ccsp video for an application developer has left references regarding the configuration of the hosting system in his code. An attacker was able to find this
An application developer has left references regarding the configuration of the hosting system in his code. An attacker was able to find this information in the code and use it to access the application without needing to go through proper validation. This is an example of what type of vulnerability?