CWE-377 Insecure Temporary File Vulnerabilities
Insecure Temporary Files
In this tutorial, students will get an overview of the security weaknesses defined by Insecure Temporary File (CWE-377).
CWE-377 Insecure Temporary File | Duration: 20 minutes
In this course, we will look at CWE-377, which discusses the weaknesses caused by the usage of insecure temporary files.
This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. The course describes the security impact of the vulnerability. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
At the end of this course, you will be able to: