Statements (19)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Cybersecurity Term
|
gptkbp:cause |
gptkb:Privilege_Escalation
Unauthorized Access |
gptkbp:commonIn |
Operating Systems
Web Applications |
gptkbp:defines |
A method or technique that allows an attacker to circumvent security mechanisms.
|
gptkbp:example |
Bypassing login authentication
Disabling security controls via configuration |
https://www.w3.org/2000/01/rdf-schema#label |
Security Bypass
|
gptkbp:mitigatedBy |
Input Validation
Proper Authentication Security Patching |
gptkbp:relatedTo |
gptkb:Access_Control
Vulnerability Exploit |
gptkbp:bfsParent |
gptkb:CWE-502
gptkb:CWE-190_(Integer_Overflow_or_Wraparound) gptkb:CWE-287 |
gptkbp:bfsLayer |
8
|