This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Link Following"
From OWASP
Weilin Zhong (talk | contribs) |
|||
| (One intermediate revision by one other user not shown) | |||
| Line 1: | Line 1: | ||
| − | |||
| − | |||
==Description== | ==Description== | ||
| Line 8: | Line 6: | ||
==Related Attacks== | ==Related Attacks== | ||
| − | [[Direct Object | + | [[Direct Object Reference]] |
==Related Vulnerabilities== | ==Related Vulnerabilities== | ||
Latest revision as of 12:43, 5 November 2007
Description
Examples
Related Threats
Related Attacks
Related Vulnerabilities
Category:Access Control Problem
Related Countermeasures
Categories
This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.