Product A handles inputs or steps differently than Product B, which causes A to perform incorrect actions based on its perception of B's state.This is generally found in proxies, firewalls, anti-virus software, and other intermediary devices that allow, deny, or modify traffic based on how the client or server is expected to behave.