Topic 1: Input-validation vulnerabilities Flashcards

1
Q

what is a command injection?

A

attacker can insert arbitrary commands on the host OS via a vulnerable application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

when is command injection possible?

A

when an application passes an unsafe input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is a path traversal?

A

attacker provides a path as input for navigational purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly