CWE-377

Insecure Temporary File
AI Translation Available

Creating and using insecure temporary files can leave application and system data vulnerable to attack.

Status
incomplete
Abstraction
class

Common Consequences

confidentiality integrity
Impacts
read files or directories modify files or directories

Detection Methods

automated static analysis

Potential Mitigations