Read Time:15 Second
Description
The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.
Modes of Introduction:
– Architecture and Design
Related Weaknesses
Consequences
Confidentiality, Integrity, Other: Read Application Data, Modify Application Data, Other