Allowing user input to control paths used in file system operations may results in----
Privilege Escalations
Path traversal Attack
Cross Site Scripting
Buffer overflow