Link Following
From OWASP
Description
Examples
Related Threats
Related Attacks
Related Vulnerabilities
Category:Access Control Problem
Related Countermeasures
Categories
This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.