Attackers can, in some cases, get around logic put in place to 'guard' sensitive functionality or data.