Products
Solutions
Company
Book A Live Demo
This CWE entry discusses the vulnerability where an attacker could deceive a user into following a link to a sensitive file/resource, potentially leading to unauthorized access.