A broad class of attack vectors, where an attacker supplies input to an applications command interpreter that results in unanticipated functionality.