CWE-377 – Insecure Temporary File
Description Creating and using insecure temporary files can leave application and system data vulnerable to attack. Modes of Introduction: - Architecture and Design ...
Description Creating and using insecure temporary files can leave application and system data vulnerable to attack. Modes of Introduction: - Architecture and Design ...