CAPEC Details | |||||
---|---|---|---|---|---|
Name | Functionality Bypass | ||||
| |||||
Summary | An adversary attacks a system by bypassing some or all functionality intended to protect it. Often, a system user will think that protection is in place, but the functionality behind those protections has been disabled by the adversary. | ||||
Prerequisites | |||||
Solutions | |||||
Related Weaknesses |
|