Read Time:13 Second
Description
The software makes resources available to untrusted parties when those resources are only intended to be accessed by the software.
Modes of Introduction:
– Architecture and Design
Related Weaknesses
Consequences
Confidentiality: Read Application Data