CAPEC-546 - Probe Application Memory

An adversary obtains unauthorized information due to insecure or incomplete data deletion in a multi-tenant environment. (e.g., in a cloud computing environment)

Severity

Likelihood

Confidentiality

Integrity

Availability