Elevation of Privilege

An attacker can force data through different validation paths which give different results.

5