A website currently allows a user to download the website’s backup file stored in one of the hidden folders due to vulnerability. In this context which of the following could be associated with it?
Input Validation
Configuration Management/Insecure Configuration
Error Handling
Denial of Service