Read Time:13 Second

Description

Creating and using insecure temporary files can leave application and system data vulnerable to attack.

Modes of Introduction:

– Architecture and Design

 

 

Related Weaknesses

CWE-668

 

Consequences

Confidentiality, Integrity: Read Files or Directories, Modify Files or Directories

 

Potential Mitigations

CVE References