Statements (19)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:Cybersecurity_Term
|
| gptkbp:cause |
gptkb:Privilege_Escalation
Unauthorized Access |
| gptkbp:commonIn |
Operating Systems
Web Applications |
| gptkbp:defines |
A method or technique that allows an attacker to circumvent security mechanisms.
|
| gptkbp:example |
Bypassing login authentication
Disabling security controls via configuration |
| gptkbp:mitigatedBy |
Input Validation
Proper Authentication Security Patching |
| gptkbp:relatedTo |
gptkb:Access_Control
gptkb:Vulnerability Exploit |
| gptkbp:bfsParent |
gptkb:CWE-502
gptkb:CWE-190_(Integer_Overflow_or_Wraparound) gptkb:CWE-287 |
| gptkbp:bfsLayer |
8
|
| https://www.w3.org/2000/01/rdf-schema#label |
Security Bypass
|