This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Link Following"
From OWASP
Weilin Zhong (talk | contribs) |
|||
| (2 intermediate revisions by 2 users not shown) | |||
| Line 1: | Line 1: | ||
| − | |||
| − | |||
==Description== | ==Description== | ||
| Line 8: | Line 6: | ||
==Related Attacks== | ==Related Attacks== | ||
| + | [[Direct Object Reference]] | ||
==Related Vulnerabilities== | ==Related Vulnerabilities== | ||
| + | [[:Category:Access Control Problem]] | ||
==Related Countermeasures== | ==Related Countermeasures== | ||
| Line 18: | Line 18: | ||
{{Template:Stub}} | {{Template:Stub}} | ||
| − | |||
| − | |||
Latest revision as of 12:43, 5 November 2007
Description
Examples
Related Threats
Related Attacks
Related Vulnerabilities
Category:Access Control Problem
Related Countermeasures
Categories
This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.