Watch this video on YouTube
Which of the following threat types involves an application developer leaving references to internal information and configurations in code that is exposed to the client?