Read Time:13 Second
Description
The product prevents direct access to a resource containing sensitive information, but it does not sufficiently limit access to metadata that is derived from the original, sensitive information.
Modes of Introduction:
Related Weaknesses
Consequences