How can an authentication bypass vulnerability be exploited?