A number of vulnerabilities are specifically related to problems in
creating, managing, or removing alternate channels and alternate paths. Some
of these can overlap virtual file problems. They are commonly used in
"bypass" attacks, such as those that exploit authentication errors.
Most of these issues are probably under-studied. Only a handful of public