Read Time:13 Second
Description
Creating and using insecure temporary files can leave application and system data vulnerable to attack.
Modes of Introduction:
– Architecture and Design
Related Weaknesses
Consequences
Confidentiality, Integrity: Read Files or Directories, Modify Files or Directories