what is a command injection?
attacker can insert arbitrary commands on the host OS via a vulnerable application
when is command injection possible?
when an application passes an unsafe input
what is a path traversal?
attacker provides a path as input for navigational purposes