This is one of the vulnerability which features in OWASP top 10 vulnerabilities. This vulnerability arises when web admins do not configure their website properly. For example, sometimes a web application might behave in a way that it is not supposed to and it reveals the buggy line in the code publicly which allows attackers to experiment on their site for other vulnerabilities.