Description
Creating and using insecure temporary files can leave application and system data vulnerable to attack.
Latest vulnerabilities for CWE-377
No vulnerabilities found using your search criteria
References
Description of CWE-377 on Mitre website