed by the privileged user if executed via sudo because the acquired privileges are not dropped.
xargs -a /dev/null /bin/sh
This function is performed by the privileged user if the executable has the SUID bit set and the right ownership because the effective privileges are not dropped.
xargs -a /dev/null /bin/sh -p
This function can be performed by any unprivileged user.
echo x | xargs -o -a /dev/null /bin/sh
This function is performed by the privileged user if executed via sudo because the acquired privileges are not dropped.
echo x | xargs -o -a /dev/null /bin/sh
This function is performed by the privileged user if the executable has the SUID bit set and the right ownership because the effective privileges are not dropped.
echo x | xargs -o -a /dev/null /bin/sh -p
This executable can read data from local files.
This function can be performed by any unprivileged user.
xargs -a /path/to/input-file -0
This function is performed by the privileged user if executed via sudo because the acquired privileges are not dropped.
xargs -a /path/to/input-file -0
This function is performed by the privileged user if the executable has the SUID bit set and the right ownership because the effective privileges are not dropped.
xargs -a /path/to/input-file -0