Cloud Defense Logo

Products

Solutions

Company

CWE-62: Link Following to File/Resource

This CWE entry discusses the vulnerability where an attacker could deceive a user into following a link to a sensitive file/resource, potentially leading to unauthorized access.

Is your System Free of Underlying Vulnerabilities?
Find Out Now